How is it possible to have your numerical reputation 100% under control, even when you face the most disturbing web attacks?
All this year, I have been under rabid attacks coming from a radicalized cyber-criminal of Pakistan, R.A. Thousands of posts have been published against me on Facebook and Twitter using anonymous or impersonating profiles. Facebook has been extremely poorly cooperative. Twitter moderation was inefficient, when not supporting, de facto, these criminal activities. National and local police, Interpol, Nantes (my city) Mayor and Municipality, addressees of endless calumnious denunciations, never answered any of my requests in contradiction with the obligations they have according to French law. French justice and lawyers could not sanction a stalker acting from an international judicial loop-hole. Pakistani authorities did nothing.
Then, I had to manage the issue by myself. I should, however, mention the professional, friendly and fast moderators of Medium, a great platform for sharing stories. Nevertheless, as of today, I am able to have a full control over my numerical image and reputation. I can also defeat any aggressor: troll, stalker, bully, blackmailer, etc.
1. Building a resilient numerical fortress
First all, it should be mentioned that my name+first name [Bernard Grua] is a unique expression on the web. I am not protected by any barrier made by publications with a high SEO (Search Engine Optimization), totally stuffing SERP’s (Search Engine Result Pages). I am not like people owning the same name than famous artists, actors, creators, sportsmen, etc. I am 100% exposed to malevolent people. That means, any defamation under “Bernard Grua” will directly impact me and will be visible on SERP’s.
1.1. Producing content
While no wall or no alternative content was available, I had to fill by myself my numerical space. I boosted this work on 2014/2015 when I was under attack of French far-right because I launched an international movement against the delivery of Mistral class ships, invasion vessels, to Putin’s regime. Content was not enough. The unpleasant stuff was still there.
1.2. Making the content strong
I had to make my content strong enough to be on the top of Google search pages. I tried different media. I faced disillusions and some partial successes. It was a long learning process. I finally understood how all of this should work in an interactive spider net. Very few of what I discovered is written on books or on public papers. My approach is not a theoretical one. It is based on numerous tests and groundwork experiences. I eventually found the best practice just when Ms R.A. despite my warnings decided to attack this fortress. ABSOLUTELY NOTHING from her enormous production went through my walls or entered my numerical space. It does not mean it had no consequences. The more this cyber-criminal went deeper into her stalking, the more she was creating damages for herself. We will talk about it later.
2. Using your numerical fortress as an operational headquarters for managing your reputation
2.1. Pulling up the good material
From time to time, I browse the internet and find some good material about me. Then, I DECIDE to promote it. YES, I DECIDE. I push it to higher levels of Google search results. It works!
2.2. Killing the bad material
Numerous E-reputation consultancy firms will propose you “Net-washing.” Actually, they will propose you to bury bad buzz or defamation. There are two issues.
- The first issue is the big amount of fee they will ask you for. It will be over USD 10K.
- The second issue is they will just commit on tasks, not on results. Most resilient aggressive publications, widely shared, might stay visible.
No consultancy firm will propose you to kill the defamation, to flush it out of the net. Don’t believe, too, justice can help you when you face international cyber-criminals. But I found how to do it. I know how to replace the bad stuff by a “similar” but positive one.
3. Using your numerical fortress to neutralize your aggressor
3.1. Don’t pay attention to trolls, even the craziest ones.
A troll is a just troll. A troll will be after you only if your reactions are rewarding for him. That means, if his hatred can be profitable, while having an impact on you. I had a good one after me. It was G.L., a man who has been jailed for harassment against a public person, who took pride of this jailing, who went three times to psychiatric emergencies, who sent death and rape threats, who has his own file by French Police. He almost begged me to give him importance, to fill in a complaint against him, to publish an article about him on a national media. I did not make him this favor. He went away. Don’t feed these aliens. They will starve until death.
3.2. Silence psychopaths by blowing them up
You can face psychopaths, really toxic, sadistic and/or violent people. You don’t need to give them materials to get under their fire. “Don’t feed the troll” does not work, here. They feed themselves by their own rage, their own nihilism, their own obsessions, their own mental disorders, their death, if not suicidal, pulsion. They are so bad, though generally smart, that their own personal analysis will make them finding, in themselves, all the perversions, they will charge you with. Days and nights, they will never stop haunting you until they broke you. The only option to save yourself is to kill them numerically. That’s what I did with L.C. He even became a pariah in the French fascist/neo-Nazi far-right sphere, where he was, once, a guru. He is extinct. That’s what is happening to R.A.
Silencing your aggressor, no consultancy firm will propose these services to you, only Mafia. Mafia will physically eliminate this nuisance, which, unfortunately is supposed to be a human being, with all the potential consequences. I absolutely don’t recommend this solution. The criminals cyber-stalkers do not deserve the honor having their death polluting the rest of your life. This is numerically possible and can be done, on a smooth way, in compliance with the law of any country. But this is a difficult task even when you have a very strong numerical fortress and you became a master in SEO. Without these two assets, there is no hope.
