the drowned man is brought
ashore, seawater leaks
from his mouth.
a woman in repose; she lifts
a skinned knee and chews: she
feels the drowned man scream
a bubble escapes
from his mouth
with a pop
spit falls like rain
motion of implacable
blows a kiss.
breath of humidity–
gravity is ceased.
(C) Rob Goldstein 1986-2017 All Rights Reserved
People with trauma related mental health problems bring certain vulnerabilities to their
The same trigger responses that affect our online relationships just as they affect our
relationships in life.
My greatest vulnerability is a childlike faith in the goodness of other people.
It’s a symptom of my DID.
It invites people to try to take advantage of me.
I am also vulnerable to letting narcissistic bullies into my life.
Online abuse often takes the form of communications that are insulting,
threatening, devaluing, and mocking.
When the abuse happens online, the abuser is a cyber-bully.
Cyber-bullies target online activities, communications, and friends.
They will repeatedly send you unwanted messages or other kinds of communication.
They will try to intrude in your online activities and will actively defame you on
social networking sites.
They will gather information from your friends and encourage others to harass you, claiming to be harassed by you.
They will also approach your friends to get information about you or to create conflict in your relationships with others.
Abuse is always about control.
Abusers want to control the lives and actions of the people they target.
Abusers will also use alternate accounts on social networks to stalk and harass you.
How to tell when you are dealing with online abuse:
Abusers will engage in:
Name calling or insults; mocking
Threats and intimidation
Ignoring or excluding
Denial of the abuse and blaming of the victim
What can you do to protect yourself?
1. DO NOT respond to this person. Engaging with the bully often only makes matters worse. They feed off their victim’s misery and pain.
2. Make a copy of the message, photo, or video. The best way to do this is to copy the URL of the specific webpage where it’s happening.
3. Contact the website operators by phone, email and any contact submission forms that they have available on their site.
4. File a report with your local police department.
If necessary, file a complaint with the Internet Crime Complaint Center (IC3). The IC3 is a partnership between the FBI, the National White Collar Crime Center, and the Bureau.
My personal suggestion is that you let your friends and contacts know what it happening and that you limit your online communication to people who are fully aware of the seriousness of cyber bullies and who will work with you to promote safety.
I also recommend that you keep screen-shots of all abuse email and texts.
In many ways I’m grateful to the bullies I’ve met over the past five years.
They have taught me that I am strong, and that I simply continue to be myself most
people will figure out the con.
Social media is a real asset for those of us who want to find ways to live past
A bully’s pleasure is your silence.
Don’t give it to him.