The idiots are thick tonight.
Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of individuals, or an organization.
Stalking is a continuous process, consisting of a series of actions, each of which may be entirely legal in itself. Technology ethics professor Lambèr Royakkers writes that:
"Stalking is a form of mental assault, in which the perpetrator repeatedly, unwantedly, and disruptively breaks into the life-world of the victim, with whom he has no relationship (or no longer has), with motives that are directly or indirectly traceable to the affective sphere. Moreover, the separated acts that make up the intrusion cannot by themselves cause the mental abuse, but do taken together (cumulative effect)."[3]
http://en.wikipedia.org/wiki/Cyberstalking
Cyberstalkers target their victims through chat rooms, message boards, discussion forums, and e-mail. Cyberstalking takes many forms such as: threatening or obscene e-mail; spamming (in which a stalker sends a victim a multitude of junk e-mail); live chat harassment or flaming (online verbal abuse); leaving improper messages on message boards or in guest books; sending electronic viruses; sending unsolicited e-mail; tracing another person's computer and Internet activity, and electronic identity theft.
http://www.ncvc.org/ncvc/main.aspx?dbName=DocumentViewer&DocumentID=32458
Cyberstalking. Cyberstalking is the use of the Internet, email or other electronic communications to stalk, and generally refers to a pattern of threatening or malicious behaviors. Cyberstalking may be considered the most dangerous of the three types of Internet harassment, based on a posing credible threat of harm. Sanctions range from misdemeanors to felonies.
Cyberharassment. Cyberharassment differs from cyberstalking in that it is generally defined as not involving a credible threat. Cyberharassment usually pertains to threatening or harassing email messages, instant messages, or to blog entries or websites dedicated solely to tormenting an individual. Some states approach cyberharrassment by including language addressing electronic communications in general harassment statutes, while others have created stand-alone cyberharassment statutes.
http://www.ncsl.org/issues-research/telecom/cyberstalking-cyberharassment-and-cyberbullying-l.aspx
Wi:
947.0125 Unlawful use of computerized communication systems.
(1) In this section, "message" means any transfer of signs, signals, writing, images, sounds, data or intelligence of any nature, or any transfer of a computer program, as defined in s. 943.70 (1) (c).
(2) Whoever does any of the following is guilty of a Class B misdemeanor:
(a) With intent to frighten, intimidate, threaten, abuse or harass another person, sends a message to the person on an electronic mail or other computerized communication system and in that message threatens to inflict injury or physical harm to any person or the property of any person.
(b) With intent to frighten, intimidate, threaten, abuse or harass another person, sends a message on an electronic mail or other computerized communication system with the reasonable expectation that the person will receive the message and in that message threatens to inflict injury or physical harm to any person or the property of any person.
(c) With intent to frighten, intimidate, threaten or abuse another person, sends a message to the person on an electronic mail or other computerized communication system and in that message uses any obscene, lewd or profane language or suggests any lewd or lascivious act.
(d) With intent to frighten, intimidate, threaten or abuse another person, sends a message on an electronic mail or other computerized communication system with the reasonable expectation that the person will receive the message and in that message uses any obscene, lewd or profane language or suggests any lewd or lascivious act.
(e) With intent to frighten, intimidate, threaten or abuse another person, sends a message to the person on an electronic mail or other computerized communication system while intentionally preventing or attempting to prevent the disclosure of his or her own identity.
(f) While intentionally preventing or attempting to prevent the disclosure of his or her identity and with intent to frighten, intimidate, threaten or abuse another person, sends a message on an electronic mail or other computerized communication system with the reasonable expectation that the person will receive the message.
(3) Whoever does any of the following is subject to a Class B forfeiture:
(a) With intent to harass, annoy or offend another person, sends a message to the person on an electronic mail or other computerized communication system and in that message uses any obscene, lewd or profane language or suggests any lewd or lascivious act.
(b) With intent to harass, annoy or offend another person, sends a message on an electronic mail or other computerized communication system with the reasonable expectation that the person will receive the message and in that message uses any obscene, lewd or profane language or suggests any lewd or lascivious act.
(c) With intent solely to harass another person, sends repeated messages to the person on an electronic mail or other computerized communication system.
(d) With intent solely to harass another person, sends repeated messages on an electronic mail or other computerized communication system with the reasonable expectation that the person will receive the messages.
(e) With intent to harass or annoy another person, sends a message to the person on an electronic mail or other computerized communication system while intentionally preventing or attempting to prevent the disclosure of his or her own identity.
(f) While intentionally preventing or attempting to prevent the disclosure of his or her identity and with intent to harass or annoy another person, sends a message on an electronic mail or other computerized communication system with the reasonable expectation that the person will receive the message.
(g) Knowingly permits or directs another person to send a message prohibited by this section from any computer terminal or other device that is used to send messages on an electronic mail or other computerized communication system and that is under his or her control.
History: 1995 a. 353.
I don't feel the need to go on. However, nice job outing yourself on a forum monitored by the Feds, local news, and our local DAs offices.
In any event, I've written and said far worse to my own state "representatives."
Bravo. Well done.