Dealing with Online Threats and Insults

Identifying the bully

This is a preview lesson

Register or sign in to take this lesson.

Over the next few days, the group remained steadfast in their research. Lucas deepened the digital analysis by cross-referencing data from various sources and using more advanced search tools suggested by their ICT teacher. This enabled them This way, they were able to trace the approximate geographical origin of the IP address, narrowing down the search. Meanwhile, Maria concentrated on understanding the psychological profile of the aggressor. She created a database of all the messages, cataloguing the themes and language used. This helped to identify possible motivations and behavioural patterns. João used his networking skills to check if anyone close to them exhibited suspicious behaviour or had a history of conflicts with Sofia. One day, Lucas managed to trace a connection between the revealed IP address and a social media account that had interacted with Sofia ambiguously in the past. Although the account was registered under a pseudonym, they noticed that recent activity coincided with the times of the anonymous messages. The group decided to monitor this account more closely, gathering enough evidence before taking any direct action.