Skip to content

Operation RIDX

It will take a united front to remove Cyberbullies (trolls).  This page is here to help.   First, we will define three courses of action most commonly used for the three top cyberbully brackets:

Basic Online Characteristics of certain individuals can be classified under one of the following as “Desperately in need of”:

therapy –

These people are the ones who spend hours upon hours trying to dig up dirt on people, and when they are unsuccessful, the resort to picking apart every post an individual has made in an attempt to discredit them. These people are usually addicted to some kind of chemicals, or so discontent in their own lives that they have nothing better to do. Most are incurable.

beat down –

For the most part, these are young men who can dish out insult after insult, but when faced with a formidable foe, they block and hide. They will attack anyone they consider weaker than them, a woman, someone with a disability. These people are so unhappy with their past and discontent with their current lives that they will actually act on threats, but only if the victim is helpless. They are loners by choice because they are incapable of proper social interaction. Odds are, they are in dire need of getting laid, but are only worthy of verbal or physical beat down.

Ignoring –

Older women who should know better will attack the families of their presumed foe in order to attempt to inflame and infuriate. They are usually successful in causing discord for themselves and have been known to create multiple accounts on social networks in an attempt to prevent their target from blocking them. Their words are futile, their attempts to cause emotional distress, a failure. They seek affirmation of their existence through association with the above mentioned individuals. They usually end up alone, or joined by one or two others, in their own private little group to backbite and talk like scorned teenagers.

~ ~ ~

We begin with the cyberbully/troll we’ll call JUDASS.

JUDASS – a non typical 65 year old retired school teacher from Tasmania who has joined the social network, Facebook.  Her mission; to defame and discredit anyone she deems to be stronger and/or more likable than her.  (See “Ignoring”)

She trolls in many different names and admits to using the TOR browser to mask her isp.

iusetor

(see https://varmtnewsnetwork.wordpress.com/how-many-trolls-names-can-a-trolls-troll-have/)

Information about TOR:(It is interesting to note that TOR is used to mask servers of child pornography.  Our TROLL was on the New Zealand News threatening members of different groups with posting their childrens pictures to pedophile websites.)

Tor (short for The Onion Router)[5] is a system intended to enable online anonymity. Tor client software directs internet traffic through a worldwide volunteer network of servers to conceal a user’s location or usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity, including “visits to Web sites, online posts, instant messages and other communication forms”, back to the user [6]and is intended to protect users’ personal privacy, freedom, and ability to conduct confidential business by keeping their internet activities from being monitored.

https://www.muckrock.com/news/archives/2012/jun/08/hunting-child-porn-fbi-stymied-tor-undernet/

~ ~ ~

This particular troll may be reported through many channels.  With this particular troll, International law applies.  If the law is unclear, please use google to find the answers that you seek.  In this instance, facebook has an agreement with the Australian Government to remove trolls/cyberbullies from their server.

Leave a Comment

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: