Civilination

Taking a stand against online harassment, character assassination and violence

  • Home
  • About
    • In the News
    • What We Do
  • CiviliNation Academy
  • Resource Center
    • Resources to Protect Yourself Online
    • Attorney List
    • Anti-Harassment, Civility & Associated Research Organizations
    • Fact-Checking Sites
    • News & Media Literacy, and Misinformation & Disinformation Resources
    • Privacy Rights Organizations
    • Recommended Books
    • Investigative Journalism Organizations
    • Using SecureDrop To Communicate with News Organizations
    • Ethics
    • Barometer
  • News

Defamation Victim Janice Duffy, Ph.D. Says that Online Complaint Sites Can Ruin People’s Lives

May 10, 2012 by CiviliNation

As a result of posting on what at the time she thought was a legitimate complaint website, with other members of a support group for people at a vulnerable stage in their lives, Janice Duffy, Ph.D. became the victim of online attacks and defamation that destroyed her reputation and career. After numerous attempts over a two-year period to have the damaging and false information about her removed from the site and from Google’s search index were unsuccessful, Janice decided to fight back and took the controversial step of suing Google Inc. and Google Australia in February 2011. Her case is still ongoing.

Initially a reluctant anti-cyberbullying advocate, Janice now publicly speaks out about the harm and long-term repercussions that online reputational smears can have on individuals’ lives.

Janice earned her Ph.D. in the Department of Politics and The National Centre for Education and Training on Addiction at Flinders University and her Bachelor of Arts (Honours) with a double major in Politics and Sociology from Flinders University, Australia. A prolific writer and speaker, she is the author of several published conference papers, refereed/peer-reviewed publications, technical reports and monographs, research reports, chapters in edited books, evaluation reports and conference presentations, with an emphasis on public health and addiction.

CiviliNation: You have been on the receiving end of severe reputational smears and defamatory attacks, including accusations of stalking, blackmail, computer hacking and fraud. Please share your story with us.

Janice Duffy: I really appreciate the chance to share my experience with CiviliNation, but I admit there was a time when I did not want to speak about it. I actually feared my case becoming public and only started talking about it when it became clear I couldn’t evade the media any longer. I suppose it’s to be expected that one cannot quietly sue a company such as Google and go unnoticed. My attorney filed proceedings in February 2011 and I refused to comment publicly until November of last year. When I became aware that the media had obtained the court’s permission to access the case files, and the defamation against me was still highly visible on Google, I decided to start a blog in order to share my story. I have subsequently provided comments to the media in Australia, but I contacted CiviliNation because doing so is a chance to possibly provide benefit to others on a broader and international scale. Hopefully I will be able to share news of a successful outcome to my case some time in the future.

As is typical in many other situations, I was cyberbullied by a person or persons unknown to me. I was part of an online support group that posted about scam artists taking advantage of vulnerable people on what we thought was a legitimate website, Ripoff Report. Because I wasn’t aware of the actual nature of how Ripoff Report does business, I registered on the website using my real name and identifying information. I registered using my real identity because I believe it is cowardly to publish material that is critical about a person or a business on an anonymous basis. However, unbeknownst to me at the time, the website passes on the identities of people who write complaints directly to the businesses and/or individuals that they have made complaints about. Ripoff Report’s owner admitted this in a disposition in the U.S. case The Matter of Federated Financial Services, Inc. vs. Xcentric ventures, LLC, Ed Magedson, et al Case No. CACE0401772 (21) Broward County 17th Judicial District of Florida, and the Honorable Charles R Norgle, the judge in a later case George S. May International Company, Plaintiff, v. Xcentric Ventures, LLC,Ripoffreport.Com, Badbusinessbureau.Com, Ed Magedson, Various Abc Companies, Jane and John Does, Defendants. No. 04 C 6018. United States District Court, N.D. Illinois, Eastern Division, 2004, accepted evidence in discovery that the site tried to sell off lists of consumers to class action attorneys for $800,000 USD.

As a result of Ripoff Report’s common practice of passing along the identity of people who make reports on its website, many people like me are cyberbullied as a “revenge attack” for posting business reviews. My unlisted mobile number was published on Ripoff Report, and I know the only way my attacker(s) could have obtained it was from my login details to the website, which the site shared. Ripoff Report also published a post that urged readers to harass me, which lead to me receiving threatening phone calls. It has been a nightmare and, more than four years after the material was first published on the site, it is still ongoing.

Not surprisingly, Ripoff Report doesn’t remove material even when it can be proven false or defamatory, nor even when, as in my case, a user is cyberbullied as a result of submitting a complaint. There is a recent Florida case in which the judge wrote:

“The business practices of Xcentric, as presented by the evidence before this Court, are appalling. Xcentric appears to pride itself on having created a forum for defamation. No checks are in place to ensure that only reliable information is publicized. Xcentric retains no general counsel to determine whether its users are availing themselves of its services for the purpose of tortious or illegal conduct. Even when, as here, a user regrets what she has posted and takes every effort to retract it, Xcentric refuses to allow it. Moreover, Xcentric insists in its brief that its policy is never to remove a post. It will not entertain any scenario in which, despite the clear damage that a defamatory or illegal post would continue to cause so long as it remains on the website, Xcentric would remove an offending post.”

There is a financial reason why the site operates this way – it can earn substantial revenue from businesses that pay to “rehabilitate” their reputation instead of simply  removing this false or harmful material. Ripoff Report charges an upfront fee of between $7,500 and $20,500 plus a monthly subscription for their “Corporate Advocacy Service” (see  Asia Economic Institute et al v. Xcentric Ventures LLC et al).

