• Home
  • Buy the Book
  • More ebooks
  • Reviews
  • Ethel Is Hot LOL
  • Free resources
    • For Educators
  • Hot Topics blog
  • News & Press
  • About Us
  • Contact

Apparently this Iowa high school has no definition for video bullying

11/21/2013

0 Comments

 
The word Melcher-Dallas high school is searching for is ... Videojacking.

An Iowa high school ruled that  several videos students took of another student, Levi Null, 13, who has
Asperger's Syndrome and ADHD--doesn't "meet the criteria" for bullying and the school board President, Bob Lepley, says he stands by the principal's decision (via Gawker).

The students videotaped Null's involuntary movements
without his knowledge or permission and posted them online with school computers. Further, they videotaped other kids hitting, smacking and teasing Null.

Cyberbullying is the use of cell phones, instant messaging, e-mail, chat rooms or social networking sites such as Facebook and Twitter and YouTube to harass, threaten or intimidate someone.

Though I personally did not view these videos (Melcher-Dallas high school
claims they've all been taken offline and destroyed), the very existence of them is a cyberbullying tactic known as Videojacking: When someone videotapes a target without his knowledge/approval and uploads the video to a popular video-sharing websites.

Here is the news story on WHOTV. It is quite obvious to anyone that Null felt harassed, threatened and intimidated.

This school has set a dangerous precedent to refuse to categorize these students' behavior as cyberbullying. Moreover, they had an opportunity to re-evaluate their school policy to further define a tactic they clearly had no previous experiences with and update the policy to protect this student from mob-like behavior.  But they didn't. That alone is hard to believe, but when, according to WHOTV, the students used school computers to upload these videos--there were still no consequences, I have to ask:  is it any surprise that kids  constantly report they feel unsafe at schools when so many adults on the other side of the Digital Divide are operating with an inadequate understanding of what they're up against?

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Summer Sale: $12.50 Buy The Book

0 Comments

The latest mobile cyberbullying tactic of teens: Text Bombing

11/20/2013

1 Comment

 
Earlier this month, a 15-year old from St. Petersburg, FL was arrested for sending “hundreds of threatening text messages” over the course of eight days to former friends. Some were even death threats. The suspect used a smartphone app called Kik Messenger, which happens to be the cyberbullying app du jour, also used in the Rebecca Ann Sedwick cyberbullying case that contributed to her suicide. Kik allows users to send text messages from an Internet Desk Top to cell phones.

The tactic is called “text bombing”

Huffington Post writer Ann Brenoff deftly addresses this tactic in her article, “What Every Parent Needs to Know About Text Bombs.” Her article did a great job identifying some of the apps used to do the cyberbully’s “dirty work,” but before we get into that, let’s drill down a little deeper into the motivation behind text bombing.

With text bombing, there are two ways to inflict harm.

The first way, like most cyberbullying tactics, is rooted in emotional conflict. The ex-friend, the ex-beau, the jealous peer, etc. lashes out in anger, and in extreme moment, repeatedly texts the most hurtful thing anyone can think of, e.g., you don’t matter. Go kill yourself. I will find you and destroy you.

For example, in the St. Petersburg case, the teen suspect learned that one of her target’s relatives had recently committed suicide, so she began bombarding her ex-friend with messages to do the same.

The second way to text bomb relies on apps to do the dirty work by sending a message hundreds of times as a way to harass the target, break their phone or even cost them money. Popular text bombing apps mentioned in Brenoff’s article included SMSBOMBER (Android) and SMSBARRAGE before the Google App store got wise to it and banned them.  However, these text-bombing apps can be found anywhere. A simple Google search finds more SMS bombing apps like those from Cydia that anyone can learn to use in minutes.

With my cyberbullying columns, I’m always trying to identify the latest tactic and provide educators and parents with technological and behavior tips to prevent it.

First the tech tips: The way to block multiple duplicated messages from any sender is through Anti-SMS Text Bomb (Android). The link to this page also includes several other anti-sms bombing apps for other phones.

And according to NY Daily News, there’s a new app being developed, called STOPit, which students download to their phones. It enables students to easily capture malicious behavior with their Apple or Droid smart phone and send it to adult contacts or officials with the touch of a button — and in some cases anonymously.

As usual, the public reaction to this text bomb tactic is shrill, bordering on exasperation. Said one HuffPo commenter: “Here's an idea.....don't give a cell phone to a kid [who] doesn't think that each and every keystroke equals $$$$$$. If they are STILL too young to understand the value of a $ then they are too young for a cell phone.”

According to the latest Pew Internet and American Life study on Teens and Technology (March 2013) 78% of teens (12-17) now have a cell phone, and almost half (47%) of those own smartphones. An earlier study in 2010,  found that most teenagers with cell phones have family plans paid by their parents.

When you give a child or teenager a cell phone or computer of any type, you are giving them limitless power to do good or to do harm. And likely, you are footing the bill, so you already have leverage for encouraging their ethical behavior around texting.

An ongoing conversation needs to accompany the privilege of owning a smartphone. Do you discuss with your child:

  • Sending any form of text bomb is considered harassment and will not be tolerated. Do you spell out the consequences for this behavior?
  • Does your child know they don’t have the right to say anything they want? Anytime a child’s language approaches bodily threats and harassment, it is not protected by freedom of speech and it is quite conceivable he or she can be arrested.
  • Does your child know some states are considering holding the parents’ liable for the child’s cyberbullying actions?
The tools, the tactics and the technology are all going to change. Six months down the road; we are likely going to have a whole new set of apps and digital devices connected with cyberbullying. But the conversation between kids and their parents (and schools) should be about the expected and appropriate behavior when handed a technological device. Are you having that conversation already?

