Updates from Barbara Toggle Comment Threads | Keyboard Shortcuts

  • Barbara 06:49 on May 28, 2015 Permalink | Reply
    Tags: , , , , , ,   

    Sexual Sadism and Psychopathy, Sociopathy 

    ANTISOCIAL PERSONALITY DISORDER
    According to the DSM-IV, the essential feature of the disorder is to be found in patterns of irresponsible and antisocial behaviors beginning in childhood or early adolescence and continuing into adulthood. Lying, stealing,truancy, vandalism, initiating fights, running away from home, and physical cruelty are typical childhood signs. In adulthood the antisocial pattern continues and may include failure to honor financial obligations, maintain consistent employment, or plan ahead.

    These individuals fail to conform to social norms and repeatedly engage in antisocial behaviors that are grounds for arrest, such as destroying property, harassing others, and stealing. Often these antisocial acts are committed with no seeming necessity. People with antisocial personality disorder tend toward irritability and aggressivity, and often become involved in physical fights and assaults, including spouse and child beating. Reckless behavior without regard for personal safety is common, as indicated by driving while intoxicated or getting numerous speeding tickets.

    Frequently these individuals are promiscuous, often failing to sustain a monogamous relationship for more than one year. Some marry but do not remain faithful. They do not appear to learn from past experiences in that they tend to resume the same kinds of antisocial behaviors they were punishment for. Finally, they seem to lack feelings of remorse about the effects of their behavior on others. On the contrary, they may feel justified in having violated the rights of others.

    SEXUAL SADISM
    Meloy (1992) defines Sexual Sadism as “the conscious experience of pleasurable sexual arousal through the infliction of physical or emotional pain on the actual object.”(p.76)

    DSM-IV describes Sexual Sadism as follows: Over a period of at least six months: recurrent intense sexual urges and sexually arousing fantasies involving acts ( real, not simulated) in which the psychological or physical suffering (including humiliation) of the victim is sexually exciting to the person. These behaviors are sadistic fantasies or acts that involve activities that indicate the dominance of the person over his victim. (not always physical!)

    FROM: http://www.practicalhomicide.com/articles/psexsad.htm

    (PLEASE NOTE: not ALL Sexual Sadists are Serial Killers!! Some direct their sadism into mental & emotional torture and psychological rape. – And are rarely seen as the sadists they truly are)

     
    • luverley 06:01 on May 29, 2015 Permalink | Reply

      Yeah that’s me -bitch.

      Like

    • luverley 14:37 on June 30, 2015 Permalink | Reply

      Haha oh my god I was just going to comment and say that sounds like someone in my system but she already wrote it. Hahaha

      Like

  • Barbara 06:45 on May 28, 2015 Permalink | Reply
    Tags: , , , , , ,   

    Online Harassment and Cyberstalking 

    A Real Life Problem

    The Internet is a wonderful place to work, play and study. But don’t let that fact make you blind to its down side. The Net is no more and no less than a mirror of the real world, and that means it also contains electronic versions of real life problems. Stalking and harassments are problems that many people especially women, are familiar with in real life. These problems can also occur on the Internet, in what has become know as “cyberstalking” or “online harassment”.

    If you thought that owning a computer and having an Internet account would make a person considerate and respectful; then think again. There are just as many predators in cyberspace as anywhere else. It is only their methods that have changed. Some predators might harass you by trailing around after you in live channels like lovesick puppies; unable to take NO for an answer and pestering you with email messages. In other cases this harassment may become a systematic campaign against you; where your harasser bombards you with threatening messages of hate and obscenities. Although distressful enough, the situation can even escalate to the point where your harasser traces your home address and telephone number; causing you to face not just emotional distress but also physical danger. It should come as no surprise to you that the “bad guys” are making use of this wonderful technology to harass people and prey on the innocent. Why wouldn’t they? Not all bad guys are street punks with no education. Some are university graduates with computers.

    There have been many examples of cyberstalking crossing over to “IRL” stalking (In Real Life stalking). Sadly, those users who have been victims of cyberstalking, tell a similar story: That no one took the harassment seriously until it became “IRL”. Cyberstalking can be a devastating experience for a person online. As they discover that the difference between the “Brave New World” of the Internet and the Real World is that in the real world people listen when you tell them you are being stalked and harassed. In cyberspace people say things like “well just turn off your computer”. Such incomprehension is common. “You can’t be hurt on the Internet – it’s just words” is commonly heard and “If you can’t handle it, then you shouldn’t be online” is another commonly hear comment. The online stalking is just as frightening and distressing as off-line stalking, and just as illegal.

    Men and women may be stalked on-line, but statistics show that the majority of victims are female. Women are the minority of the Internet population which means that their attention is generally a fierce competition between male users. This part of the Internet, resembles crude online single bars, with little in the way of politeness. Unfortunately the immediate and relative anonymity of live chat communications facilities enable users to be rude and insensitive. Cyberstalking and online harassment are also much easier to practice than real life stalking. In cyberspace, a stalker can harass their victim without ever have to leave the comfort of their own home, or have any witnesses to the incidents.

    One reason for the lack of successful prosecution of cyberstalkers, is that there usually is a lack of sufficient evidence available for the officials to warrant “probable cause” in order to further investigate. Many law enforcement agencies are Internet illiterate, therefore unaware that the problem could and does exist. To date, the only legislation regarding cyberstalking is the Communications Decency Act, enacted by the US Congress on 2-1-96, and is still being challenged in the Supreme Court. The real life, anti-stalking laws deal with actual attacks, and until such an attack happens, are actually very limited in defending yourself, or preventing any progression of the stalker. There is very little done about threats or harassment in the early stages.

