Category Archives: Cyber-bullying

Fourteen Year Old Charged With Cyber-harassment and Ethnic Intimidation

(Cross posted from Flightattendantfailures)

After an approximate 3-month investigation, a 14-year-old Northampton, PA student has been charged with cyber harassment and ethnic intimidation.  The 14-year old took a video of a 16-year old student eating lunch and posted it on Snapchat.  The 14-year old is White.  The 16-year old is Black.

Northampton County District Attorney, John Morganelli, said of the video;

“I reviewed the video today and I find it to be highly offensive and reprehensible. It depicts the 16-year-old minding his own business eating chicken wings while the 14-year-old records him and narrates it by describing the scene as ‘a N-word eating chicken.’

“The video demeans the 16-year-old with numerous uses of the N-word and references to being broke and on welfare. As bad as that is, the 14-year-old published the offensive video on social media including Snapchat that was viewed by numerous students as well as the 16-year-old male, …”

john-morganelli

Northampton County District Attorney John Morganelli at a news conference on Jan. 3, 2017. (Rudy Miller)

However, the District Attorney did not know of the video until after the 16-year old Black student was arrested and charged with simple assault, harassment and disorderly conduct.  That’s because while at a football game attended by both student, the Black student retaliated by opening a can of whoop-ass on the 14-year old.

Neither teen has been publicly identified by authorities.

D.A. Morganelli will allow the 14-year-old to seek an “informal adjustment” in juvenile court. If he completes the probationary requirements, he will not be charged with the crimes.

The 16-year old Black student will also be allowed an “informal adjustment.”  Morganelli said the black student had previously been the subject of discrimination from a group of students calling themselves “the rednecks.” He said he had a confederate flag thrown on him when he transferred to the school from out of state. Read the rest of this entry

Brave New Bullying—How to Protect Yourself from Cyberbullying

Excellent advice, and it encourages and inspires. “Starve them.” I’ve said the same thing. Thanks so much for this post.

Kristen Lamb's Blog

Screen Shot 2015-06-03 at 9.31.23 AM

I’ve talked before about how I train in Brazilian Jiu Jitsu. Recently, I have started assisting with teaching the kid’s class. It is shocking how much time we devote to training kids to stand up to bullies. Bullies, in my opinion, are among the lowest known existing lifeforms. I wouldn’t want to insult cockroaches and fleas by drawing a comparison.

I’d love to say that we leave bullies behind when we are no longer kids, but I think bullying just gets worse and harder to fight. As writers, we deal with bullies a lot. Tragically, I’ve received many messages from semi-suicidal writers who left their dream profession because they had the misfortune of landing in the crosshairs of cyberbullies and no longer could endure the stress.

I have a hard time blaming them. I know what it is like to be willing to do anything to escape the torment.

Kristen’s…

View original post 2,165 more words

State Dept. Employee Charged With Cyberstalking, Hacking and Extortion

Michael C. Ford thought he was sophisticated in how he terrorized young women on the internet. His methods however, resulted in federal charges of interstate threats, fraud in connection with computers, wire fraud, and cyberstalking.

Some of us are familiar with the threats, being on the receiving end. They are threats that unless you do what the perpetrator wants, that they will post your personal information on the internet. Many times, that is combined with claiming to have some type of “public document” and misrepresenting it so they can demean and mock.

Michael C. Ford

Michael C. Ford

Michael C. Ford however, did not use “public documents” as a threat against his victims. He hacked into protected accounts on the internet and obtained sexual photos of his victims. The 17 page warrant is an interesting read.

Ford used various Google email addresses to make contact with a woman, reported to be 18-years old, letting her know that he had obtained some sexually compromising photos of her, and that he also knew her real name and address. He demanded that she take videos of other girls undressing and/or nude, and send them to him or he would release the photos to her family and friends, and post them on the internet along with her personal information.

Read the rest of this entry

Illinois Does It Again – Arrests Two For Internet Harassment

cyber-harassment-provocationIn November 2014, we reported on the case of Steven and Joseph Rusinowski versus Robert DiDomenico. It was a case of cyberharassment gone wild. The case was originally filed in the Circuit Court of Cook County and on July 15, 2011, transferred to the federal district court for the Northern District of Illinois.   On October 2, 2014, the jury returned a verdict in favor of  Rusinowski and against DiDomenico, awarding Rusinowski $50,000.

