Cyber stalker/ online bully
Famous cyber stalkers and creeps: Miss Pratt, in her early 20s, was bombarded with countless messages on Facebook, chilling threats on Twitter in which he vowed to kill her and 40 phone calls in one five hour period. Patick Macchione posted 27 videos online that were all directed towards Kristen Pratt, with some declaring his love but most were death threats or hints at violence. Macchione uploaded 27 videos on YouTube in which he stared into the camera with his shirt off and ranted, leaving his victim deeply disturbed.Unable to take it any more Miss Pratt called the police and Macchione was caught and jailed for four years - but due to time served he could be out in half that. She has now revealed how ‘the fear never leaves me’ and that she will looking over her shoulder for the rest of her life.
one particular Cyber Stalker who has ruined and has tried to ruin regular and famous people’s lives. Brianne Chantal has been accused on multiple accounts for ''Stalking'' and making false remarks on stars like Peter Facinelli, Jennie Garth, Kelly Clarkson and others. Now Nobody doesn’t know why Brianne Chantal has not be sued for Libel but on the other hand it is good to let her rumors build up so the authorities have more evidence against her when bringing her down.
one particular Cyber Stalker who has ruined and has tried to ruin regular and famous people’s lives. Brianne Chantal has been accused on multiple accounts for ''Stalking'' and making false remarks on stars like Peter Facinelli, Jennie Garth, Kelly Clarkson and others. Now Nobody doesn’t know why Brianne Chantal has not be sued for Libel but on the other hand it is good to let her rumors build up so the authorities have more evidence against her when bringing her down.
Government agency stamp
Government Agencies: U.S. Department of Education and Bureau of Justice .S. Department of Education Online Safety and Technology Working Group. These are different government agencies that are trying to prevent cyber stalking using these rules
1. Trust your instincts. If you suspect the stalker knows too much, it is possible that your phone, computer, email, driving or other activities are being monitored. Stalkers can act in incredibly persistent and creative ways.
2. Plan for safety. Navigating stalking is very difficult and dangerous. SAPAC advocates can help you plan for safety.
3. Take precautions if you have a "techy" stalker. If computers and technology are a profession or a hobby for the stalker, trust your instincts.
4. Use a safer computer. If your stalker has access to your computer, they might be monitoring your computer activities. try to use a safer computer when you look for help, a new place to live, etc. If may be safer to use a computer at a public library, community center, or Internet cafe.
5. Create new email or IM accounts. If you suspect that your stalker can access your email or instant messaging, consider creating additional email/IM accounts on a safer computer. Do not create or check this new email/IM from a computer the stalker could access, in case it is monitored. Look for free web-based email accounts and strongly consider using non-identifying name and account information.
6. Check your cell phone settings. If you are using a cell phone provided by the abusive person or stalker, consider turning it off when not in use. Also many phones let you "lock" the keys so a phone won't automatically answer or call if it is bumped. When on, check the phone settings; if your phone has an optional location service, you may want to swtich the location feature off/on via phone setting or by turning your phone on and off.
7. Change passwords and pin numbers. Some stalkers use survivor's email and other accounts to impersonate and cause harm. If anyone abusive knows or could guess your passwords, change them quickly and frequently. Think about any password protected accounts - online banking, voicemail, instant messaging, etc.
8. Minimize use of cordless phones or baby monitors. If you don't want others to overhead your conversations, turn baby monitors off when not in use and use a traditional corded phone for sensitive conversations.
9. Use a donated or new cell phone. When making or receiving phone calls or arranging escape plans, try not to use a shared or family cell phone because cell phone billing records and phone logs might reveal your plans to leave an abuse. Many shelters and hotlines have donation programs that provide new cell phones and/or prepaid phone cards to survviors of abuse and stalking.
10. Ask about your records and data. Many court systems and government agencies are publishing records on the Internet. Ask agencies how they protect and publish your records and request that court, government, post office and others seal or restrict access to your files to protect your safety.
11. Get a private mailbox and don't give out your real address. When asked by businesses, doctors, and others for your address, have a private mailbox address or a safer address to provide. Try to keep your true residential address out of databases.
12. Serach for your name on the Internet. Major search engines such as "Google" or "Yahoo" may have links to your contact information. Search for your name in quotation marks. Check phone directory pages because unlisted numbers might be listed if you gave your number to anyone.
1. Trust your instincts. If you suspect the stalker knows too much, it is possible that your phone, computer, email, driving or other activities are being monitored. Stalkers can act in incredibly persistent and creative ways.
2. Plan for safety. Navigating stalking is very difficult and dangerous. SAPAC advocates can help you plan for safety.
3. Take precautions if you have a "techy" stalker. If computers and technology are a profession or a hobby for the stalker, trust your instincts.
4. Use a safer computer. If your stalker has access to your computer, they might be monitoring your computer activities. try to use a safer computer when you look for help, a new place to live, etc. If may be safer to use a computer at a public library, community center, or Internet cafe.
5. Create new email or IM accounts. If you suspect that your stalker can access your email or instant messaging, consider creating additional email/IM accounts on a safer computer. Do not create or check this new email/IM from a computer the stalker could access, in case it is monitored. Look for free web-based email accounts and strongly consider using non-identifying name and account information.
6. Check your cell phone settings. If you are using a cell phone provided by the abusive person or stalker, consider turning it off when not in use. Also many phones let you "lock" the keys so a phone won't automatically answer or call if it is bumped. When on, check the phone settings; if your phone has an optional location service, you may want to swtich the location feature off/on via phone setting or by turning your phone on and off.
7. Change passwords and pin numbers. Some stalkers use survivor's email and other accounts to impersonate and cause harm. If anyone abusive knows or could guess your passwords, change them quickly and frequently. Think about any password protected accounts - online banking, voicemail, instant messaging, etc.
8. Minimize use of cordless phones or baby monitors. If you don't want others to overhead your conversations, turn baby monitors off when not in use and use a traditional corded phone for sensitive conversations.
9. Use a donated or new cell phone. When making or receiving phone calls or arranging escape plans, try not to use a shared or family cell phone because cell phone billing records and phone logs might reveal your plans to leave an abuse. Many shelters and hotlines have donation programs that provide new cell phones and/or prepaid phone cards to survviors of abuse and stalking.
10. Ask about your records and data. Many court systems and government agencies are publishing records on the Internet. Ask agencies how they protect and publish your records and request that court, government, post office and others seal or restrict access to your files to protect your safety.
11. Get a private mailbox and don't give out your real address. When asked by businesses, doctors, and others for your address, have a private mailbox address or a safer address to provide. Try to keep your true residential address out of databases.
12. Serach for your name on the Internet. Major search engines such as "Google" or "Yahoo" may have links to your contact information. Search for your name in quotation marks. Check phone directory pages because unlisted numbers might be listed if you gave your number to anyone.
By, Coliani Martinez
Taft High school
February,21,2013
Taft High school
February,21,2013