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book

1 Comment

Award-winnng cyberbullying book offered for FREE on Nov 5 &6, 2013

10/29/2013

0 Comments

 
Picture
To cap off October's National Cyberbullying Prevention Month, we're offering a free Kindle download of our award-winning cyberbullying manual for adults, titled Cyberslammed™ next week. ($25 value)

It will be available for two days on Amazon Nov 5 & 6, 2013. Click here for the Amazon link.

Sponsored by Time Warner Cable, Cyberslammed examines the six most common tactics of cyberbullying. It is jam-packed with tactical advice to help parents, educators and students in 5th-12th grade quickly analyze the underlying conflict and work toward its solution with the least harm done.

In 2013, it won first prize in IndieReader's nonfiction awards. It has 6 reviews with an average 5 star rating.

There are only two days this award-winning cyberbullying book will be offered for FREE on Kindle on Nov 5-6. Take advantage and get informed!

0 Comments

Latest Digital Pile On Victim: Rebecca Ann Sedwick

9/16/2013

0 Comments

 
It's back to school, 2013 and sadly, another year starts off with another story of a 12-year-old Florida girl who committed suicide. According to news reports, Rebecca Ann Sedwick endured more than a year of harassment, online torment and threats from a group of girls before she broke down completely and made the sorrowful choice to end her life.

As many as 15 girls may have been involved. According to the International Business Times article:

"There were strong indications that Rebecca committed suicide due to being bullied online. Social media applications on her phone showed messages like 'Go kill yourself' and 'Why are you still alive?' the Ledger reported."

Most suicide and cyberbullying experts are not as comfortable as the media is in making such a strong correlation of cyberbullying to suicide as numerous (unreported) factors might have also played a part in Sedwick's decision, but the point of this blog is to analyze the methods of cyberbullying tactics and try to provide communities with insights on how to identify and prevent an attack from happening to children you care about.

The article went on to state:

"Judd said detectives are trying to investigate the social media applications that Sedwick used, including Kik and Ask.fm, but many of the websites are based in other countries."

First the technology:
Ask.fm, we already know, is a sketchy website operated in Latvia and is a popular social networking website among teens where users can ask other users questions, with the option of anonymity. I've seen many Ask.fm profiles and the callousness and viciousness from "anonymous" users is rampant. No kid should be using Ask.fm in my opinion, unless you're looking to be slammed and cyberbullied. (In the latest twist, some kids troll themselves on Ask.fm hoping to get their friends to protect them and write good things about them in a desperate bid for attention. Source:2paragraphs.com)

After a spate of high-profile teen suicides that have been connected to Ask.fm, the company has vowed to have better regulations including making a "report" button more prominent on the site; hiring more staff to moderate comments; and creating a "bullying/harassment" category alongside the existing categories of "spam or scam," "hate speech," "violence" and "pornographic content."

I don't know if the girls who were telling Sedwick to "go kill herself" did it on Ask.fm, or through Sedwick's Kik Messenger, a smartphone app that acts as an Instant Messenger and allows the user to share other features likes videos and images.

But we do know from news reports that Sedwick's parents shut down her Facebook account and even had her change schools. Regardless, the cyberbullying followed her when she switched social media mediums (such as from Facebook to Ask.fm).

From all that I can gather, this is another classic example of A Digital Pile On, what we, the authors of Cyberslammed, have termed a situation when a group viciously gangs up on one person through Facebook, Twitter, Ask.fm, a group chat, comments or Instant Messaging.

Sedwick might have been a target of a Digital Pile On from a multiple tech devices, websites and apps--where the behavior is the same, just the media changes.

There is no "armchair psychologist" instant solution to what happened in Sedwick's case, but one thing is clear: parents and schools need to be on top of an ongoing cyberbullying situation, particularly when a mob is involved.  They need to know exactly how and what their teens are communicating about in the midst of it. Cyberbullied kids are going to be compelled to know what others are saying about them, and will be loathe to abandon social media for fear the bullies will have the upper hand. But, to heal from a cyberbullying situation, the worst thing a teen can do is constantly monitor the ongoing abuse. It's like dying a little death every day. The cyberbullies want to lure them back in, so if they see their target on different social media platform, it will start all over again.

Get the teenager away from ongoing abuse. Make a plan to find peer or adult help to shepherd him or her through this painful process. Demand the school take appropriate action or take it to the next level. And keep vigilant to make sure your teen is still talking to you and working through the situation. At this point, it is smart to have your teen's social media on a keyword monitoring system, to alert you to words like "go kill yourself."  Don't take your eye off the situation until you are sure your teen has gotten through the entire traumatic incident without relapse.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book
0 Comments

Accidental cyberbullying and Instagram: How a Rating Site Happens

9/3/2013

0 Comments

 
A Huffington Post article on accidental bullying from author Sue Scheff interviewing iKeepSafe's Katie Greer adds a little more nuance to what has seemingly been a lot of black and white discussion on cyberbullying this past year. Owing to the fact that we're all human and make newbie Internet mistakes (particularly when you're in middle school) this article is well worth the read.

However, I deal with specific instances of cyberbullying and Greer used a very good example of what we, the authors of Cyberslammed define as a "Rating Site"-- when someone uploads a photo to Facebook, Instagram, Vine or a site like "Hot Or Not" and polls others to rate the person in the photo as the fattest, ugliest etc.


Greer said:
"The most common story I get is centered around these beauty pageants (or other like-contests/polls) that are happening all over social networking sites such as Instagram or Ask.fm. Kids know these contests/polls are riddled with negativity and admit to seeing some pretty nasty ones, so many say they have created ones with the intent to make their friends feel good about themselves. One group of 7th graders told me that a contest was set up on Instagram pinning 4 girls against each other, asking people to tag the ugliest of the four. Their friend received the most tags in this mean contest, so they decided to set up one with a positive tone, asking people to vote for and tag the prettiest. All these girls banded together to get their friend the most votes -- not realizing in the process they were unintentionally hurting the three others involved in this contest."

