Hateful or threatening verbal messages. This includes name-calling, attempts to control someone's behaviour by threatening to expose embarrassing information and/or threats of violence.
Embarrassing or threatening images.
An unending barrage of emails, instant messages, or texts, whether or not they are threatening in nature.
Look for signs of public humiliation. Another common form of cyber bullying happens when the bully harasses a target by way of public embarrassment, rather than directly contacting him or her. Cyber bullies may use these public tactics:
Posting humiliating messages on a social media site, a blog, or another public space.
Spreading rumors and gossip using social media, text messages and other tools.
Sharing pictures that are embarrassing or explicit in nature, or are altered with the intent to humiliate, on social media websites and through text messaging.
Creating a website filled with defamatory images, insults, and rumours about the target.
Look for signs of impersonation. A less obvious, but equally harmful form of cyber bullying takes place when the bully attacks someone by impersonating him or her as a way to bring about humiliation or punishment. In this case it is more difficult to identify the perpetrator.
In some cases the bully may create a screen name nearly identical to the screen name used by someone, then use that name to create embarrassing or threatening situations for him or her.
The bully may steal the target's password, hack his or her accounts, and send embarrassing message to others or make expensive purchases.
Attempt to identify the cause. Some bullies start out as a friend, an ex, or