Websites such as Ripoff Report have a high page rank on Google and use this prominence to generate further revenue for the “rehabilitation” of reputations. I’ve summarised the business practices of Ripoff Report on my blog. Unfortunately, according to a blog post by Google’s SEO expert Matt Cutts, Google takes the position that “pretty much the only removals (at least in the U.S., which is what I know about) that we do for legal reasons are if a court orders us.”

Although the allegations published about me are of a serious nature, they are not uncommon on the website. Ripoff Report also publishes offensive and/or defamatory material about individuals and business owners, including extremely sick racial slurs as well as accusations against people of paedophilia and murder.

The very public nature of cyberbullying increases the personal and professional devastation because it is on view to the world. Although research on the psychological impact of cyberbullying is still in its infancy, studies have identified high rates of post traumatic stress disorder, suicide ideation and clinical depression among victims. This is compounded by the powerlessness felt by victims when attempts to get the material removed are repeatedly ignored or refused. The distress experienced by victims is evident in the comments on the Remove Rip Off Report From Google” petition.

CiviliNation: What effect have these attacks had on you professionally?

Janice Duffy: The effect on my life has been profound, and at this point I feel that my career has been destroyed. After my former employer found the defamatory material about me online, I tried to keep my job – I loved working in the field of health research and was good at it – but because both Ripoff Report and Google refused to remove the material,  my work environment became so uncomfortable and pressure-filled that I felt I had no choice but to leave my position before I was let go. I resigned with a confidentiality  agreement in place that prevents me from going into more details about what happened at my previous employer, but I have no doubt that the outcome of me leaving would have been different if not for the publication of the defamatory material.

I have now been unemployed for 21 months and there is no point in applying for a job while the material remains online. I am facing a long legal battle and I will have to evaluate the damage on my career when I am vindicated. I fear that the damage is irreparable. Now I spend the majority of my time doing research and gathering evidence for my legal case. While I feel that I am lucky that I live in Australia where the law offers a stronger remedy for defamation (as opposed to the U.S. in which both websites and search engines are protected by Section 230 of the Communications Decency Act), it is frustrating because, but for having to fight to clear my name, I could be spending valuable time conducting much-needed health research.

It is difficult to understand why defamatory or offensive content on a website or search engine isn’t removed by the site owners. The effort required to remove it is negligible and it takes only a few keystrokes. Neither Ripoff Report nor Google remove material, but instead hide behind the U.S. Constitution’s First Amendment and cite “freedom of expression” as a rationale for refusing removal requests. Yet the use of this doctrine to justify the non-removal of defamatory and/or damaging material is an aberration because, in its original form, “freedom of expression” was never intended to infringe on other fundamental rights. Interestingly, both Ripoff Report and Google claim they are not publishers of material in the legal sense yet also claim that the material they publish is protected by freedom of speech.

CiviliNation: What effect have these attacks had on you personally?

Janice Duffy: One effect of cyberbullying is that victims become reclusive because the material is on view to the whole world. My name appears at the top of a Google search couched in terms such as “ripoff,” “fraud,” “scams,” “she hacked my computer,” and “she stalked me on the computer”,  among others. As a result, I am wary when I meet new people, wondering if they have read these lies made about me. I was a person who in the past has always enjoyed socialising, but now spend much time alone, afraid of what others might think.

When you are the victim of cyberbullying, your are harmed in several ways. One is being the target of actual attacks, which can blindside you. The other is having to endure the hit to your self-confidence and sense of safety, both which can take a long time to rebuild.

CiviliNation: You finally decided to take legal action to help clear your name.

Janice Duffy: For almost two years, I pleaded with and notified both Ripoff Report and Google to remove the defamatory material. Both Ripoff Report and their lawyers ignored my pleas to remove the material, and Google took no action either. Interestingly, Google removed some of the damaging material from their Australian domain AFTER I filed proceedings, but a link to most of it was re-indexed on Google after I complained publicly that Google removed my blog from the search results for my name.

For me, filing a lawsuit was absolutely a last alternative. I took legal action because I just wanted to be able to work, and the defamatory information online was an impediment to finding employment in my field.

I have been criticised for only suing Google rather than Ripoff Report and other search engines as well, but the aim was always to get the defamation removed from view and more than 95% of Australian searches use Google. The other search engines have been more willing to respond to take-down notifications; Bing and Yahoo have removed the defamatory material from their Australian domains and my lawyer and I have notified them to remove it from all domains accessible in Australia.

Honestly, at the time I did not think the case would go to a trial because Google Australia resolved a similar case in 2008 in which the company removed the defamatory material after the first directions hearing and the matter was resolved. However, it appears that the plaintiffs in that particular case were the owners of a lucrative Australian business and therefore had the financial resources to go to a trial.  I doubt that Google believes that an ordinary person would have the financial resources to continue litigation and perhaps in my case their legal approach is to try to make my case financially insurmountable in the early stages. Nevertheless for two reasons I was lucky, at least from a legal perspective. Firstly, according to Australian defamation laws, any person or organisation can be found liable if they contribute to the communication of defamation. Secondly, I hired experienced lawyers who are willing to go the distance with me. Even so is it a long process and my dwindling resources are up against those of a multi-billion dollar company.

CiviliNation: Do you believe that employers have any responsibility in checking the accuracy of negative information found online before using this information in making employment hiring decisions?

Janice Duffy: I absolutely believe that employers should check the accuracy of negative information, but I believe that even then it would still detrimentally affect a person’s chances of obtaining a job. Unfortunately negative material can have a subliminal effect on employers’ perceptions, and this is more pronounced in a tight labour market.

