He will, and by all means have someone who isn't above anything including conspiracy and sharing illegally obtained personal information. Give him your e-mail.
Won't work, and I don't think the people here are at the same level of Amkon. And the screenshots are many.
0 Replies
coldjoint
-3
Fri 25 Oct, 2013 07:34 pm
Look at that, your post was edited
0 Replies
coldjoint
-3
Fri 25 Oct, 2013 07:49 pm
Quote:
Stalking is another common form of harassment. A stalker's actions may be innocuous when out of context, but are generally threatening when looking at the big picture. When the amount of attention the stalker gives to his or her victim becomes disturbing to the victim, even simple actions like calling on the phone can be very frightening.
Forms of harassment such as bullying are more difficult to prosecute, particularly when they involve young participants. While bullying is a harassing activity, it is generally seen as socially acceptable among young people, and victims are seen as being weak. The intent of bullying is to cause the victim distress through psychological measures or even physical violence, and so it is clear that bullying meets the definition of harassing behaviors for adults. Children are often given a pass on this behavior because they are not seen as capable of causing permanent damage to one another.
In addition to these common forms, a person can usually make a case that other types of actions may be considered harassing. For instance, if a person knows that his or her victim is terrified of dogs and continues to post images of dogs around the victim after being told to stop, some people would consider this harassment because of its intent. If a person feels that he or she is being victimized, it is worth evaluating even unconventional behavior for signs of harassment and seeking appropriate measures to stop the activity.
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.[1] It may include the making of false accusations or statements of fact (as in defamation), monitoring, making threats, identity theft, damage to data or equipment, the solicitation of minors for sex, or gathering information that may be used to harass.