So what is happening is, as kids are flocking to Instagram, Snapchat, Vine and Twitter to get away from the hovering parents on Facebook, they are using the same tactics, but on different platforms. The Rating Site on Instagram pits someone as the "ugliest." We've seen that before. What Greer is talking about is sort of a Reverse Rating Site, where the girls were trying to balance the wrongs by setting up a poll on Instagram to rate the prettiest girl--not realizing that by doing so, the unspoken assumption was that the other three were not pretty.

Anyway, yes, that is accidental. Is it cyberbullying? Some who don't know the whole story would definitely see it that way. That's why we need to approach every cyberbullying situation with an open mind and a willingness to gather ALL the various perspectives and facts. It's not black and white--never was, and by educating yourselves on this ever-shifting landscape, you will be educating the kids in your life who may not always understand the difference.


Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying.  Sale: $12.50 Buy The Book

0 Comments

How Parents Can Protect Their Kids From Imposter Profiles

7/26/2013

0 Comments

 
Five Town CTC and I have collaborated on a column to address the national news in Maine (our home state) concerning the death of Glenburn teenager, Nichole Cable and information on what parents and teachers can do concerning youth online safety.

A 20-year-old acquaintance Kyle Dube was indicted with murder and kidnapping in connection with Nichole Cable. From the news reports, he got her to meet up with him by luring her to a remote wooded area under the guise of a fake Facebook account, or what is known as an  “imposter profile,” in which she believed she would be meeting the real owner of the Facebook account.

Understandably, situations like these heighten parents’ fears about their children’s safety online. Here are some suggestions on how to broach this topic with your own children.

An imposter profile is when someone creates a fake website or social networking profile in order to deceive the target.  In this case, the predator stole the identity of someone Nichole may have possibly known in real life and communicated with her through this imposter Facebook profile. The imposter profile has since been deleted and my understanding is that the FBI fully investigated it. 

I have not spoken to the family nor to the police, so I cannot speculate as to why Nichole trusted this man and chose to meet up with him.

What we do know is that predators often “groom” young boys and girls online by befriending them and finding out what they like, what hurts them and what makes them tick in a short amount of time. It’s incredibly easy to find a wealth of information on a teen simply by requesting to be a friend on Facebook. Once the teen accepts the friendship request, the predator looks at what kind of media/music/movies the teen likes, what drives his or her personality and what “angles” they can use to manipulate the impression of having common interests. For example, the predator sees what bands the teen likes on his or her Facebook page and stores that as nuggets of conversational “bread crumbs” by casually mentioning: “Oh you like One Direction? I like One Direction too!” From there, the common interests quickly lead to personal revelations and “heart-to-heart” talks. Pretty soon, the teen feels like he or she has someone special who deeply understands them and might be the only one who knows what they are going through.

What parents/teachers can do.

As upsetting as this situation is, Nichole’s story needs to be told to your teenagers as a talking point. Here is an excellent list of tips in how to guide this conversation.

Meeting People Online: Dos and Don’ts of Online Relationships for Teens

The number one rule I tell teens is “Don’t friend anyone on social media that you don’t already know in real life and trust 100%.” Everything you upload for content can be used against you, whether to “groom” you for nefarious purposes or in cyberbullying situations as content to be repurposed for malicious reasons.

So many teens shrug off this advice thinking, “Oh, she’s being alarmist. It’ll never happen to me.”

It happened to Nichole and that’s why her story needs to be told.

The other suggestion I‘ve repeatedly made to parents is to implement www.uknowkids.com app on your teen’s cell phone, Facebook, Twitter and Instagram accounts.  This free “parental intelligence system”  instantly alerts you via text or email if any keywords your teen and someone else are using contain language around cyberbullying, sexting and predatory grooming. You’ll also know whom exactly your teen has accepted as a friend on social media without compromising his/her online privacy.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Summer Sale: $12.50 Buy The Book
0 Comments

This Valentine's Day, 36% of Americans will send Sexts-bad idea?

2/6/2013

1 Comment

 
If you're under 18, then yeah, it's a very bad idea. Worse, if you're over 18 and dating someone younger than 18.

Parents of teenagers who are in relationships with cellphones are you listening?

Any nude or semi-nude photos that are transmitted electronically (even just sent via cell phone) are considered in many states to be child pornography trafficking, even if the juvenile is sending a photo of himself or herself. The laws vary from state to state, but here in our home state of Maine, for example, the law is extremely harsh.

According to Mobile Media Guard "Under Maine law anyone - regardless of age - who creates, distributes or possesses an image of a minor engaged in a sexually explicit act may be prosecuted under the State’s child pornography laws and if convicted, may serve up to 10 years in jail and be required to register as a sex offender."

Most kids and adults I've spoken to at statewide presentations over the last few months know the term "sexting," but had no idea the stiff penalties associated with it. Furthermore, most adults and kids didn't realize that if they encountered a sext on a cell phone or via the Internet, they, themselves could possibly be arrested for forwarding that photo electronically in any way--even to the authorities!

The fact that 36% of Americans (I'm assuming they polled adults) are admitting to engaging in what is called "consensual sexting" is frankly not a surprise. Teens engage in this form of relationship currency all the time. They're calling them "Selfies" self-shot provocative photos, an absolutely beautifully narcissistic way to capture one's youth. Thanks Rihanna!

When it stops being "consensual" and begins being cyberbullying is the moment the relationship turns sour or ends. This is the kind of "what would you do" talk you should be having with your teenagers who own cell phones. For example:

Parent: "What happens when Joe or Mary decides to spread your image around to all 500 of his/her Facebook friends?"