Employers see the high page rank of websites on search engines and automatically think the material must therefore be true. It took me many months of research to figure out the way in which both Google and Ripoff Report interact – it is all about the advertising revenue – but an employer is unlikely to have the time or motivation to investigate the truth or falsity of allegations made on websites and find it easier to just employ someone else.

On a positive note, I think people in general have become savvier about monitoring their online reputation in recent years. The Australian government runs an advertisement designed to alert younger people to the potential impact of putting material on Facebook, and a whole industry, namely search engine optimisation, has developed to assist businesses with their web presence. Nonetheless, once the material is on Google it is almost impossible to get it removed and I doubt that employers are aware of this. It is easier for them to assume it is correct or incorrectly believe the potential employee does not care because they have not succeeded in getting it removed.

CiviliNation: Do you believe that search engines, social networking and other websites have any responsibilities to help stem online attacks?

Janice Duffy: In a general sense I believe that these websites cannot monitor everything that is posted, but most of the damage could be mitigated if they removed offensive material upon notification. This would certainly stem the continuation of online attacks. Search engines and social networking sites use the excuse that it is too expensive to remove material on demand and/or that they should not be required to arbitrate about the truth or false nature of material.

But both Facebook and Google enjoy a very high profit margin and these profits are derived from advertising. Therefore, in many cases they are earning money from web pages that contain the damaging material. Ripoff Report and Google both share the advertising revenue derived from putting ads on the website, including the pages that defame me.  The ability to make a decision about whether material is likely to cause harm is not rocket science and as I noted above, it only takes a few keystrokes to remove it.

Maybe these companies should use their vast financial resources to fund staff positions to act on removal requests.

CiviliNation: What is your response to people who claim that online reputational attacks against adults are rare and not something that most people need to worry about?

Janice Duffy: I think that proportionate to total Internet usage online reputational attacks are rare, but it is certainly something people need to worry about. From a personal perspective, if it happens to them their lives will be destroyed. There is often no warning that this can happen, and not all victims of cyberbullying know the perpetrators, making defending one’s self even harder. In my case I simply submitted a consumer report on a website I thought was legitimate and several years later I am still fighting to clear my name.

CiviliNation: Why do you think there is a frequent lack of understanding by law enforcement and the legal system about the depth and breadth of the problem of online attacks and cyberbullying against adults?

Janice Duffy: I think the lack of understanding is due to a number of issues. Technology has grown at such a fast rate and cyberbullying is a fairly new phenomenon. It is hard to understand the impact of actions that are enacted from a distance. It is difficult for many to believe that actions that do not entail physical proximity can have such a devastating effect on victims.

I don’t think either law enforcement or the legal system recognises the sheer reach of the Internet or the power that it has over every aspect of daily lives. For example, Googling a potential employee is now commonplace irrespective of whether it contravenes local laws and a report on pre-employment screening on the Internet noted that over half of applicants were not hired as a result of information found on a search engine.

Google gives Ripoff Report a high page rank, and because in Australia Google is considered to be a trustworthy company, the perception is that the material is true because it is published in a prominent position on Google – and this ends up affecting every area of one’s life. In my particular situation, I received threatening phone calls because a post on Ripoff Report urged readers to harass me. The threats to kill my pets were really frightening and I actually tried to obtain assistance from the Australian Federal Police and from the American Embassy, but was told nothing could be legally done.

Some people hold the view that the victim caused the behaviour by simply using the Internet.  This thesis of  victim blaming as a way to account for the existence of social problems was first postulated by Ryan in 1971. This is the same archaic argument that has been used against rape and crime victims. My experiences thus far indicates that this perspective is prevalent among some members of the legal and law enforcement communities with respect to the problem of cyberbullying.

Although forensic law enforcement is a rapidly developing occupation, many traditional law enforcement officers do not have the skills to investigate these crimes and it is easier to put cyberbullying in the “too hard to deal with” basket.

CiviliNation: What role do you believe the law should play in helping reduce online attacks and adult cyberbullying?

Janice Duffy: I think that there should be laws that allow victims to sue the website, search engine, or social media company that causes harm. One excuse I’ve heard used by Google is that they provide their products free to users. But Google and Facebook are profitable corporations and should be regulated by the same laws that provide other consumer products, even if the victim is not directly engaged in a transaction. If I am walking through a mall and a brick falls on my head the law says I can sue the company that owns the mall. This same legal approach should apply. In Australia two recent court decisions have put responsibility onto search engines for their search results: The Full Bench of the Federal Court found that Google was responsible for the advertisements it provided on its search results (Google has  lodged an appeal to the high Court) and Yahoo was found liable in a defamation case against a local man (Yahoo has not appealed this decision).

Privacy legislation in the UK and Europe is undergoing revision, and the role of search engines and social media websites to protect people is an integral aspect of proposed changes. This is a positive development. However, in the U.S. Section 230 of the Communications Decency Act is a significant impediment to legal protection from cyberbullying because even if the perpetrators   of the statement are successfully sued, the damage continues if it is not removed from websites and search engines. While it may be possible to compel Google and Facebook to remove material by court order in non-U.S. nations, American websites can successfully claim protection under the CDA. In fact Ripoff Report taunts victims with this law, and U.S. courts have upheld its right to publish material that is used to cyberbully victims.

One possible approach to dealing with the issue of online defamation may be the creation of independent arbitrators that handle such matters. A couple of years ago in Australia the idea of appointing an Internet ombudsman was discussed. This stemmed from a situation where a local Aboriginal man complained to the Australian Human Rights Commission about extremely racist material published on the website Encyclopedia Dramatica. Google removed the links as a result of this complaint, but now the links are unfortunately back online. Like Ripoff Report, Encyclopedia Dramatic used a tactic of individual attacks to dissuade complaints. Unfortunately the idea of an ombudsman did not progress in Australia, but I believe a similar idea of search engines and websites agreeing to remove material has been investigated in the UK.

