Transcription Know the techniques of digital bullies.
Techniques Based on Anonymity and Impersonation
The main weapon of the digital stalker is anonymity or, rather, the feeling of impunity that this gives him. The aggressor rarely attacks from his main personal profile.
A common technique is the creation of fake profiles, often called "hate accounts".
The stalker creates an account on Instagram or TikTok with a generic username or one intended to humiliate the victim (e.g. "elrarito_del_aula") and uses it to post hurtful comments, manipulated photos or to spread rumors.
A more advanced technique is impersonation.
The attacker can gain access to the victim's real account (because he guessed his weak password or obtained it by phishing) and uses it to post inappropriate content in his name, insult his friends or change his profile picture to a humiliating image.
The goal is to destroy the victim's reputation using their own digital identity.
Social and Group Manipulation Techniques
The digital stalker is a skilled manipulator of group dynamics. He rarely acts alone; he needs an audience and reinforcements.
A key technique is group bombing (digital mobbing). The main aggressor incites others (his "helpers") to join the attack.
This is seen in WhatsApp groups where the victim is added only to collectively insult and then deleted, or in Instagram posts where the aggressor tags his friends to join in the taunts in the comments.
Another technique is deliberate exclusion. The aggressor creates a parallel group (e.g., "Class of 5B LESS [victim]") and makes sure the victim knows about it.
They use that space to share screenshots of the victim's posts, mock the victim behind their back, and plan real-world exclusion, ensuring that the isolation is total, both online and offline.
Techniques Based on Data Collection and Exposure.
The digital stalker acts as a malicious detective. A common technique is doxing (although less common in minors, its lighter version exists).
The aggressor collects personal information that the victim has left public on the internet (old photos, embarrassing comments, school data) and collects it in one place to humiliate her, showing that he "knows everything" about her and generating fear.
A more specific technique is outing, which consists of revealing private and sensitive information about the victim without her consent.
This can be the disclosure of her sexual orientation, a family secret or a medical problem.
The stalker uses this private information as a weapon to destroy the victim's confidence and social standing.
Summary
Digital stalkers use anonymity by creating fake profiles to insult without being discovered. A more serious technique is impersonation, where they gain access to the victim's account.
They manipulate the group through "digital mobbing", inciting others to join the attack. They also use deliberate exclusion, creating parallel groups (e.g. on WhatsApp) to isolate the victim
Another technique is to collect private information or old photos of the victim to humiliate him or her. "Outing" is the most serious form, revealing sensitive secrets such as sexual orientation without permission
know the techniques of digital bullies