One of the most important rulings in that case caught the attention of attorneys. The judge ruled that Illinois has long arm jurisdiction that applies to electronic harassment. That means that those who harass citizens of Illinois over the internet and/or telephone, no matter where the perpetrator lives, will have to defend in Illinois.

Brandon Wilson

Brandon Wilson

In February of this year, we reported on Brandon Wilson of Las Vegas, Nevada, who hacked, harassed, and pulled pranks over the internet. Evidently feeling comfortable behind his computer and using handles, he made a serious mistake — he made a call to Naperville, Illinois 911 and gave a false police report resulting in SWAT showing up to an innocent man’s house. Evidence was gathered from Wilson’s computers showing that it was not the only time that he made a false police report.

Wilson was extradited to Illinois.

Last month, KMOV news reported that a Collinsville, Illinois’ family was electronically harassed. It began with the family’s 12-year old son receiving threatening voice texts and harassment on Facebook. The 12-year old’s brother, 20-year old Devon Dean, tried to step in to stop it, but the person then made him a target.   The harassment included racially offensive comments. Read the rest of this entry

Cyberabusers

Paula-extrememeanThe other week, I was watching the Steve Harvey show and Paula Todd was a guest on his program. Paula Todd is a Canadian journalist, investigative author, broadcaster, and lawyer. She is a professor of broadcast journalism and digital media at Seneca College, and is a frequent speaker on cyberabuse, Internet culture, writing, reporting, literacy and freedom of the press. In 2014, she published the book, Extreme Mean: Trolls, Bullies and Predators Online.

An introduction of her book starts with;

“Cyberbullying, tormenting and revenge porn. Workplace digital skullduggery, online defamation and reputation annihilation. Cyberstalking, Anon hate and adults ridiculing other’s children. Digital sexual extortion, blackmail and predators on the prowl. Which kids, youth and adults are behind this negative online behaviour and what can be done to stop the abuse?”

For those who have Word Press blogs, you know that we can see referrals to our blog from other sites and emails. I don’t always check that section on the Admin side, but when I saw a significant increase in the number of views one day, I did check.

steve-harveySteve Harvey’s website linked to an article on Blackbutterfly7. Words cannot express how honored I was. Of all the sites on the internet that reported on the particular subject matter, Blackbutterfly7 was chosen. I didn’t publicly share that information. Why? Because for years, cyberextortionists stalk the internet looking for opportunity to disparage this blog and defame me. I did not want them trying to verbally vandalize Steve Harvey’s website and taking up the time of his staff to moderate their defamatory vileness. Read the rest of this entry

Tyler Clementi anti-bullying bill reintroduced in Congress

I hope that the Bill passes. Ashely Judd just had some things to say about cyberbullying. It’s getting national attention and it’s time for federal law.

The New Bullying Prevention

5211501985005568

reading6gif

“Schools need to take bullying, harassment and humiliation seriously, by making it official policy,” Jane Clementi said. “We support this legislation because no other student should have to feel the pain and humiliation that Tyler felt after he had been web-camed by his roommate.”


Legislation named after Tyler Clamenti was reintroduced in Congress. (Photo courtesy Facebook) Legislation named after Tyler Clamenti was reintroduced in Congress. (Photo courtesy Facebook) Lawmakers reintroduced a bill in Congress on Wednesday named after an 18-year-old Rutgers University student who committed suicide in 2010 after his roommate posted a video of his private romantic encounter with another man online.

The bill, the Tyler Clementi Higher Education Anti-Harassment Act, was introduced in the House by Rep. Mark Pocan (D-Wis.) and in the Senate by Sen. Patty Murray (D-Wash.). The only out lesbian in the U.S. Senate, Tammy Baldwin (D-Wis.), is an original co-sponsor for the Senate bill.

In a statement, Murray said the legislation is necessary because students need…

View original post 387 more words

19-Year Old Arrested For Cyberharassment

Brandon Wilson

Brandon Wilson

Online, he uses the handle “Famed God.” Brandon Wilson now has fame, but not in the manner he wanted.   Thursday, Wilson was arrested in Las Vegas, Nevada. He is now behind bars in Nevada waiting extradition to Illinois. In July, Wilson allegedly reported a murder to Naperville’s emergency 911 line. The SWAT team responded and found that the call was a false report.  Illinois prosecutors said there is evidence on Wilson’s computers that the July 10, 2014 “swatting” hoax was not the only time that Wilson made false police reports.