The ultimate step is to control the Google search result under the name(s) of your aggressor. The more the attack against you is lasting, the more your aggressor is giving you material against him. The easiest it becomes for you. You just need to capture, to organize and to publish the information. If your numerical fortress reach the SEO level it should have, if you drive it smartly, you become able to DECIDE, you the victim, what answers Google will show about your stalker, on the same way you already decide for yourself. It might be hard to believe, but it works. You can have a look, here.
The first two images, showed on the first SERP’s, are two portraits of my last aggressor. They were in the past connecting to publications shared by R.A. They, now, link to papers documenting her stalking.
4. Evidencing the numerical fortress model relevance for Google search.
Google is the first place where people come for getting information about you. This is the first space which has to be clean.
Make a Google text search on my name “Bernard Grua”. Look at the result. There are no publications from the three malevolent people mentioned above.
Usually, it is considered the three first lines of a the first SERP are the most important ones. The best is to have the first three pages clean. Here, there are seven pages of answers. They are ALL clean. They are all DECIDED by me
Make a Google image search on my name. Look at the result. They are made (on the top), decided or accepted by me. This is the same situation for “News” or “Videos” searches.
5. Evidencing the numerical fortress model relevance for Social Media.
The most important result is on Google search. There is no doubt about it. However, make a search under “Bernard Grua”, “@BernardGrua“ or “#BernardGrua” on Facebook, YouTube, Instagram, Flickr, Twitter. All of this is also 100% clean. I will not reveal the modus operandi of my model. It should not be used by toxic people. I can answer to private messages if you have a specific problem. However, I will give two tips. One about Facebook and one about Twitter. Just remember to identify precisely who is in front of you. If it is a troll, just do nothing. If it is a psychopath, read what follows.
5.1. What do you need to know about Facebook?
5.1.1. Breath and take your time
If you are facing an attack on Facebook, don’t over-react and refrain from jumping on your keyboard. Facebook has a very poor SEO. It is likely that nothing will come into Google search. If you need to do something, organize your counter-attack outside Facebook. Don’t answer directly on Facebook. Of course, NEVER answer under a post of an aggressor or in private conversation. Just force your aggressor to shadow his publications, making private his pages or groups. Then, your aggressor will not increase his audience. Moreover his already existing audience will get bored by his endless ranting. Your aggressor will slightly kills his followers. This also presents the advantage to make your aggressor’s posts inaccessible for Google and for other users. Doing so, you force your stalker to reduce by, himself, the scope of his defamation.
5.1.2. Prepare the trap
How can you force this shadow? It is quite simple. Collect the worst posts of the psychopath. Publish these captures as images, WITH TEXT (for SEO purposes). A psychopath is governed by emotion. A psychopath has no personal censorship. A psychopath has no memory. Then, he contradicts himself, according to his always changing mental dispositions (from deep depression to euphoria) and most of the time publishes violence. A psychopath is so excessive that he prefers to publish anonymously. Though it is possible to trace him, because he is also an exhibitionist. This is your chance. Once you did your home-work and you documented it on a support (Blog, Instagram, YouTube, Flickr and why not, national media) with (“NoFollow”!) links to the initial publication of your stalker, then, and only then, share it on Facebook and Twitter.
5.1.3. Look a the cockroach rushing to turn off the light
Your aggressor will run like a cockroach under the light. He will make sure his delirium cannot be seen by normal people. Your aggressor will change the privacy of his posts and even the country accessibility. That’s how R.A. wrote off the thousands of hours she spent cooking her poison on Facebook.
5.2. What do you need to know about Twitter?
It took me time to have a clear and dispassionate vision of this machine designed for breaking people. Although, I still have a lot to learn about this media, I think I am, now, able to address the main issues. I will not develop my tool-box but I will present my major learnings.
5.2.1. Twitter administrators are toxic, too. They will give you false expectations. They will make you losing time and hope.
First of all, understand nobody will help you, there. Do not spend hours reporting and explaining to Twitter moderation. Like for many other people, it was my mistake. Twitter business model is based on bad buzz for grabbing audience and getting advertising revenues. They will never kill the milk cow running on Fake News, anti-Semitism, Islamophobia, racism, calumnious denunciation, religious intolerance, homophobia, defamation, stalking, conspiracy theories, hatred, etc. Only a mega class-action will make us rid of this mephitic machine. It will come. But it is not our job. Cross the finger and think about doing something else.
5.2.2. Common answers are useless.
Don’t believe in the nice advice I heard so many times. Blocking people, deleting your Twitter account might help you with trolls. But you will lose a useful audience you built over years and it will NEVER help you with psychopaths. They will continue their attacks because they don’t talk just to you. Even if they repeatedly “ask” you the same oriented closed questions (though they blocked you… but who knows it?) for which they know the answers, this is just provocation. They are staging a conversation. They are deceiving their audience for making it considers you have the right to answer. Then, if you don’t answer (of course you can’t, you are blocked), it is mean you agree with the accusation. They are looking for recognition. They want to launch harassment in pack against you.
