CYBER BULLYING

Print

ALL THE PAGES ON THIS BLOG SHOW YOU WHAT THIS IS ALL ABOUT

WHAT IT DOESNT SHOW YOU ARE THE CONSEQUENCES

DONT BE PART OF THE PROBLEM, BE PART OF THE SOLUTION

THIS BLOG IS DEDICATED TO THOSE WHO SUFFER IN SILENCE

BULLIES ARE COWARDS

They pick their targets carefully, mostly from the weak and vulnerable, they hunt in packs. They are able to keep their true identities secret, as they inflict misery on the lives of their victims, the twitter accounts mentioned in this blog are some of the most cowardly and destructive people you will ever come across, on Twitter.

@Angleseydrift  @deadkeneneddie @janerussellsays @mia_mir @bromsville @downedanother1 @aliesalie7 (alias @mfoglasgow)  @gojam_I’m_not @cantankerous71  @aphroditenight alias @jenniejenjen1 @madamemooch @luperthelupe @sadieksays @lordtat @_alldaylong @grannyofmax @carl2407 @siouxicooke @hughjardon2304 @we_are_the_mob @Markin_time @RailgunnerKid

Their ring leader

@theoutlawjimmy

Unlike the victims of traditional bullying, the targets of cyber bullies have nowhere to run. In the most serious cases, the harassment vis carried out via postings on social media sites, blogs and elsewhere on the internet and occurs 24 hours a day, seven days a week. Once posted, the attacks and abuse are there for all the world to see, and it is not uncommon for people who are not known to either the victim or the original perpetrator to join in.

  • DEFINITIONS OF CYBER BULLYING
  • Definition 1: when a person or group makes public posts in order to single out another user and insult, put down, tease, or otherwise abuse that user
  • Definition 2: when a person or group makes false or contrived complaints against another user in order to cause interruption or cancellation of that user’s membership/services on a web site; this can also include a person or group making posts or sending messages under that user’s name or provoking that user into a response that will violate a web site’s terms of use
  • Definition 3: when a person or group users another user’s private information to harm that user; this can involve hacking that user’s profile information or simply abusing that user’s trust after learning his/her secrets (which were given freely because that user thought the information was going to be safe)
It's only fair to share...Pin on PinterestEmail this to someoneBuffer this pageShare on FacebookShare on Google+Tweet about this on TwitterShare on LinkedInShare on Tumblr

4 thoughts on “CYBER BULLYING

  1. when multiple people are caught up in what seems to be a lot of insult trading, with all the appearance of two equally guilty fighting factions, plenty of innocent individuals will support someone they trust who follows or defends someone who is connected to a bully. Publishing names of those who are perhaps unknowingly supporting bullies will lead to isolating some very good people on Twitter from each other, including some who would absolutely never KNOWINGLY align themselves with any whose timeline contained evidence like that you’ve documented.

    Without anyone here naming anyone else, the timelines of those knowingly involved in bullying would show a glaring difference for all to judge. Now, I’m afraid the waters are muddied and many have been persuaded the bullying is equal on both sides.

    There is a lot at stake for all of us when a well known journalist who has supported child abuse and domestic abuse victims aligns so closely with someone whose closest associates online are threatening another person with literal castration and attacks with caustic disfiguring acids. I remain fairly confident Alison Boydel knows nothing of this backstory, has never read the timelines that far back, and is unaware of the chain of evidence concerning the extreme bullying, nearly to death, of Steve Messham. She will probably have seen only attacks on one of the few newsprint journalists who has covered Ms Boydel’s shared issues of concern. Please let the facts speak for themselves. There is not one single reason why the chain of evidence won’t tell the very clear story you are trying to tell here. Please let us not get in the way of ourselves as we simply place the established facts in order.

  2. As said many times before, you just have to look at timelines. Certain people spend ALL day on Twitter attacking people, That is ALL they do ALL day! They claim to be defending themselves, defending themselves from who exactly when they instigate everything?!

    Jimmy Jones,Driftwood, Mfo Kate, Jane Russell. Read their timelines. All you will see is bitching and argument after argument. Then read the timelines of the people they attack… spot the difference?

  3. I have been attacked systematically by Jane Russell accusing me of being a child molester and the old threats that they have my IP address and forwarding it to the police and so on.
    The true fact is that Jane Russell defends Jimmy Jones tooth and nail and I have noticed that their wording is in fact the same.
    Could this be the very same person with different identities.(surely not).
    I am a genuine victim of historic abuse and I have had my own site abused by this person.
    It seems that this is the same person so its time Wrexham police are told of the new attacks and so close after being arrested.
    Will keep all notified of what happens

Leave a Reply

Your email address will not be published. Required fields are marked *