Swatting” is the new form of internet harassment which involves falsely reporting a dangerous situation to send the police to another person’s home. The false report can lead to deployment of a SWAT team.

Wilson is also said to have hacked the gaming consoles of two others and threatened to put someone “in debt for life” by accessing banking information. Illinois prosecutors said charges Wilson faces include two counts of computer tampering, one count of intimidation, computer fraud, identity theft and disorderly conduct. If convicted, Wilson faces up to 5 years in prison.

Read the rest of this entry

Another Cop Bashing Article

 

Hey @blanc_papillon7, aka Papillon_Jane.

You’ve just been Rick Rolled.

Laughing

The Tarnished History and Image of Police Departments

Long before there was a police force in America, there were sheriffs. The office of sheriff has its roots in 9th century England. According to the National Law Enforcement Museum, the early policing system was modeled after the English structure, which incorporated the watch, constables, and sheriffs (derived from the British term, “shire-reeves”) in a community-based police organization. The British system developed from “kin policing” dating back to about 900 A.D., in which law enforcement power was in the people’s hands, and they were responsible for their families or “kin.”) Early law enforcement was reactionary, rather than pre-emptive—the watch usually responded to criminal behavior only when requested by victims or witnesses.

Then called a “reeve,” what is now known as the Sheriff in America, was an individual originally selected by the serfs to be their informal social and governmental leader.   The reeve soon became the Kings appointed representative to protect the King’s interest and act as mediator with people.

In the United States, approximately 98 percent of sheriffs are elected. Good, bad or mediocre, what sets the office of sheriff apart from the police force, is that the sheriff’s office is accountable to the citizens through the election process. Read the rest of this entry

Jury Awards Victim of Internet Harasser $50,000

troll 3This is a case of cyber-harassment gone wild. The case was originally filed in the Circuit Court of Cook County and on July 15, 2011, transferred to the federal district court for the Northern District of Illinois.   There were numerous defendants named in the complaint, but the person of significant interest is Robert DiDomenico, a resident of Rome, New York. The other named defendants consisted of law enforcement officers, hospitals, and doctors, all of whom became involved in the lives of Steven and Joseph Rusinowski because of Robert DiDomenico.

Since July 15, 2011, the case had proceeded to summary judgments, some of which were denied, some granted, and some granted in part and denied in part. DiDomenico argued lack of jurisdiction. The court didn’t buy it. DiDomenico also played games about his “handle” The court didn’t buy it. Read the rest of this entry

The Psychology Behind Cyber-Harassers

9f931c04c54d20bb882e3d44a93b8703iPredator Inc. is a New York State based Information Age Forensics Company founded to provide educational and advisory products & services to online users, consumers and organizations on cyber bullying, cyber harassment, cyber-stalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., C.F.C., their goal is to reduce victimization, theft and disparagement from online assailants.

The organization has conducted studies and provides definitions and descriptions for those who use information and communications technology (ICT) to harm others.

An ICT Predator is a person or group that directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal gain.

Michael Nuccitelli of iPredator Inc, believes that cyber-harassers are usually motivated by a need for peer acceptance and/or power and control. The most malevolent feels minimal remorse for the harm they are inflicting upon the target. Read the rest of this entry

One Race – Human

This concerns race as others see it when they want to use it to mock and denigrate others — when they want to justify their racial bigotry — when they want to hate. Mostly however, it’s about ignorance. The inspiration for this post is this man;

shaun

Shaun King

Shaun King is an activist who came into the spotlight when he used Twitter to advocate for justice for Michael Brown, the unarmed 18-year old shot to death by Ferguson police officer Darren White. Shaun is now a writer for The Daily Kos. Supporting his presentations with facts, compassionate, and wise, Shaun is targeted by cyber-harassers.  They call him a “wigger” because they perceive his race is White.

Wigger comment

 

Urban dictionary defines “wigger” as

a white person who tries to emulate or acquire cultural behavior and tastes attributed to African-Americans.

It’s a blend of the word “white” and the “n” word.

There is an underlying subject here of allowing those of mixed race to define themselves, but that subject is effectively covered on Mixed American Life so I won’t go into it here.

