top of page


When someone uses a fake or stolen online identity created or used to deceive others into a relationship. A catfish uses false information to cultivate a persona online that does not represent their true identity. This usually involves using stolen or edited photos, often taken from an third party without approval.


An online attack in which hackers dig up personal information and documents to expose the real identities of people hoping to remain anonymous. The objective is to shame and harass a victim in hopes of damaging their reputation or embarassing them.

Legal Rights

Cyber-bullying can be illegal in many different forms and have state laws to prosecute this act. Almost all states have state laws and legislation to address online harassment and bullying.


A form of cyber-crime forcing someone to perform sexual acts by threatening to publish naked pictures of them or sexual information about them as revenge. Online perpetrators might attempt to gain a victim’s trust by pretending to be someone they are not.


Making a prank call to emergency services in an attempt to dispatch various armed police officers to a particular address as a form of revenge usually motivated by anger.

Revenge Porn

When sexually suggestive images or videos of someone, typically a former romantic partner, that are shared without the person's consent and posted online. 41 states and the District of Columbia have laws outlawing and prohibiting the distribution of revenge porn.

Online Security

There are multiple ways in order to protect yourself from harmful online activities. Make sure to have anti-virus software for your devices, keep your passwords complex and hard to guess, and to use two-factor authentication as extra security measures.


Sending sexually explicit digital images, text messages, videos, or emails, usually by cell phone. Other social media platforms such as Instagram and Snapchat may be used to share these explicit photos or videos. The can be dangerous and be used for blackmail, screenshotting, or sextortion.

bottom of page