Most victims of cyberbullying (including myself) do not want to take legal action and would be happy to just make it “go away” more easily. The difficulty with the international nature of the Internet is finding a way to stop the harassment and establishing a program using independent arbitrators is a viable solution.

Additionally, legislation to update privacy laws in Europe and the UK in line with the new requirements of technology offers promise for victims of cyberbullying. Legislation and government proposals include a mechanism to facilitate the removal of material from search engines. Most victims simply want one action to occur – to make the cyberbullying  stop and remove it from public view. The search engines have the ability to make this happen, but they choose not to use it unless forced by a court order. This fact was not lost on the British House of Lords and the House of Commons, which stated:

“Google acknowledged that it was possible to develop the technology proactively to monitor websites for such material in order that the material does not appear in the results of searches. We find their objections in principle to developing such technology totally unconvincing. Google and other search engines should take steps to ensure that their websites are not used as vehicles to breach the law and should actively develop and use such technology. We recommend that if legislation is necessary to require them to do so it should be introduced.”  

The recent European proposals to harmonise privacy laws across the 27 EU nations included a law termed “the right to be forgotten.” This law requires search engines and websites to delete information upon a request from a consumers, or risk a fine of up to two per cent of a firm’s global turnover. Although ratification of this bill by the European national governments could delay its implementation, it is a really promising legislative development and has the potential to mitigate the harmful effects of cyberbullying.

 

Filed Under: Cybercivility Tagged With: Cyberbullying, Cybercivility, Defamation

El Confidencial

April 20, 2012 by CiviliNation

CiviliNation founder Andrea Weckerle is quoted in El Confidencial story Lo que aprendí cuando me amenazaron en Internet.

Filed Under: In the News Tagged With: Cyberbullying, Cybercivility, Defamation

Rexxfield Founder Michael Roberts Shares His Personal Story of Defamation and Explains How His Company Helps Other Victims Regain Their Good Name

April 10, 2012 by CiviliNation

Michael Roberts is the Founder of Rexxfield, a company that assists and supports individuals who have been the victims of online lies, defamation, and privacy invasion by “rendering all reasonable assistance in order to have deceptive materials retracted or hidden from the public domain and the victims’ good name and reputation restored.”

He understands first-hand what being a victim feels like, having been on the receiving end of character assassination and defamatory attacks by his ex-wife, who is now in prison for a murder conviction, and others associated with her case or seeking to capitalize upon it.

CiviliNation: Tell us about your company Rexxfield and what let to its creation.

Michael Roberts: To understand why Rexxfield was created, you first need to understand what happened in my personal life, which is a long, convoluted and incredibly complicated story.

In December 2000, my now ex-wife Tracey Richter murdered 20-year-old Dustin Wehde in what was described by one prosecutor as an execution-style killing . She claimed self-defense, and despite contradictions in her testimony and evidence to the contrary, I believed her – perhaps because at the time I couldn’t emotionally fathom the fact that she actually murdered someone in cold blood. Then in early 2004, after I discovered her affair with another man, she attempted to kill me, first by drugging me and then, when I was semiconscious, by suffocating me. By the grace of God I survived the ordeal but to this day I’m still struggling from the injuries sustained from the attempt on my life. Thankfully, the Iowa Department of Justice, crime victims compensation fund paid for my associated medical expenses.

I finally wised up, saw her for the person she really is, and filed for divorce. But notwithstanding the evidence that she had killed one man and attempted to murder another, the Family Court judge in the subsequent divorce case gave primary care of our children to my ex-wife time and time again. This just goes to show that domestic relations courts are seriously flawed and that some judges make highly questionable decisions that have serious and negative repercussions on innocent lives.

Finally, in the summer of 2011, 10 years after killing Dustin Wehde, Tracey was finally arrested and charged with first-degree murder.  She was convicted unanimously by a jury of 12 on 7 November and is now in prison serving a life sentence without the possibility of parole.

Fortunately, after her incarceration, I was able to obtain primary custody of our children.

What does all of this have to do with the creation of Rexxfield? Everything, I would say.

Right after I filed for divorce in 2004, my ex-wife began a relentless Internet smear campaign against me, my business, and any individual that offered any kind of support to me, whether financial, emotional, vocational, or otherwise.

My business at the time was mile2, and the relentless attacks on my reputation and, by association, my business, brought mile2, which designed, developed and delivered information security training and information assurance services, to its knees. I was forced to sell for a fraction of what it would’ve otherwise been worth had it not been for these attacks. Even then the flaming aspersions continued until July 30, 2011, the day Tracy was arrested on first-degree murder charges.

She is actually now a 3 times convicted felon; in 2009 she also received felony convictions for both perjury and fraud by trials in Iowa and Nebraska, respectively.

Rexxfield was founded in 2008 in response to understanding what character assassination and unfounded attacks on businesses can do. I had experienced first-hand the devastation that these types of attacks can cause and that, in most cases, neither law enforcement nor the civil authorities and judiciary can relate to this issue.

Instead, what I’ve frequently found is that the very entities that are supposed to help people who have been wronged seem to take the position that “sticks and stones will break your bones, but names will never hurt you”. In my case, I had to fully prove that all of these anonymous attacks in fact originated from my ex-wife before anyone would even listen to me. So, in the process of having to convince the legal system to take my situation seriously, I developed some proprietary techniques, technologies, and methods for getting behind the cloak of anonymity in ways that ultimately helped inexorably link Tracey to the poison-penned attacks.