Teen: "He/she would never do that!" i

When 1 in 5 sext recipients report they have passed the images along to someone else and more than half (55%) of those who have reported sending them to someone else say they shared them with more than one person--try saying that again with a straight face.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Summer Sale: $12.50 Buy The Book
1 Comment

Imposter Profile Tells Girls 'To Go Kill Themselves'

11/15/2012

1 Comment

 
In Cyberslammed, Hot Topics, we discuss cyberbullying tactics that come from real-life news stories and insights on how to "identify, prevent, combat and transform them."

Minnesota-Recently a group of female high school football fans from one team got into it with fans from a rival team and is so often the case, they took their fight online.

A story in Fox9.com reports:

"Officials say at least one of the bullies made a post on Facebook urging a group of girls to go kill themselves...

Investigators say the suicide posts came from a fake Facebook account, and they're still trying to track down exactly who is behind it. "

[Note: If you've followed this blog, you'll know that a "Fake Facebook account" is what we call an Imposter Profile--a website or social networking profile set up by the perpetrator to appear as if it is owned or maintained by the target.]

The story goes on to say:

"Parents should be aware that what they send is often electronically traceable," Hattstrom warned. "If it's offensive or threatening in any nature, basically, you're going to hear from the Police Department."

Kids know that the "Go kill yourself" hot button is the ultimate insult/torment these days, particularly with the rash of international and national suicides that have been linked to cyberbullying this fall. I had a kid ask me yesterday, "How do you know if you're being cyberbullied?" as in when is it a prank and when does it get real?

According to Cyberbulling Research Center, the true definition  of cyberbullying (which we use in the book) is: "willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices."

A one-time prank where someone steals your password to your social networking profile and writes some mildly teasing or obnoxious words, while unpleasant, is not really cyberbullying. It's misconduct or peer harassment. But true cyberbullying is a calculated campaign. Keep in mind the words "willful and repeated harm."

Any time some one is threatening you, telling you to go kill yourself, using extremely derogatory language, publishing your private information, defaming you, libeling you....any time words and intent cross the line into criminal behavior, that's when you know it is real. And that's when it is advisable to bring the police into the situation.

Case in point: this story of a Veazie, ME target of criminal threats brought the police in. And in no time, they found out who the perpetrator was. Kids need to understand that just because you know how to write an anonymous comment via an anonymous account, you are never anonymous. Everyone leaves a digital footprint behind with every keystroke and the police, cyber crimes units and the FBI know exactly how to find the source of every electronic communication.

The rest of the article states:

"Police say they recognize there is a fine line between free speech and harmful threats, but they say charges are possible in this case. If students are behind the anonymous bullying, they will also face punishment from the Anoka-Hennepin School District."

Free speech does not lend itself to threats of any kind. In both the Minnesota and the Maine case, girls crossed the line, venting their frustration, their fears and their anger into something much more malevolent and lasting. And prosecutable. Unfortunately, most cyberbullying cases do not get the attention they need until they are at the highest threshold and become policeable. We need to have in-class or at-home training with our kids about cyberbullying before it's even at its lowest threshold to help them channel potential negative emotions into better outcomes.  Stay posted to this blog for more real-life examples of the most common cyberbullying tactics and what Cyberslammed and other Maine resources are doing to provide school trainings.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Summer Sale: $12.50 Buy The Book

1 Comment

Parents & Educators-Here's a new resource to fight the online smears!

11/8/2012

0 Comments

 

As part of Cyberslammed’s research, I’ve been looking into Reputation Management companies since 2007 and the one that has truly impressed me is RegainYourName.com. [Full disclosure: We approached them after Cyberslammed was published to see if their reputation management services could somehow mesh with the “Combat” section of each tactic in the book. More on how this works below.]

From the beginning, RegainYourName.com’s interest in protecting kids from online defamation and Sexting came through as a genuine social mission—an integral part of their core values. Imagine being a teenager whose parents have no clue, whose teachers and school administrators are no help; who daily, sees her reputation getting annihilated online and has nowhere to turn. She may get a free consult with other RM companies, but in the end, it will cost her thousands of dollars to get bad content pushed down off search engines. For that teenager? Dead end, once again.

 As a UK nonprofit, recently founded in 2010, RegainYourName.com is very helpfully about the DIY philosophy, that is “do what you can yourself—first.” they offer free Twitter, Facebook and website resources along with free email advice. [For teenagers with little real life support, this is a lifeline.] Next, for around $30, they offer e-guides and videos that for example, teach how to remove and report cyberbullying content yourself off Facebook including:

  • Report and delete cyberbullying, cyberstalking and privacy issues on Facebook.
  • Ensure you communicate with a real person at Facebook.
  • Use applicable local laws to remove content.
  • Use Facebook’s ‘Terms of Service’ to make a complaint which will result in deleted content.

One of the # 1 complaints I’m starting to hear from parents when their child is being cyberbullied is that they don’t know where to start, who to go to first, and even if they take it to the police, Facebook or the schools, if their complaints are even effective! That’s why I like RegainYourName’s no-nonsense approach.

Regain Your Name was created by a reputation management consultant who had previously worked in education, and a victim of cyber stalking and harassment who knew first-hand what would and wouldn’t achieve the removal of bullying material on the Internet. Drawing on experience of e-safety in education, cyberbullying and social media marketing, they offer advice to individuals, schools and anti-bullying advocates based on our considerable experience in this field. All of their eBook and video material stems from real examples of removing grossly offensive material on the web. All of their free advice is based on strategies they’ve already seen work.

Here’s how their knowledge and expertise dovetails with what we’ve learned. Take Sexting, one of the tactics in our book, for example. While we use a social-emotional model to get to the bottom of motivation behind Sexting,  RegainYourName is all about getting that potentially criminal content off the ‘Net. Fast! No wasting time going through the wrong channels when every second counts. They know how to do it and they aren’t holding this knowledge “hostage.” As they told us:

For example – we get a lot of requests for advice on removing pictures resulting from Sexting – from both teenagers and adults. Currently, using copyright infringement is the most effective way to remove these from search results and social networking – by using  DMCA legislation. (Since a phone or webcam was used, the copyright is owned by the person who created the image – and not whoever has published it without permission.)

