The dark side of free speech, part 2

cyber bullying

Our culture and probably most others have historically felt that bullies are bad news, but that being bullied is also a rite of passage. We often think that bullying tends to end with elementary school. Could not be farther from the truth.

As a culture, we tolerate and often reward adult bullies, especially bullying managers in the workplace. We celebrate bullies in entertainment as warriors and winners (even as we also celebrate a bully getting his comeuppance), and while hazing in schools, the military, and frats is being shunned by the culture, we otherwise do little. to eradicate bullying. Our politicians are often famous for their bullying nature. Unless there are dead bodies, we seem to expect people to just put up with it (or fight back).

As damaging and egregious as bullying can be, cyberbullying takes things one step further. Cyberbullying uses the Internet and other electronic forms of technology to post cruel or embarrassing photos, messages, emails, or to make threats. However, the attacker is usually anonymous, unknown, and there is no one to fight against. As a result, the potential cyberbully is often encouraged to create as much havoc in his victim’s life as possible. The potentially viral nature of such posts—that is, the ability for these posts to be replicated widely, rapidly, and endlessly—does not occur in a face-to-face encounter.

A typical (non-cyber) bullying event occurs at one point in time and then ends (although another similar event may occur). Bullying occurs in one place in space: a street corner or office, perhaps. Bullying is often witnessed, and everyone present knows the perpetrator. A cyberbullying incident, on the other hand, can spread to hundreds of people in seconds and to millions of people in a relatively short time, it can persist for a long period of time, it can be distributed around the world, and you have no one to answer for your action. .

As a result, the damage from such an incident can be repeated and repeated over and over again. Sadistic spells may enjoy repeating and reposting, and even create websites to encourage their persistence. These sites cause a cumulative effect, with nasty fellow travelers adding their own often unbearably nasty insults, reposting the private images, and multiplying the damage. Some may not realize or care about the damage they cause; others delight in it.

An unfortunate creation of cyberbullying is “revenge porn”. There are sites on the internet created solely to shame and hurt people (mostly women) by electronically posting and reposting sexual images of a former lover or interest. Some of these posts are designed to embarrass associates of the person whose pornographic image is posted. The target may be the ex-boyfriend or husband and the victim is “collateral damage.” Even well-known people can engage in unsavory behavior, such as the recent case of a hip-hop star and her site featuring a pornographic video of a hip-hop girlfriend fighting her with a rap.

Many victims of seemingly endless cyberbullying, including clients who have come to us for help, have lost their self-esteem. Others have been driven to substance abuse, to drop out of school or society, and such bullying behavior has even been implicated in suicides. While not generally considered a crime, it is far from victimless.

cyber bullying

Cyber ​​bullying is a more specific form of cyber bullying and, like cyber bullying, is much more enabled by the anonymity possible over the internet. It is the use of the Internet and other technologies to harass someone, although some cyberbullying may be secret for a while. While a “traditional” stalker may track a victim’s movements, spying on them from hidden areas, or with binoculars or telescopes, the cyberstalker electronically monitors their target(s).

Much of our social life is semi-public these days, on social networks like Twitter and Facebook. The Internet makes it easy for a person to hide their identity, create a false identity, or impersonate someone else, perhaps as a fake friend, making it easy to spy on a person’s activities through social media. Like cyberbullying, the ease of anonymity on the Internet can embolden the cyberbully into thinking (often correctly) that they won’t get caught.

We regularly come across cases where the harasser has managed to investigate and guess his victim’s email credentials or other online accounts, making it easier to discover the victim’s whereabouts, conversations, and correspondence. In some of these cases, the perpetrator will even impersonate the victim, sending fake emails and messages, posting as the victims themselves, or posting embarrassing images as if the victim themselves were the source of the statements, photos, or videos.

This has come to be understood and judged to mean that the government cannot stop you from saying your article, no matter how much the government or anyone else disagrees. This applies to the entire US government: federal, state, local entities, and public officials of those public entities. You are free to speak in “the public square.” Please note that the concept of Public Square applies only to government entities, properties and officials. It does not apply to private or commercial property. Property or business owners may prohibit you from saying certain things, or from saying anything on or within their property, business, or broadcasts, unless otherwise permitted.

Bullies may find a way to infiltrate the fabric of a victim’s financial, social, and family life, leaving their personal lives in tatters. Although it’s easy to read about such events and behaviors, it’s all over the news, victims are often not taken seriously, with friends and loved ones calling them neurotic or paranoid. Because the cyberbully often tries to damage the victim’s reputation, the reactions of those close to the victim often further the bully’s goals.

And while cyberbullying is illegal in many parts of the country and around the world, these actions rarely rise to the level that law enforcement needs to see to take them seriously or investigate. Read between the lines in the news and you’ll find that almost every arrest that includes cyberbullying also includes a serious threat, a violation of an existing restraining order, identity theft, theft of physical property, or child abuse.

offending

Internet trolling is behavior in which the troll intends to inflame, annoy, or damage civil discourse. In the context of this series of articles, he tends to disrupt the online or public communication of others through the use of vile invective, insults, and other verbal havoc. He is often misogynistic. The ability to be anonymous online removes much of the inhibition a person might feel from behaving so rudely.

To do?

A common thread running through the behaviors described is the ability to remain anonymous on the Internet. One might imagine that removing the option to be anonymous would remove the motivation for the behavior, but in this case, the solution would arguably be worse than the problem. In the first part of this series, we discussed freedom of expression, one of our most important rights, and the importance of anonymity. Both have played important roles in the very creation of our nation and continue to protect those who report abuse, even when their anonymity allows for other types of abuse. What are we going to do?

In Part 3, we discuss what we can do and what is being done, both legally and socially, to limit harmful cyber behaviour.