If people are going to look at the color of skin and/or physical features to determine race for the purpose of judging others, (and targeting them for cyber-harassment), they might be surprised at their ignorance. The following famous people are bi-racial or multi-racial. Read the rest of this entry

WCTV Reports On A Cyber-Harrassing Blogger

We’ve seen it over and over again. When law enforcement releases information to the media, written autopsy reports are included, but never autopsy photos. We get the drawings of a body showing wounds, but not actual photos. At trial is where the autopsy photos are shown to the jury. When those trials are live-streamed, the public seldom sees the autopsy photos because they are not nice. Medical examiners explain the autopsy. The photos are not left to the opinions of lay people.

That however, did not stop a blogger from not only obtaining autopsy photos, but also giving her opinion about what they show and challenging the mother of the dead teen to prove her wrong.

The video on the link for WCTV reports that they reached out to the blogger, but have not received a response. I urge you to watch the video. It includes an interview with Kendrick’s mom. Jackie Johnston, Kendrick’s mom, told WCTV that she blocked the person with the blog on Twitter after constant harassment, and doesn’t know why the person is attacking her family. Maybe Blackbutterfly7 can tell her why.

17-year old Kendrick Johnson was found dead on January 11, 2013, in the Lowndes High School gymnasium in the State of Georgia. His body was rolled up in a gym mat. A preliminary investigation and autopsy concluded that the death was accidental. Johnson’s family had a private pathologist conduct another autopsy which concluded that Kendrick died from blunt force trauma. Most people first hearing about the case, and seeing the photos of the gym and the mats, realized that Kendrick’s body could not “fall” into a tightly rolled up gym mat that was closely placed beside other gym mats.

WCTV reports:

“Valdosta, GA – On January 14th 2013, three days after Kendrick Johnson was found inside a rolled up gym mat at Lowndes High School, the Georgia Bureau of Investigations did an autopsy on the teen’s body. Jackie Johnson says last Thursday, those autopsy reports showed up on the website Re-News it, a blog that anonymously posts evidence and theories on national stories, what else they found, came as a shock.”

photo 21It’s only anonymous to those who have not been harassed and threatened by the cyber-extortionist cult. The blogger is Vicki Pate, sometimes spelled “Viki Pate” and on Twitter, now spelled “Vickie Pate.”

Pate got the autopsy photos and claimed that attorney Benjamin Crump lied about the independent autopsy. She is associated with others who publicly announce their mission against the Black Grievance Industry, which they refer to as the “BGI.” Read the rest of this entry

DOJ Responds To “Leaks” In Darren Wilson Investigation

michael-brown-police-shooting

Michael Brown’s mom at her son’s funeral

I choose not to use the phrase “Michael Brown case.” The reason why is because Michael Brown is not under investigation. He is deceased and thus, there is no case that can be filed against him. The investigation is into the acts of Darren Wilson, the Ferguson, MO police officer currently on paid vacation because he killed Michael Brown.

A “leak” that Darren Wilson testified before the grand jury came out weeks ago. Now, the St. Louis County’s Medical Examiners autopsy has become public, followed by another “leak” of Darren Wilson’s side of the story. Some are trying to mold Wilson’s story into their interpretation of Mike’s autopsy.

140826071548-01-brown-funeral-0826-horizontal-large-gallery

Michael Brown’s dad at his son’s funeral.

Those who know me no doubt know that I seldom get involved analyzing autopsies. I keep it simple, only discussing those things that are logically understood. In our circle of warriors are nurses, and they are able to explain medical findings in laymen terms.

That is why I can’t help but gag when people who have no education in medical science, no education in criminal forensics, and don’t know their right from their left, purport that Mike’s autopsy confirms Wilson’s story.

(I say they don’t know their right from their left because, after the independent autopsy was released showing that Mike was shot on the right side of his body, those supporting Wilson circulated an autopsy photo that had the shots on the left side of Mike’s body.)

Oh – and let me add that they have no logic whatsoever. Effectively, we don’t need to know the details of what happened in Wilson’s vehicle because what happened there did not result in Michael Brown’s death.

It was after Wilson got out of his vehicle and shot at a fleeing Mike, that we question if it was reasonable. Once Mike ran, Wilson’s self-defense claim goes out of the window – PERIOD. 

By all eyewitness accounts, Wilson shot at Michael as he ran away, and continued shooting him as Michael stopped running, and turned around with his hands in the air surrendering.