Apart from their online services, they also offer training solutions, speakers for conference events, schools and educational workshops. In a recent email exchange, it’s clear their work empowers students who fear psychological harm from cyberbullying:

I’ve used the removal guides myself with Y8 students in the UK (7th and 8th grade equivalent) with good results. Interestingly it wasn’t the fact the cyberbullying could be deleted after the event, which appealed most to them, it was the prior knowledge that the cyberbullying could be removed which proved most powerful. The ‘threat’ of cyberbullying, partly caused by a lack of knowledge and information, was at least on a psychological level in terms of the level of worry, reduced. Those pupils who admitted that they had been tempted to bully, or retaliate in a bullying manner, also revealed that they would be less likely to do so in future given the knowledge that the abuse was traceable and removable. Not a scientific study by any means – but an interesting basis for a thesis.

In the future, we hope to provide a live Facebook or webinar forum for adults and teens with expert contributors and would like to invite RegainYourName’s founders to answer live Q&A on one of our six tactics topics. Like RegainYourName, and like us, this isn’t about the almighty bottom line. Yes, we have businesses to run, but when teenagers’ lives and reputations are at stake, there is much we can do to empower adults and teens to take back control over their digital footprint.

0 Comments

Amanda Todd's Mother On 'Sexting' And The Dark Side Of The Web

11/5/2012

0 Comments

 
I'm sure every pair of eyes were on Amanda Todd's mother when she got up before a group of Metro Vancouver mothers in her first public appearance since her daughter's death.

"If my daughter didn't believe everyone at the end of that Internet was innocent she would be alive today," she said in a November 5 Vancouver Sun story 

As always, the point of this blog is to examine the tactics used in individual cyberbullying cases and to dissect them as a way to provide parents and educators with teachable moments for the kids in their lives.
According to an article in Digital Journal, when Amanda was 12 years old, she flashed her breasts to a boy she'd met online through a webcam she was using with friends.

"Police knocked on her door early on Christmas Eve of that year to tell her the picture had been posted online. This began her slide into depression that included anxiety, substance abuse, and cutting herself."

Not knowing the family personally, I can only speculate, but it sounds as if the girls were role playing a flirty version of "Girls Gone Wild" like it was a joke, a lark.This type of Sexting happens all the time; it's what author Nancy Willard Executive Director of the Center for Safe and Responsible Internet Use characterizes as a way to negotiate relationship issues, not actual cyberbullying Sexting. At 12, Todd probably wouldn't have thought what kind of terrible consequences could derive from flashing a stranger.

But the cyberbullying instantly started with a nasty Digital Pile On as well as morphed offline into physical bullying where Todd was actually beaten up by a group of teens.

In the Vancouver Sun article, Carol Todd told the group: "Amanda eventually came to realize the mistakes that she made from that one night when she was 12 years old," Todd told the crowd, referring to an incident in which Amanda flashed someone on the Internet. "She never thought it would come to haunt her for the rest of her life. It was a mistake - it became a life sentence and in the end, it contributed to her death."

Webcams or smartphones--the technology doesn't matter-when it comes to Sexting, there are multiple reasons to do it and the underlying conversation every mother needs to be having with her daughter before the new phone is handed over is: Can I trust you to protect yourself with this device? Pre-play with them the various scenarios.

Tell her what happened to Amanda, to thousands of girls across the country whose innocent mistakes have come back to haunt them. The Sexting conversation is essential in every household these days, more than any other topic we cover in our book. The technology will always be available. It's up to us to prevent the behavior.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book
0 Comments

Suicide Victim Erin Gallagher & The Digital Pile On through Ask.fm

10/31/2012

0 Comments

 
Erin Gallagher, 13, an Irish teenager is the latest young person to be linked to a cyberbullying suicide, according to reports.

A Huffington Post article states:

"According to the Irish Independent, Erin Gallagher of Ballybofey was reportedly found dead by relatives on Saturday night. The teenager had allegedly "warned her tormentors" that she was intending to commit suicide only 24 hours before.

"U prob think it was funny when [I] f**in put a rope round my neck cause of yous [sic]," she wrote on Friday in a post on ask.fm, a popular social networking site. Her comment had reportedly been directed at an anonymous person who had been bullying her."
**
We need to first put out the statement that cyberbullying is rarely the sole cause of a teen suicide. You can read more about that here.

Ask.fm, the social media site Gallagher used is basically a site where your photo/profile is made public, anyone can make a comment or ask a question and you are supposed to answer it. It is an unmonitored site where anonymous aggressors can do a Digital Pile On. Kids DO NOT need to be on this site. If anything, they can have the option of a closed social group on Facebook. We know that when regular people don't have accountability online (their real identities aren't revealed along with their comments, the disinhibition effect takes over; i.e. "I don't see you face to face, therefore, I don't feel empathy for you.")

Like Rating Sites, this Ask.fm has no redeemable value for young kids. The one question I'd want to ask any young person who wants to be on this site is: "Why is public approval so important to you?" The larger issue to address is: how do you get what you need without having to go on sites like Ask.fm?

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book
0 Comments

Target of Videojacking Becomes 'Internet Famous'

10/2/2012

0 Comments

 
"Internet Famous"--a new term that has sinister undertones, as well it should.

A story in Rappler shows how quickly one can be a target of a videojacking and how it can devastate the unsuspecting target.  This young man shows resilience and strength of character for having gone through it and how he chooses to use his story to help others.

MANILA, Philippines - If there's one person who could preach about using social media for social good, it's Chris Lao.

