Monday, September 24, 2012


Often our cyberpaths, once found out and/or exposed turn into a cyberbully to silence their victims. We have had threats of lawsuits against victims. (No predator really wants their lies or cover-up exposed!)

Other predators have threatened their victims' families, children, friends, jobs, reputations. Two even started hate sites about their victims, blaming them for everything. Both were even so childish as to think she was US!! (They only see their exposes and not the slew of the rest of them!!)

Our very first exposed predator, Charles 'Ed' Hicks still claims its "all false" and is back online doing the same all over again as well as being WANTED for jumping probation! In fact he tells new potential victims he's suing his ex-wives, Very Bad Men, Dr. Phil and the court system in Virginia for their supposedly false accusations and writing a 'tell-all' book with the 'truth!' LOL. Don't hold your breath, readers.

Of course there's the old "SHE'S JUST A SCORNED WOMAN" or "HE'S A JILTED LOVER" excuses in cyber affairs. Real life affairs use them too when the predator wants to play victim and make everyone feel sorry for him - including new targets. It's a joke. (Our advice? The minute you hear that 'scorned woman' defense? Make it your business to contact this 'scorned woman' or 'jilted man'! Someone with no secrets or destructive agenda wouldn't care if you spoke to their ex! Same applies to women predators.)

So let's find out - did your online love or cyber-friend turn into a cyberbully? Or were they a cyberbully all along?

Cyber-harassment, cyber-stalking, cyber-group bully, cyber-Gossip: all of these categories fall under the tactics of a cyber-bully.

Here is a quiz, take it and see it you’re a cyber-bully or if you've ever pulled some other cyber-bullying tactics during your time on-line.

Have you ever done this?

1.Signed on with someone else’s nic and password to get information.
While this does not seem like cyber-bullying if this information was to be used for ill-will, then, yes, it is cyber-bullying.

2. Sent an email or online greeting card from someone else’s account.
Again, some may claim that this is not cyber-bullying, if the email or online greeting is used to stalk or harass someone, then it falls under cyber-bullying.

3. Forwarded a private IM or email without permission.
This could be construed as a “grey” area. After all, it’s merely passing on a private email or IM and some would argue as fairly innocuous.

It boils down to intent.

Was the private conversation/email sent to someone or others with the intent to spread gossip or do harm? While most likely the victim may never know their communication has been forwarded to others, this is still harmful to that person. This is not direct cyber-bullying, more like back-stabbing cyber-bullying tactics.

4. Hacked into someone’s PC, website or blog
Not only is this cyber-bullying but also cyber-stalking and illegal. A 33-yr-old man in Florida was just sentenced to prison for 110 years after being convicted of hacking into MySpace teenaged girl’s PC’s. He threatened to harm to them or their families if they didn’t send him lewd photos.

5. Sent a virus or Trojan Horse?
This is malicious behavior with intent to do harm.

6. Posted rude, nasty or vicious (miscontrued) comments about someone online
Back to intent. Some blogs or forums can get heated and contentious but if someone’s intent is to solely post rude, nasty or vicious comments about another poster then this is cyber-bullying and cyber-gossiping.

7. Teased or frightened someone during IM chats
Teasing that goes over the line, that is meant to chip away someone’s self-esteem. The victim cries foul, the perpetrator claims “teasing.” Boo! (Not that kind of fright) Frightening someone can mean making threats to do harm.

8. Joined in a clique on a blog, website or chatroom that enjoyed driving other posters offsite
Not often talked about are the “community” blogs or chatrooms where “like-minded” posters form cliques. Part of their activities are to single out other posters for the sole purpose of driving the target off the site. This is often done in the guise of “for the good of the blog or chatroom.”

9. Accused someone of a crime online without proof
The person who is unfairly accused of committing a crime online usually has nowhere to turn. The accusers are for the most part, anonymous, the “accusation” gets spread without proof.

10. Followed someone across the Web
Kept track of other online posters, following them from blog to blog, chatroom to chatroom, site to stie. This is a form of soft-core Cyber-stalking. Not the same as showing up at their door but enough to creep anyone out. (Cyberpaths do this to see if any of their victims are "talking about them" to anyone else and then raging on as "being the victim" themselves!)

(many of our victims feel that they need to find out if their cyberpath is "doing it again" or "harming anyone else." EOPC does NOT consider that cyberstalking but accountability as well as compulsory in order to stop these predators from throwing one life away to start destroying another)

Did you answer "yes" to any of these?

Only you know the answer to that question. If you did, maybe it was a one-time occurrence. Only you know the answer to that one, too.

If you were guilty of any of these actions, you should think about changing your behavior.

Unless you want to be a cyber-bully.