An ex-boyfriend of mine did this to me. Harassing messages, then sending messages to my husband "confessing" that he'd been having an affair with me. He told tales about meeting with me "last weekend" which made us laugh because that weekend we were in Hawaii. --- Fortunately, this was happening in the early days of dial-up, and the IP address clearly led to his small-town's only dial-up internet provider. Nobody knew of proxies yet. It was easy to figure who it was and we reported it to the police. I assume he received a visit (no charges were ever filed) but the harassment stopped.
Just get a new email address. It is a PITA, but that is a good way to stop the harassment. Just let your family and close friends kniw your new email address. If you still get harassed, then it is one of the people that know your new email address.
I would take custody of the email account and provide the child with a new email account. As a parent, I would take on the burden of the toxic emails and work with police and education resources to try and stop the offender. For the new account, I would use an Outlook email account, as you can provide an alias for the child's use. In the event the perpetrator discovers the new email alias, delete the alias and create a new one.
Facebook is NOT a necessity and removing it from my PC is the best thing I have recently done, and would changing your email address solve the harassment issue?
The anonymity of the Internet is both the benefit and bane of its very design. There's a line from the movie The 5th Estate where Julian Assange says "Give a man a mask, and he will tell you the truth." Unfortunately, that mask shows us not only the very best, but also the very worst in people. All you can really do is protect yourself as much as possible and stay informed.
Thanks. Didn’t know that about gmail. There’s been a couple of occasions that my BIL commented on YT, & someone replied with very personal information about him & his location. Brushed it off as either a lucky guess or someone within the house.
Apparently this can be done! One of my accounts says, "We recognize you on this machine so you do not need to log in!" This is a very critical account so they must be quite sure with the verification they are using. Got to keep this nice old computer working!
🐯🐯🐯🐯🐯🐯🐯🐯🐯 -----> # 20 --------> OK we operate our own network and have a static IP address, so you can trace back to our company, but to trace the WHO in our company is more difficult. Logs get top be hundreds of pages long: You would need yet another computer to parse the log, and we don't need law enforcement to access our logs. But if it is a matter of child porn, then the Sheriff and the FBI would be in our office in just 30 minutes. The sheriff is fast but that does not bring his office closer to ours.