In 2011, Lao became Internet-famous for driving right into a flooded street in Quezon City. The incident was caught on camera, and the video quickly became viral: netizens were quick to brand him a rich kid with no common sense for driving into an obviously impassable street. His now-famous exclamation -- "I was not informed!" -- became the meme of the season.

But the reactions didn't stop, and soon they became more vicious and hateful: Lao became a victim of cyberbullying.

The cyberbully victim-turned-lawyer now speaks out to encourage netizens to think about the consequences of their social media footprints -- and to use them for social good.

Watch as Lao tells his story:

http://www.rappler.com/video/13475-the-consequence-of-cyberbullying-by-chris-lao

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book
0 Comments

Target of Imposter Profile Sues For Defamation

9/27/2012

0 Comments

 
The Supreme Court is about to rule on a Facebook Imposter Profile case of a Canadian teen.  "The case pits the media's right to report on court proceedings against the inherent vulnerability of young girls subject to online sexualized bullying and the risk of harm if they're required to reveal their identity and republish comments, according to court documents."
Full story below:

story originally from: The Montreal Gazette

Supreme Court to rule on Facebook cyberbullying case  
By Natalie Stechyson September 26, 2012


OTTAWA - A teenage girl who says she was a victim of cyberbullying will find out Thursday whether she'll be able to keep her name and what was written about her on a fake Facebook profile out of the public eye.

The Supreme Court of Canada will announce in a judgment Thursday whether the Nova Scotia girl known only as A.B. can keep her name and the alleged defamatory statements said about her online under a publication ban, while she tries to sue the person or persons responsible for defamation.

It's the first time the Supreme Court has taken on the topic of cyberbullying, and a number of interveners - including a national media coalition, the privacy commissioner of Canada and Kids Help Phone - have chimed in on both sides of the case, which was heard in May.

The case pits the media's right to report on court proceedings against the inherent vulnerability of young girls subject to online sexualized bullying and the risk of harm if they're required to reveal their identity and republish comments, according to court documents.

What's at stake is the open court principle, which is what lets the public understand and scrutinize what's happening in the courts, said Marko Vesely, a Vancouver lawyer who represented the British Columbia Civil Liberties Association, who also acted as interveners in the case.

"Like the old saying goes, 'sunlight is the best disinfectant'. Having the courts open to scrutiny is what gives us all confidence in the court system," Vesely said.

Anytime a court declares something defamatory, it's a restriction on freedom of speech, Vesely said. And it's concerning if that's being done without being open to the public, he added.

But a child's safety should come before any discussion of openness, said Rob Frenette, the co-executive director of BullyingCanada.

Putting A.B.'s name and the details of what was written about her out into the public will likely just further victimize her, he said. And, if she does have to reveal these things, it could scare other cyberbullying victims from getting help, Frenette said.

"As students come forward to us about being bullied we need to ensure their identity is protected, simply because they feel that if they come forward...they could become more susceptible to bullying," Frenette said.

In 2010 A.B. found that someone had made a fake Facebook profile using her image and a slightly modified version of her name, according to court documents filed last year. The profile allegedly included "scandalous sexual commentary of a private and intimate nature," the documents say.

In pursuing a defamation case, A.B. has requested that the identity of the person behind the IP address linked to the profile be released by telecommunications company Bragg Communications - a request that has not been opposed.

But she also sought an order to allow her to proceed with a pseudonym and a partial publication ban. This order has been denied by the lower courts.

A.B.'s counsel has argued that the previous courts failed to take into account the special vulnerability of children, according to court documents.

According to UNICEF Canada, who also acted as interveners, some of the risks to victims of cyberbullying can include physical and emotional health problems, depression, eating disorders, nightmares, and acts of self-harm, including suicide.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying.  Sale: $12.50 Buy The Book

0 Comments

Target of Two Tactics Fights Back And Inspires Others

9/21/2012

0 Comments

 
A really interesting podcast from Flipswitch lets Kira, an Australian high schooler  with bipolar condition talk about what she suffered at the hands of cyberbullies and how she actually fought back.
At the 5:20 mark she recounts a situation where she was attacked on a Haters' Club made on a Facebook group, (which she was able to get taken down) and a Rating Site on Formspring, a social media site that allows anonymous opinions to be posted. She left Formspring's community at that point. At the 6:25 mark Kira tells teens these are several ways to fight back against cyberbullies. Her advice:

1. Print out copies of every cyberbullying comment or incident before it gets deleted. This is saved evidence for the police if need be.

2. Make your Facebook privacy settings only viewable to see your name, your country and your profile picture. Don't give cyberbullies access to information that can use against you.

3. Avoid social networking sites that don't protect your privacy --or--to echo another comment she made, avoid sites that only allow anonymous posters (like Formspring).

4. Be friends with your delete button. In other words, she says, delete any person from your social networking site who ever belittles you, insults you or is mean in any way, even if you consider them friends. Real friends don't behave this way online.

Interestingly, her comment on what schools are doing about bullying/cyberbullying echos a lot of what I've heard from American kids. That schools don't take it seriously; that consequences are rarely strong enough to deter a bully and that this does nothing to encourage bystanders to stand up for a target or report it.

Finally, her last comment about teaching kids resilience is more important than teaching prevention has a bit of a sad ring to it. In the real world, prevention won't stop them all. In the end, you have to be your own best friend and stick up for yourself. Never believe what they say about you is true.


Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book
0 Comments

Man Videojacks His Own Mother In Sleepwalking Video

9/9/2012

0 Comments

 
Here's kind of a light-hearted example of a Videojacking and you can see why it's funny. A woman does a sleep walk dance; her son records it, puts it up on YouTube without her knowledge and then shows it to her.

The question is: if it were you, would you want the entire world to be watching this? It's gone viral on CNN. The mother looks amused about it and the son doesn't look as though he's doing this out of any malice--it's just funny to him. If she didn't want it up there, she could ask him to take it down. But once it goes viral, there is no "taking it down." It's endlessly shared online.