Please allow me to add this; the leaked side of Wilson’s story is that he was unable to fire his gun more than twice while in the vehicle, because Mike was holding down the mechanism to prevent it from firing. Logically, that sounds like a young man more interested in not being shot again, rather than taking the gun.  Even the leaked story that Michael hit Wilson so hard to almost knock him unconsciousness indicates that Michael was fighting for his life — not for the gun to end Wilson’s life.

Read the rest of this entry

Sheriff Jeff Boyd of Rock Island Illinois Guilty of Cyberstalking

48 year old Rock Island County Sheriff, Jeffrey Boyd, was up for re-election. He has now withdrawn from the race.

Rock Island County Sheriff Jeffrey Boyd resigns On September 11, 2014, Boyd pled guilty to one count of attempted official misconduct based on attempted cyberstalking. As part of his guilty plea, he resigned and forfeited the pension he earned during his term as Rock Island County Sheriff.

The case was referred from the Illinois State Police to the Public Integrity Bureau for the Illinois Attorney General’s office. It was prosecuted by the Public Integrity Bureau Chief David Navarro and Bill Elward of the Trial Assistance Bureau. Read the rest of this entry

Frederick Leatherman’s Blog was Hijacked

I was alerted that Frederick Leatherman reported that his house was broken into, and someone obtained the access code to their router and accessed his and Crane-Station’s computers. Whomever it was changed the password to his blog and he could no longer log in.

http://frederickleatherman.com/2014/09/07/having-a-wonderful-advemture-from-somewhere-on-the-road/

I do not use the word “hack” because that sounds as if someone actually hacked into the server side to get into his computer. That’s difficult to do with Word Press blogs because the hacker would have to actually hack into Word Press servers then find the blog that they want to access.

What I actually think happened is that after breaking into Fred’s house, the perpetrator accessed Fred’s computer. If he was already signed into Word Press, the person was able to change the password on his blog. The most concerning thing however, is that if the person gained access to the administrative side of Leatherman’s blog, that person might have obtained the email addresses of those who submitted comments and might attempt to sign into and change the passwords on Word Press accounts. Read the rest of this entry

It took 8 Months of Investigation, But Man Is Arrested for Cyber-bullying

CYBERSTALKERS-CYBERSTALKING-PREVENTION-INTERNET-SAFETY-IPREDATORIt involved 38 alleged victims across Canada, the United States and the United Kingdom.  Investigation took 8 months and involved law enforcement agencies in B.C. Ontario, New Brunswick, Halifax, the State of Michigan and in the U.K., Hertfordshire and London.

Robert Campbell, (42) of Ottawa, Canada, now faces;

 

  • 27 counts of criminal harassment.
  • 85 counts of defamation libel.
  • 69 counts of identity fraud.

A victim said that Campbell posted fake, defamatory social media profiles for him, his daughter, and his mother. He worried that his children would be hindered in applying for school because of the fake profiles.

The posting of profiles and social media pages impersonating others, is considered identity fraud. Read the rest of this entry

Friday Fill-Up

It was 1975. I purchased my first car. It was a 1971 Toyota. Those were the days when American made cars were boats. My little Toyota looked like a toy on the streets among them. It was mustard yellow.

ToyotaMy husband decided to give me lessons in knowing car parts. He always had a car, and I had not paid much attention to when he got fuel, changed the oil, etc.

Taking care of the car had always been his responsibility and he was good at it. He thought that since I now had my own car, that it was time I learned at least a little about them in the event anything happened on the road when we weren’t together. Read the rest of this entry

Friday Fill-Up -Standing Strong Against Cyber-Extortionists

Black butterflyNothing would give me more pleasure than to share some personal things with you about myself. I’m restrained from doing so because of people who take anything I say, twist it, and then go on doxxing expeditions.   Be aware – any attempts of defamation that can only point to “evidence” written by the person or one of their minions.  Their evidence cannot be trusted.

Ask them how they know the name they purport is the person’s real name, and they won’t be able to point to any “evidence” other than what another one of them has written.

Well, I’m going into this because since one cyber-extortionist was unsuccessful in his copyright infringement claims, and unsuccessful in getting a court ordered restraining order against a person he harassed, numerous people are being attacked for associating together. Read the rest of this entry

%d bloggers like this: