Cyberterrorism, Cyberstalking, Cyberharassment, Cyberbullying and Blackheart Cleveland

Submitted by Norm Roulet on Wed, 07/22/2009 - 00:40.
Cyberterrorism.JPG

I believe the actions of "Blackheart Cleveland" as an association and some "members" individually consititute some variation of Cyberterrorism, Cyberstalking, Cyberharassment, and/or Cyberbullying. It appears Blackheart Cleveland exists to disrupt the business of REAL COOP and attack REALNEO members personally, to cause personal and financial harm to members. I believe this is illegal.

As Tim Russo has been arrested by the FBI for using the Internet with the intent to commit serious crimes against innocent people, and was convicted for that, his actions against my family and other REALNEO members seem like a repeat of his past offenses. I question whether Tim Russo should be allowed access to the Internet at all. I think he is a cybercriminal.

I do not know why his partners have joined him in his attacks upon me and REALNEO members, and I wonder if they are being compensated to do this, and by who.

Cyberstalking is the use of the Internet or other electronic means to stalk someone.

It has been defined as the use of information and communications technology, particularly the Internet, by an individual or group of individuals, to harass another individual, group of individuals, or organization. The behavior includes false accusations, monitoring, the transmission of threats, identity theft, damage to data or equipment, the solicitation of minors for sexual purposes, and gathering information for harassment purposes. The harassment must be such that a reasonable person, in possession of the same information, would regard it as sufficient to cause another reasonable person distress.[1]

Cyber-bullying involves the use of information and communication technologies to support deliberate, repeated, and hostile behavior by an individual or group, that is intended to harm others.[

The National Crime Prevention Council's definition of cyber-bullying is "when the Internet, cell phones or other devices are used to send or post text or images intended to hurt or embarrass another person."[2] Other researchers use similar language to describe the phenomenon.[3][4]

Cyber-bullying can be as simple as continuing to send e-mail to someone who has said they want no further contact with the sender, but it may also include threats, sexual remarks, pejorative labels (i.e., hate speech), ganging up on victims by making them the subject of ridicule in forums, and posting false statements as fact aimed at humiliation.

Cyber-bullies may disclose victims' personal data (e.g. real name, address, or workplace/schools) at websites or forums or may pose as the identity of a victim for the purpose of publishing material in their name that defames or ridicules them. Some cyberbullies may also send threatening and harassing emails and instant messages to the victims, while other post rumors or gossip and instigate others to dislike and gang up on the target.

Though the use of sexual remarks and threats are sometimes present in cyber-bullying, it is not the same as sexual harassment and does not necessarily involve sexual predators.

Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyberterrorism. Cyberterrorism can also be defined much more generally, for example, as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.” This broad definition was created by Kevin G. Coleman of the Technolytics Institute.[1] The term was coined by Barry C. Collin.[2]

Harassment by computer is a crime in several U.S. states (see computer crime). It is distinct from stalking in that stalking typically requires two or more contacts, whereas harassment by computer may be a single incident. It is also different from regular harassment, because the offense typically encompasses a range of crimes that would not be considered harassment if conducted in person.

AttachmentSize
BeIndependenceDayPanLogo.jpg40.54 KB

I believe Russo went to law school... Cyber-slip-and-fall?

He has a history of pushing people and networks to "victimize" him, by arresting him, and banning him from networks and such, and then he files lawsuits.... so he may have some commercial objective in trying to get "blackhearted" here.

Disrupt IT

self-admitted cyberstalker...

 Russo admits to cyber stalking - if you read the Free Times article thoroughly. its an excellent piece of journalism. The author elicits Russo's self-implication repeatedly. Russo was so focused on his dysfunctional rationale for his behavior he probably doesn't even realize it today...

And don't forget McDermott's addition of the definition of Troll. I found it very informative and explains Russo's behavior on this site to a tee, in addition to your frivilous lawsuit issue, norm