This is the problem with our technology trigger-finger culture. Putting up video without someone's knowledge or approval has become the common course of action, rather than the considerate choice, which would be to think first about how exposing someone so publicly might hurt his/her reputation - or provide fodder for more online ridicule. 

Ask your kids/students how they would feel if someone did this to them. Ask them if video like this could be used against them in any way? By their enemies? Ex-friends? Ex-relationships?

Any time you contribute anything to the Internet about someone else, it adds to their digital footprint. And some people do not wish to be so exposed at the expense of a joke.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book
0 Comments

Disparaging Rating Website: '509 Hoes' Targets Teen Girls

9/7/2012

0 Comments

 
Of course the perpetrator is anonymous. Why would anyone have the guts to put their name on this?

A cyberbully in Washington created a Rating Website called '509 Hoes Exposed' through a Facebook page posting pictures of girls without their permission. The purpose of a Rating Website is to denigrate someone's image online or unfavorably compare to another person's image. This perpetrator did just that, setting them up for critiques and suggesting they were promiscuous.

Though police got the first Rating Site taken down, the culprit set another one up just as fast--something police are now trying to get to the bottom of by getting a subpeona to find out the culprit's IP address.

Talk to your daughters about NOT posting any suggestive or sexy photos anywhere online--even privately to friends.  In this Internet age-everything can be used against them.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book
0 Comments

Imposter Profiles on Facebook Target 8th Grader

9/6/2012

1 Comment

 
Texas 8th grader Brianna Sosa, 13 decided to go to her local news channel and tell her story after a summer of vicious cyberbullying.
According to Valleycentral.com, "The teen said it’s been going on the entire summer and it all started over a boy.

Sosa claims several girls have been attacking her and even creating fake accounts on Facebook under her name.

'They are just saying a whole bunch of stuff about me, mean ugly mean stuff,” Sosa said. “And that same girl made a fake profile of herself telling everyone it's me.'"

The term is: Imposter Profile. It's one of several tactics that her cyberbullies used to denigrate her and break her down. They also participated in a Digital Pile On when they began bombing her Facebook page with mean and nasty comments.
"Brianna's mother tells Action 4 News she forced her daughter to delete her Facebook account when she found out about the alleged cyber bullying, and began documenting all the postings and alleged fake profiles."

The mother did the right thing, first by shutting down anything on Brianna that could be used against her and by starting a paper trail of evidence to show police or even attorneys, if necessary.

There is so much more one can do to prevent and combat these tactics before they happen to YOUR kid. Cyberslammed will show in depth how to do this, in a logical step-by-step fashion.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying.  Sale: $12.50 Buy The Book

1 Comment

Sexting: "I thought it was going to make him love me." 

9/4/2012

0 Comments

 
Picturephoto: 9news.com
A young woman in Denver learned what so many girls are learning the hard way. In her case, it's the classic scenario of what cyberbullying expert Nancy Willard calls "Experimental Sexting," which is completely different from "Cyberbullying Sexting." This is when teenagers are negotiating the terms of their relationship and both parties are willing to share Sexting photos.

This young woman, who was a teenager at the time, took nude photos of herself to cement the relationship with her then-boyfriend. As she said, "I thought it was going to make him love me." Then, when inevitably, the relationship ended and turned bitter, the ex-boyfriend showed the pics to everyone.

"I never thought they would get out," the unidentified woman said of the Sexting photos she sent to her boyfriend at the time. "I never thought anyone would see them."

The fall out was deeply painful. "I tried cutting myself. I tried [strangling] myself," she said. "I thought that was the easiest and best way for me to get away from everything. I never went to sporting events. I missed my junior and senior prom because I didn't want to be around everybody."


See more of the story here.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book

0 Comments

Imposter Profile to kick off the new school year

8/30/2012

0 Comments

 
School hadn't even started for this Arizona boy when an imposter website set up in the boy's name threatened to ruin his reputation. According to The Sahuarita Sun,  "The trouble started late Saturday night when the child checked his Facebook page and discovered the phony page. The still-unknown creator of the page had replaced the boy’s last name with a sexual euphemism and portrayed him as homosexual.

The page also said that the boy was planning to start a fight at school the following Monday. In addition, photos taken from the Facebook page of his mother were used on the fake page, including a photo of the boy as a baby being held by his grandfather.
"

To read the full story go here.

Two points worth noting here, no three--

1. Defuse The Words The most common insults that are used to cyberbully both straight and homosexual kids are the words "gay" or "fag"--and for girls, they are commonly "whore or slut."
Come up with what we call “pre-play” strategies with your teens for potential conflicts or ones that are already occurring. Pre-play the use of this word in a potential cyberbullying situation and devise a number of ways they can choose to react to it.  Bullies know these words hold power and hurt when wielded publicly. Teach teens to strip the power right out of these words. Now, how do you do that in a realistic situation? (Not some "the More You Know" type of public service announcement advice that make teens roll their eyes right out of their heads.)  Besides the classic advice of "ignoring it," I just looked to see if there were any verbal techniques to handling this--all I could find is a yahoo thread giving advice. Some of this advice just antagonizes the aggressor, some of it is just dumb, but I saw one or two lines in there that seemed realistic enough to demonstrate to the cyberbully that the teen isn't all that bothered by their use of the word (i.e. disabling the power.) Modifying one piece of advice in here, I especially liked the mature approach:

"Say 'Dude I'm not gonna play your game. Just because you say that I am doesn't mean i am. Sorry to disappoint you."