5.2.3. Stay calm, you can manage it!
Don’t be too emotional. Remember two things.
- The first crucial point is that Twitter has an extremely poor SEO. It is very un-frequent a Twitter post will be shown on SERP’s.
- Second point, remember a Tweet’s life is short. Not more than 30 minutes.
Then, doing nothing is the best? Of course not.
What should be your indicators?
Create a Twitter profile, with no posts, no comments and no likes that you will use for your survey. Because your regular profile is blocked by your stalker and you will not be able to see what he posts against you. Then, you would be blind. Make a search under your complete name, hashtag and Twitter name. In the results, you have to consider two answers.
- The first answer, the most important one, is “Top Tweets.” Here, will be shown the most popular tweets about yourself. Pay attention. They are quite permanent. Make sure you are the author of these most popular tweets about you. That for, you need to make nice and beautiful posts, able to attract a large audience, getting likes, comments and re-Tweets. Use the proper hashtags, including YOURS. Have also your full name in your posts. Yes, it looks a bit narcissistic, but it is a light price to pay.
- The second answer is “Latest Tweets.” These are under your control. When you are under fire, come once a day on Twitter and post good popular stuff. No need to mention your stalker.
- “People” if you documented properly your profile (see below), you and only youo, should be there.
- “Photos” & “Videos”, remember to post some of them to fill in your Twitter space and to not leave your aggressor occupying it. Review their results from time to time.
Don’t be impressed by the immense flood of trash produced by your stalker. Volume does not work for having top Tweets and the audience get bored.
Focus on quality tweets.
Control your emotions. Take your time. Prepare your Tweet. Wait. Come back again. Read it with another mood and post it. Don’t tweet under emotion!
Think about full name and hashtag
Last but not least, make sure your full name and hashtag are in your Twitter profile and bio.
My Twitter name is my full name “Bernard Grua“. I also added the hashtag #BernardGrua. My Twitter username is @bernardgrua. Note also that, my Twitter full name, my Twitter username and my hashtag are in my bio. Any search under my name on Twitter will first show my profile, not something cooked by a troll or a stalker.
Search for the “Top Tweets “ result for Twitter username, Twitter full name and hashtag. They can be quite permanent. You have to monitor them. Make sure your aggressor NEVER comes on the top of this list!
As long as your aggressor’s Tweets don’t arrive into Google search results, monitoring your Twitter account is not a big deal. There are few indicators to follow. Corrective actions are not very demanding. Twitter might be considered as the highest source of stress when you are stalked. It should not be. As explained it would be unproductive to run away, to close your account and to make a cyber-criminal drawing your E-reputation on this media. Don’t leave the floor! Keep the floor and expel your tormentor from there. What follows shows you have good cards in your hands.
A cyber-criminal wants to stay anonymous on Twitter. Let’s see why. Writing the full name and the hashtag of your stalker on your Tweets, you take the full control of his image. There is nothing he can do. Because he does not want to write his name… Then, while the harasser may produce until 100 tweets per day against you, you just need to post very few tweets per week to clean your image and to take care of the bully.
Of course, once you found the identity of your tormentor, he will accuse you of “doxing”… Don’t be impressed. These people are expert in manipulation. That’s their usual game. Just remember it comes from someone going until stealing your name into his Twitter Id, bio, etc… You will be accused of murderous intentions. Don’t be scared. That’s normal. That means your are on a good way.
To get out of his own trap, your aggressor will open a new Twitter account (with zero audience, so good luck for making top Tweets…). Or, if he is smarter, he will rename one of his previous accounts into his real name. PROBLEM! You already created two Twitter accounts under his FirstName-LastName and his LastName-FirstName. Of course, you will not use these accounts. You are not a criminal identity-theft like your stalker.What started like a sadistic entertainment for your bully becomes a nightmare for him. Sic semper tyrannis!
Thank you for your interest! Thank you for having reached the end of this paper! Now, you might say: “this guy is a mythomaniac”. Not at all. I received, and I receive tons of trash, calumnious denunciations, insults, defamation. All of this is documented. I have been called a leftist, a communist, a socialist, a fascist, a neo-Nazi, a torturer, a clown, a CIA agent, a subversive agent, a sedition agent, a spy, a pedophile, a colonialist, a white-supremacist, a warmonger, a monster, a crook etc… Sometimes by the same people. But the prophylaxis model works and I reduce my psychopathic aggressors into puzzles. You can do the same. Yes, you can!
The readers who are facing the same unbearable stalking and need some more information can read my initial article with more documented evidences and screen captures. In this kind of situation the victim is usually left alone. Don’t worry, you can contact me. I would be delighted to give you some help. I know what you are going through.