Unfortunately my breakthroughs were too little and too late to prevent the damage to my own name and business, but as I started blogging about my experiences I found myself being inundated with desperate cries for help. These requests ranged from tearful calls from parents of cyber bulling victims to the CEOs of multi-billion dollar companies. Realizing the desperate need for these types of services, Rexxfield was born..

CiviliNation: What kinds of people typically seek Rexxfield’s services?

Michael Roberts: Calls for help are incredibly diverse. Some are relatively simple and yet emotionally devastating because they come from teenaged cyber bullying victims, and others originate from from powerful people in multinational corporations. We also receive many calls from frustrated law-enforcement officials who are trying to investigate serious crimes. I’ve helped law enforcement investigate in cases of rape, robberies and even death threats against police officers who are living in fear despite their station in life. In all of these situations, without exception, the Internet service providers were not willing to reasonably cooperate with the investigations –  I have found Google and Facebook to be quite notorious in this area.

I was recently invited  to teach some of my methods to members of a joint federal and state task force whose mandate is protecting children from exploitation. I showed them some of the techniques we have developed and how the task force can implement those techniques into their own investigations. The group then shared some horror stories with me, including a case involving Facebook where a teenage rape victim was involved in a chat through Facebook less than half-an-hour before the crime took place. In that case it took months before Facebook complied with the requests for the originating IP address, by which time the evidence had perished because the ISP providing the connectivity to the suspect had subsequently purged the log file records. And to think the loss of this information could have been easily avoided with the proper cooperation.

In addition to helping private individuals and businesses, I am also assisting members of State House of Representatives in drafting new laws that will force Internet service providers to retain this perishable evidence for at least 2 years, because currently there are no laws addressing this obvious need. Obviously this needs to be balanced with people’s desire for privacy, so I want to make clear that through these proposed laws we are not asking to give Big Brother the keys to everybody’s Internet activities; on the contrary, we want the Internet service providers to remain the sole custodian of these confidential records and to only provide information in instances of legitimate civil and criminal warrants or subpoenas. In other words, we simply want to help avoid what happened in the rape case I described above.

CiviliNation: How have the attacks against you helped positively influence your work at Rexxfield?

Michael Roberts: Had I not gone through this fiery trial, I would’ve been like so many other people and considered the issue of online attacks and character assassination a mere trifle not worthy of serious attention. I would probably have also dismissed the victims who issue anguished cries for help as thin-skinned weaklings, as seems to be the reaction by most people who have not experienced this tragedy firsthand and simply refuse to see what is happening online.

CiviliNation: What is your response to people who claim that online reputation attacks against adults are rare and not something that most people need to worry about?

Michael Roberts: I would encourage such people to take a course in critical thinking, sympathy, empathy, and to open their eyes. I’ve found that until somebody has experienced this issue first-hand, or even second-hand through someone they love, they simply cannot relate to the devastation it causes.

Anonymous free speech is a wonderful privilege and should be preserved. In many cases horrible problems have been avoided by the ability to communicate anonymously, such as in situations involving whistle blowing of white-collar crimes, community awareness of when sexual predators move into the neighborhood, and many other alerts that are of great community benefit.

However, like all good things, anonymity is subject to abuse. There is no such thing as “free speech,” there is always a cost. Sometimes that cost is acceptable, moreover desirable, particularly in the case of positive community awareness. However, often there are many false rumors and libelous attacks, which are motivated only by hatred and vindictive antisocial promptings. More often than not, these serial cyber defamers have some type of antisocial personality disorder. They have nothing better to do than hurt other people and in fact are fueled by other people’s pain. Normal people cannot begin to relate to how these people think, yet they exist and they are out there, spreading their destruction online.

Let me give you a simple example. If a farmer has his livestock destroyed and his barns and fields burned by a vandal, not many people would struggle with the assertion that his livelihood has been utterly decimated. However, if an individual, who relies on his or her reputation to obtain and remain employed comes under attack, through Internet harassment and defamation, most people that have not experienced this firsthand will probably dismiss their anguish and complaints as petty and not worthy of the legal system or our sympathies. Yet, in practice their livelihood may have suffered catastrophic damage. At least the farmer can grow new corn and raise more cows.

CiviliNation: Do you believe that social networking and other websites have any responsibilities to help stem online attacks?

Michael Roberts: The 18th century statesman and philosopher Edmund Burke wrote, “All that is necessary for evil to triumph is for a few good men to do nothing”. A quick Google search of the many variations of this quote returns approximately half a million occurrences and can be reasonably embraced as one of the benchmarks, insomuch as it is possible, for determining what enables evil. But therein lies our tough philosophical question: “Does doing nothing, constitute doing evil, if evil is a reasonably predicted outcome of inaction?” I would argue strongly that inaction by those Internet service providers that are in a position to act, in these instances is very wrong.

CiviliNation: Why do you think there is a frequent lack of understanding by law enforcement and the legal system about the depth and breadth of the problem of online attacks and cyber-bullying against adults?

Michael Roberts: Well, as I mentioned before, many people don’t relate to this problem unless they’ve personally experienced it or had someone close to them go through it.

With respect to law enforcement, even if officers sensitive and sympathetic to the victim’s plight wish to take action, they often do not know where to start. And if they do find somebody with high-level skills needed to track the attackers down, they are usually so overwhelmed with what they consider to be “more serious” crimes such as fraud and extortion, that the defamation and harassment cases sit in the bottom of the case backlog file. By the time the cases are seriously addressed, the crucial forensic evidence, for example IP address log files, have long since perished.

CiviliNation: What role do you believe the law should play in helping reduce online attacks and adult cyber-bullying?