2. Ditch The Conflict "The page also said that the boy was planning to start a fight at school the following Monday."

The article doesn't give enough detail about this, but suffice it to say, the boy was fully in conflict with someone or a number of people offline before the incident happened. As we keep saying, the problem is the behavior, not the technology. No matter what age your teen or tween is, your teen is always going to encounter conflict with a classmate, a friend, a romantic partner, at some point.  And whatever conflict that starts offline has the potential to go online and vice versa. Our Imposter Website chapter provides specific conflict resolution exercises to help teens avoid the behaviors that get them enmeshed in this tactic.

3. Protect your online privacy "In addition, photos taken from the Facebook page of his mother were used on the fake page, including a photo of the boy as a baby being held by his grandfather."

Parents--we can't say this enough-you contribute to your own children's cyberbullying when you inadvertently allow the public to view photos/video or any other sensitive information about your child. If the cyberbullies can't find something on your kid, they'll look to see who else they can "lift" content from. So be vigilant about keeping your social media profile protected from public view.  Teach your kids to keep their online content (called their digital footprint) private and neutral. With their online comments, postings, video, photos, etc.— it’s all traceable—and highly usable to a potential cyberbully. Get them in the habit of self-monitoring everything they transmit through Facebook, Twitter, texting, etc. and see if any of their content can be used against them or can start or add conflict to something else.


Have a safe start to the school year.

Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book
0 Comments

Imposter MySpace profile: what to do?

6/1/2012

0 Comments

 


We have copied this from our recommended Internet Safety forum, ConnectSafely as well as the MOD's response to this young man as a way to take action in a similar situation.
Query

To make it short i am a 16-year old public school student who recently recieved a phone call from a friend saying that, someone has made a myspace as you.

So not to be a homophobe but it said all this stuff about how i was gay, not only that someone took the time to customize the myspace, with tons, and tons of half nude gay men. Now usually ive asked all my friends and nobody knows anything, i have 2 guesses about who it is but, they wont admit to anything.

Ive told my parents but it seems to have backfired, they just said tonight that im signed up for catholic school indefinitly. I dont want to go into a different school, but, by the time september rolls around and it hasnt disapear or has gotten worse,it may be the only solution.

I just wish that one of the 2 kids would have the balls to man up and say it was them it would save me alot of troube, because if i pick the wrong one to get in a fight with...well it would be a mess.

Also i was wondering if there is any legal consequences, my school really has no rules about this, im from philadelphia but now i live in this hick new jersey suburb, and i would just love to find out who this redneck is so i can set his cornfield ablaze and slash his tractor's tires,im only kidding. id really like some answeres/suggestions on what to do, thanks

***
MOD Response

I'm so sorry this has happened to you. It's definitely a tough situation to resolve because there are bullies and harassers out there who seem to have too much time on their hands and just create a new one as soon as a profile gets deleted. I suggest 2 things: 1) Start the process of getting your imposter profile deleted by emailing imposterreport@myspace.com with its URL and your situation or - better - just go to this page in MySpace's Help section to find out what they need to delete it. Give it a week or so because, with more than 100 million profiles, MySpace gets a few requests like this. Let us know (after you give the process a chance) if it drags on too long. 2) If you can, try to have a calm, unemotional conversation with your parents about how MySpace works - how anybody can create a profile about anyone for free in a very short amount of time, that this is usually just fine and a great vehicle for self-expression and keeping in touch with friends but can also go very wrong. For just a few examples of the downside, they click around these search results in NetFamilyNews. If they'd like, they can email us at admin@connectsafely.org (if they need this coming from someone besides you).

I think you're smart to try to do some info-gathering yourself, but I'm sure you're kidding about and already know that picking fights rarely works (physical ones, I mean, since somebody already started a digital fight, it appears). It's important to remember that the more strongly you react the more gratification a bully gets (which usually only perpetuates the problem, so it's a good idea to ignore his/her behavior as best as you can can while you're getting the profile taken down. Don't give this person any "power" or satisfaction with a big public reaction (not that you would).

I hope this helps a bit. All best,
Anne
--
Anne Collier
ConnectSafely co-director


Get all of the tactics in one book and prepare your child to recognize and defuse certain types of cyberbullying. Sale: $12.50 Buy The Book

0 Comments
<<Previous
Forward>>
    Picture

    Cyberslammed
    Hot Topics

    Cyberbullying tactics in the news, expert advice from contributors and prevention tips for parents, educators and kids.

    RSS Feed


    Blog Comment Rules

    All comments are pre-screened before posting. Anonymous comments will not be allowed. Keep it civil and on topic. No harassing or personal attacks; even if you disagree with something, please do it respectfully.

    Categories

    All
    After School App
    Anonymous Apps
    Anxiety
    Ask.fm
    Bulletins
    Burn Book
    Cell Phones/smart Phones
    Cyberbullying Policies
    Digital Pile On
    Ethel Is Hot (LOL)
    Expert Contributors
    Facebook
    Formspring
    Funstagram
    "Go Kill Yourself"
    Google+
    Hater's Club
    Homophobic Cyberbullying
    Identifying Cyberbullies
    Imposter Profile
    Instagram
    Kik Messenger
    Myspace
    Parent Contracts
    Rating Website
    Sexting
    Slut Shaming
    Slut-shaming
    Snapchat
    Streetchat
    Text Bombing
    Tween Novels
    Twitter
    Videojacking
    Whisper
    Yelp
    Youtube
    Zoom

    RSS Feed

    Archives

    February 2021
    October 2020
    July 2020
    April 2020
    February 2020
    July 2018
    December 2017
    October 2017
    January 2017
    November 2016
    September 2016
    July 2016
    April 2016
    February 2016
    November 2015
    September 2015
    July 2015
    June 2015
    May 2015
    April 2015
    January 2015
    November 2014
    October 2014
    September 2014
    April 2014
    March 2014
    February 2014
    January 2014
    November 2013
    October 2013
    September 2013
    July 2013
    February 2013
    November 2012
    October 2012
    September 2012
    August 2012
    June 2012
    May 2012