Michael Roberts: I would like to see a hierarchy of young and technically capable power users within law enforcement put in place, at a minimum to know the basics of evidence preservation and who to call for advice when they are in over their heads. I’m currently working with a few politicians and law enforcement personnel to develop some simple self-study video tutorials on these fundamental gaps in knowledge.

Filed Under: Cybercivility Tagged With: Cyberbullying, Cybercivility, Defamation

Stanford Symposium Addresses Privacy Rights and Free Speech

March 22, 2012 by CiviliNation

The Stanford Technology Law review, in conjunction with The Center for Internet and Society at Stanford Law School, hosted the 2012 Symposium: First Amendment Challenges in the Digital Age on February 10.

The first panel featured a discussion about “Taking Forgetting Seriously,” which covered privacy rights and free speech and addressed the European Commission’s Right To Be Forgotten. The panelists included Franz Werro, professor at Georgetown Law; Dr. Lothar Determann, a partner at Baker & McKenzie; Patrick Ryan, Policy Counsel at Open Internet, Google; and Michael Fertik, founder and CEO of Reputation.com, with James Temple, technology columnist of the San Francisco Chronicle, serving as moderator.

Watch the video or listen to the audio.

 

Filed Under: Cybercivility Tagged With: Cybercivility, Defamation, Freedom of Speech, Law

Personality Disorders and Pathology Expert Sandra Brown, M.A. Talks About the Mental Disorders Related to Cyberstalking and Online Attacks

February 28, 2012 by CiviliNation

This is a guest post written by Sandra L. Brown, M.A.

Sandra L. Brown, M.A., is the CEO of The Institute for Relational Harm Reduction & Public Pathology Education and holds a Masters Degree in Counseling with a former specialization in personality disorders/pathology.

She is a program development specialist, lecturer, trainer and community educator, and is recognized for her pioneering work on women’s issues related to relational harm with Cluster B/Axis II/Sociopathy/Psychopathy disordered partners. She has taught Pathology Profiling to law enforcement, the judicial system, criminal justice professionals and the mental health/domestic violence fields.

Sandra is an award-winning author of the books Women Who Love Psychopaths: Inside the Relationships of Inevitable Harm with Psychopaths, Sociopaths & Narcissists , How to Spot a Dangerous Man Before You Get Involved and Counseling Victims of Violence: A Handbook for Helping Professionals.

You can find out more about Sandra’s work at Safe Relationships Magazine and the upcoming www.adultcyberstalking.com.

——-

“Who Does That?” Understanding the Mental Disorders Related to Cyberstalking

The challenge to understanding cyberstalking, as well as online defamation and hacking, is getting one’s head around the concept of who does this and why. The lack of understanding of the issues related to cyberstalking, as well as deficiencies in emotional support, legal interventions, and public recognition of the problem, is largely related to the lack of recognizing the disorders of the stalkers. This has been the same problem in acknowledging many other behavioral maladies of our society.

Who abducts children? Who commits repeated acts of domestic violence? Who rapes? Who steals stock options and millions from investors? Who abuses the elderly? Who hurts animals? While these appear to be different behaviors, they are all behaviors often associated with the same types of disorders that are related to stalking, cyber stalking, defamation, and hacking. When we are successful in linking the behaviors with the disorders, it’s easier to understand the motivation behind the behavior. It’s easier to answer the question “Who Does That?” and “Why?”

If we stand outside of the disorders associated with cyberstalking, defamation and hacking, we get lost in only viewing the destructive behavior of the extremely disturbed. We miss the ability to link and label the disorder and its normal sequences of behavior. It’s the ability to “link and label” that give us the best chance of understanding what cyberstalking is, what it is generated from, and who is doing it.

Our goal at The Institute for Relational Harm Reduction & Public Pathology Education is to help survivors heal from the aftermath of exposure to pathology that is associated with the disorders that generate the behaviors listed above.  The Institute’s primary earlier focus was related to helping people be able to spot the destructive behaviors in their relationships that are associated with permanent and unrelenting pathology.

However, since our own agency’s issues with victimization from cyberstalking, hacking, and defamation, our outreach has grown to include public pathology education about stalkers and their connections to the same type of pathology as seen in other criminal behaviors such as domestic violence, physical stalking, and abuse. (Our stories and the stories of others will be included on our site soon.)

Overt and Covert Forms of Pathological Behavior

Overt forms of pathological behavior are rarely questioned for the obvious mental health disorders that they are. For instance, few would argue that mothers like Susan Smith or Andrea Yates who drown their children aren’t terribly disordered.  But the covert crimes of  “drowning a reputation or business” on the internet may go totally unrecognized as pathology.

Those that shoot people they don’t know, or commit a drive-by shooting like the “Beltway Snipers” Muhammad and Malvo in the Washington D.C. and Virginia areas, clearly have pathological motives. While snipers shoot people they don’t know, cyberstalkers and defamers can destroy people they never met. Criminal profilers would rush to develop a psychological profile of gun snipers, but rarely are psychological profiles developed of “Internet snipers”.

The mafia which controls how other people run their businesses, who retaliate against witnesses testifying against them or extort money in exchange for non-harm, are monitored by the FBI and State Attorneys as criminals.  But members of the “Internet mafia” which controls how other people run their businesses, who create defamatory websites when witnesses testify against them, and who extort money in exchange for non-harm are not prosecuted or recognized as criminals. There is no witness protection program for cyberstalking and defamation victims.

The deranged that break into homes to beat the elderly for money, like Phillip Garrett who terrorized those in assisted living facilities, have a notable bent of sheer brutality. But that brutality would not be noted in the deranged who cyberstalk or cyberharm the elderly. The elderly victim would be dismissed as “not understanding the internet” or having early dementia for feeling threatened online, and the pathology of the attacker would not be nearly as recognizable in cyberstalking as it would be in a physical assault.

Terrorists who commit the taking of hostages and psychological torture like the infamous Stockholm Bank Robbery (which resulted in the coining of the term Stockholm Syndrome) are identifiable as probable psychopaths, but cyberstalking victims who develop Stockholm Syndrome due to their stalking victimizations are not identified as victims of probable psychopaths.

Who would argue the pathology of  gang members or thugs like James Manley who murdered my father are highly disordered? But gangs of cyberstalkers who stalk together are rarely pegged as the pit of pathology that they are, or recognized for having an online gang mentality.

Serial killers like Ted Bundy who raped and killed at least 36 women leave no doubt that he was the worst-of-the-worst psychopaths. But cyberstalkers and defamers who have ruined the lives of equal numbers of others are often unidentified – or when identified, are not labeled with the diagnosis that helps us identify the swatch of devastation they have left behind.

Cult leaders who lead hundreds to death like Jim Jones remind us of the power and persuasion of pathology. But the power and persuasion of the Internet in the hands of the highly disordered is not recognized for its own version of cult recruiting.

Re-offending domestic violence abusers like O.J. Simpson convince us that not all domestic violence is fixable and that some some abusers’ brutality increases with each crime and are obviously disordered. But re-offending stalkers and defamers’ behaviors are rarely labeled as individuals exhibiting escalating criminal behavior.

The overt forms of pathology through criminality are recognizable by most of society, and many would agree that these people are horribly disordered and possible life-long dangers. Their overt criminality is the guiding definable behavior that points to their probable pathology, but in cyberstalking, hacking, and defaming where criminality is rarely pointed to, pathology flies under the radar along with prosecution and restitution.

Even professionals in the criminal justice and mental health system have difficulty naming the mental health disorders most associated with cyberstalking and online defaming. With little inroads being made into linking and labeling the behaviors with the diagnosis, is it any wonder so little is being done in the legal arena to stop these predators? Without the understanding of how this type of pathology manifests itself, it is unlikely the criminal justice system will have any interest in the long range and repeating behaviors of most cyber stalkers.

Core Features

Low empathy is at the core of a cluster of pathological disorders that correlates to “inevitable harm” when it crosses the paths of others.  Low empathy has its roots in reduced conscience, remorse and guilt. Without empathy, pathologicals find pleasure in harming others and enjoy seeing the physical or emotional destruction of others.

Sadistic, absolutely. But often sadistic behind fictitious names, a slew of proxy servers, or a spread sheet of online identities.

Getting On The Same Page About Who They Are

Why aren’t these pathological disorders that cyberstalkers have being better identified?  That is the million dollar question since the main judicial, social, and mental health systems of our society deal with this particular cluster of pathological disorders day-in and day-out. Even if they are never identified as crimes, the fact is that the disorders associated with cyberstalkers and other societal abusers represent the majority of white- and blue-collar crimes that cataclysmically smash in our lives.

Unfortunately the reason society has not cohesively named this cluster of pathological disorders as the center of their focus is that each system has its own view of the specific behavior associated with a pathological’s disorders. Perhaps surprising to some, the pathological disorders are often the same disorders, whether emanating from a cyberstalker or rapist. While it might be assumed that there is a wide margin of behaviors separating cyberstalking from a vicious rape, the disorders that are commonly seen are often the same cluster of disorders in both groups, as well as child abusers, batterers, bank robbers and Wall Street swindlers – disorders that are earmarked by low empathy, pleasure in harming, and often the deviancy of hidden identity.

Consider the different labels that are used to describe attackers and their victims:

– Law enforcement calls them bad guys (if they are even caught)
– Mental health systems call them patients
– Domestic violence organizations call them abusers
– Batterer intervention programs call them perpetrators
– Criminal defense attorneys call them clients
– Sexual Assault centers call them rapists or sexual offenders
– Financial structures call them swindlers
– The online world calls them trolls
– Victims call them predators
– Children and adolescents call them cyberbullies
– The swindled call them con artists  
– The judicial system calls them criminals (or not, if they are never identified)
– The church calls them evil or unredeemed
– The website owners call them hackers
– The defamed call them cyberstalkers
– Parents call them pedophiles
– Jails calls them inmates
– Prisons call them high security risks
– The FBI calls them targets and terrorists

As each system deals with its own view of the specific acts a person has committed, its easy to miss the broad category that these people fall under. We miss the bigger implication of what goes within that category. We miss the fact that those who fall under these pathological disorders normally have far more destructive behaviors than cyberstalking, and that cyberstalkers often straddle the worlds of online and offline deviancy.

But when we ask “WHO does that?”, we immediately become partners. We begin to see the “who” within the act, the disorder that perpetrates these same acts, behaviors, or crimes. It’s the same sub-set of disorders that have different focuses but the same outcome: inevitable harm.

Flying Under the Radar

How convenient for pathologicals that each system is only focused on its identified behavior. Instead of seeing the big picture of pathological disorders in action, the systems are focused on the sub-directory of behaviors associated with their system and one small aspect of the pathologicals destructive nature. For most large systems, cyberstalking and defamation are small potatoes compared to the other behaviors and crimes they are used to seeing, crimes such as domestic violence, pedophilia and child abuse. Cyberstalking victims are often told that what is done to them is small in comparison to other crimes. The systems fail to see that cyberstalkers are just as disordered as child abusers and that if we are concerned about the future behaviors of child abusers, we should be concerned about the future behaviors of their like-disordered sibling, the cyberstalker, because in fact they have the same or similar disorders. But in the end, we’re seeing the same disorder, just with slightly different faces, over and over again.

Who Are They?

The commonalities that these disorders of  “inevitable harm” share is that they often fall within what is called “Personality Disorders.” These disorders consist of three clusters that share overlapping permanent and persistent symptoms related to impulse control, reduced empathy and conscience, emotional regulation disorders, a lack of fear of consequences, pleasure in harming others, and a reduced learning from negative experiences.

These disorders fall under “Cluster B Personality Disorders” which consist of:

Histrionic Personality Disordered * Borderline Personality Disorder * Narcissistic Personality Disorder * Anti-Social Personality Disorder (and associated disorders of Sociopathic and Psychopathic Personalities).

When I teach about Cluster B disorders, I see the moment of  “aha” that comes across the faces of law enforcement, mental health, and judicial professionals when they recognize their own clients. Learning the emotional, physical, psychological, behavioral, financial, sexual and spiritual behaviors of these disorders quickly helps them to affirm what kind of person does that. Looking across the room and seeing law enforcement, judges, therapists, and mediators all nodding in agreement rushes them into the center of reality that we are all dealing with the same disorder in our offices, court rooms, therapy offices and pews. That whether they are a defamer, cyberstalker, repeat domestic violence offender, a financial con artist, or a killer, we are still talking about the Cluster B of disorders.

When asking my audience of sexual offender therapists if any of the pedophiles AREN’T within Cluster B, no one disagrees. When asking batterer intervention programs if the chronic repeaters aren’t Cluster B, no one balks. When asking forensic computer professionals if trolls, cyberstalkers, defamers or bullies are Cluster B, they readily affirm it.  Sexual assault counselors agree that rapists are largely Cluster B. Judges don’t rush to disagree that high conflict cases (those people who file case after case, as many as 60 times to court) aren’t Cluster B. Mediators don’t disagree that those most likely to fail mediation are found within a Cluster B. Custody evaluators affirm that those most likely to tamper with evidence, perpetrate parental alienation and require supervised visitation are Cluster Bs. Stalking programs can easily see that stalking is primarily committed by Cluster Bs. Repeat criminals clogging up jail, probation, parole, and prison programs are often diagnosed within jail as a Cluster B disorder. Terrorists, school shooters, and bombers are easily identified as Cluster B.

Those who stay for years and years in counseling using up mental health resources without ever being able to sustain positive change are Cluster Bs (excluding here the chronic mental illness of schizophrenia or developmental disabilities). Those prematurely discharged from military service are often Cluster B. The overuse and misuse of most major societal services and systems are related to Cluster B. Some of the most brilliantly contrived insider-trading crimes of the century has been planned and executed by Cluster Bs. Are there many murderers that don’t have Cluster B?

WHO does that? If we take all the behaviors listed above (and often crimes from those behaviors), put them in an analyzer funnel and watch the behaviors clink and clunk down the spiral Diagnostic and Statistical Manual of Mental Disorders identifier, it would spit them out in a file with Cluster B printed on the front.

Cluster B’s behaviors are generated out of a complex interweaving of emotional, developmental, neuro, biochemical, and even genetic abnormalities. Obviously, this is not a simple disorder or there would be less “inevitable harm” associated with everyone and everything they touch. This complicated group of disorders single-handedly sets society on edge. It keeps us in court, in therapy, in prayer, in the lawyer’s office, in depression, in anxiety, on edge, on the offense and sometimes even willing to end our lives simply to be away from such menacing, yet often normal appearing, deviancy.

Who wreaks more emotional havoc than Cluster B’s? 60 million persons in the United States alone are negatively impacted by someone else’s pathology. In cyberstalking it drives people to therapy, to commit their own petty acts of revenge to avenge their own powerlessness, drives people to drink, to run away,  to get offline and never look back, and sadly leads to uncountable amounts of suicides every year especially for teens being cyberbullied.

These groups of disorders single-handedly cause financial disruptions to the working class who are demoted or go on disability because of attacks they’ve suffered due to too much Cluster B exposure.

Cluster B impacts the legal market. It keeps attorneys in business through never-ending court cases, it employs judges and prison systems, and it keeps forensic computer and forensic accountants frantically busy. This level of pathology also funds domestic violence shelters, rape centers, and children’s therapy programs.

In other words, pathology is big business. It is what our large service systems in almost every field are driven by the need to protect, defend, prosecute, or treat the effects of Cluster Bs.

It employs threat assessment professionals to ward off stalkers and online reputation defenders programs to repair cyberattack damage.

It drives TV, radio and talk shows. Cluster Bs are often the persons on daytime TV and reality shows. Who do the media often want to talk about in the celebrity world? The Cluster Bs. What kinds of crimes does the media flock to? The crimes often perpetrated by Cluster Bs.

It drives the medical field due to stress-related disorders and diseases normal people develop as a reaction to the abnormal pathology of Cluster B behavior.

Surely pharmacology is partially driven by medications for depression and anxiety perpetrated by the no-conscience disorders of Cluster B.

It generates new products every year to track, expose and identify Cluster Bs who are hacking computers, sending viruses, or putting chips on phones and cars to invade others lives.

While clearly pathology generates jobs for many, it is still the single most destructive group of disorders that exist.  And until all the major systems – judicial, legal, and mental health – get on the same page, we will continue to be stuck in this maze of pathologicals flying under the radar, undiagnosed, unrealized and wreaking havoc in millions of people’s lives.

 

 

Filed Under: Cybercivility Tagged With: Cyberbullying, Cybercivility, Defamation, Law

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • Next Page »

Recent news

  • Thank You and Goodbye June 17, 2021
  • FIR Interview March 17, 2021
  • Branded Harassment: When Brands Start the Conversation and Haters Take It Over March 11, 2021
  • The Backpack Show March 2, 2021

© 2021 CiviliNation