    Online users are vulnerable to being targeted as cyberstalking victims in three areas.

    1) Live Chats (Facebook, Yahoo, Skype, Messenger) or IRC (Internet Relay Chat): in which a user talks live with other users. This is the most common place for cyberstalking.

    2) Message boards, Blogs, Reunion Sites, Support Groups and Newsgroups: a user interacts with others by posting messages, conversing back and forth.  Boards for emotional issues such as divorce; death; domestic violence are especially prone.  Disordered persons can track others they disagree with for years reeking all sorts of havoc.

    3) Email box: a user has the ability to write anything and even attach files to the email.

    Example: a user enables your email, via live chat or newsgroup postings, then emails you with obscenities, and attaches porno pictures. A common area regarding cyberstalking is at the “edu” sites, which are educational institutes, such as colleges and universities.

    One user might know another user personally and interacts on the Internet anonymously, so starting the cyberstalk. One student can enter the Internet as easily as another student, therefore not letting his true identity be known. And since user names can be unknown alias, who would ever know the identity or be able to prove the identity. In such cases, the stalker usually has the ability to trace the victim’s phone number and sometimes the address of his victim. Another includes interpreting a posting you may have made on a message board regarding your opinion as an “attack” if it differs from theirs. The stalker then becomes fixated on proving you wrong.

    Other forms of online harassment:

    1) Unsolicited email

    2) Live Chat

    3) Hostile Postings about you, using a few “facts” to make an untrue picture

    4) Spreading vicious, fabricated, untrue rumors about you (as opposed to telling the Truth at exposure sites)

    5) Leaving untrue messages on site guestbooks

    6) Impersonation of you online

    7) Electronic sabotage, (sending viruses, trojans, etc)

    8) Threatening phone calls

    9) Threatening mail

    10) Vandalism of property

    11) Physical attack

    12) Posing as you on groups, in emails or in postings.

    There are many precautions that you can take NOW to protect yourself in advance from the unwelcome attention of a cyberstalker. Remember: The goal of a cyberstalker is CONTROL. Your task is to reverse this situation. Keep control of who you communicate with on the Internet. To do this, you may like to consider the advice below. Remember, the time to deal with cyberstalking is before you become a target.

    CYBERSTALKING PREVENTION TIPS

    If you are being harassed online by a cyberstalker, the chances are that you are not the first person they have stalked. Cyberstalkers, like other predators, are opportunists. They know what they are looking for and how to get it. “Stalking” is a “power” crime, the stalkers has the power to make you suffer and enjoys that power. Stalkers’ self-esteem rises when they attack your self- esteem. The more pain and suffering they can cause, the better they feel about themselves. The best protection against becoming a target of stalking is not to reveal anything personal that you might have in common. Often, stalkers are mentally unstable, paranoid, delusional, and extremely jealous, and have extremely low self-esteem. Stalkers may display selfishness, malice, sadism, be very cunning and arrogant. Most are anti-social, and to put it in layman’s terms, be a “control freak”, enjoying manipulating other people. They crave power over others, and enjoy the type power that hurts other people. harassment is common enough in live chat on the Internet.

    The three most common ways it can start are:

    1) sexual harassment (or innuendo);

    2) a flame war (argument that gets out of hand);

    3)users that show their technological power by attacking innocent users, channels or even networks.

    Those who regularly start flame wars online are rude and obnoxious people, often having poor social and communication skills. Their idea of fun is throwing obscene abuse at another just to upset them. These kind of harassers are often loners who don”t have a companion and their attempts to attract your attention is often clumsy and crude. Care should always be taken when turning the away, as the are highly sensitive to rejection and humiliation, and could cause a vendetta to start against you. Understand that although clumsy and crude in most cases, the stalker is not stupid, they are very organized and usually experienced in their war against you.

    Stalking is a form of obsession. The difference between a normal cyber harasser and a cyberstalker, is this: harasser moves on to others and forgets you and a stalkers will come back to stalk you another day.

    The Internet enables the stalker, his powers, in most cases, merely a knowledge of the technology is all required to have the ability to stalk another user. Most stalkers, having been rejected desire to instill fear in users, therefore, upsetting the normal enjoyment of the Internet.

    Note that educated, smooth talking, responsible people also can be stalkers, appearing to be a perfect gentleman or lady with perfect manners. The major “clue” to cyberstalking, is when the stalker pushes for information regarding you personal life, private life, or life away from the net. Rule of thumb, as it may be referred to is: “NEVER GIVE ANY PERSONAL INFORMATION ACROSS THE INTERNET!”

    Online meetings should stay online, the individuals are, in fact, strangers. Online, the physical warning signs usually in the “body language” are missing. Also the clues of personality within the voice and eyes are missing. All there is to determine a personality is the skill in which they type there messages. There is no code of honor in protecting privacy on the Internet. Each user should therefore take steps to protect their privacy online.

    1) never specify gender

    2) use neutral-gender names

    3) change your password often

    4) edit your online profiles often

    5) review your email headers and signatures often

    6) use secure chat programs that do not permit tracking of your isp#

    7) use a good chat network

    8) use standard names, passive names to as to not draw attention to you

    9) use anonymous remailers

    10)use an anonymous browser

    11)use encryption to authenticate email

    12) discuss privacy with your server.

    And last: learn your technology. REMEMBER: PROTECT YOURSELF!

    GRAFX-SPECS DESIGN & HOSTING

     
  • Barbara 06:51 on May 18, 2015 Permalink | Reply  

    THE NEUROBIOLOGY OF EVIL 

    by John Cookson

    Is a person’s propensity toward evil a matter of malfunctioning synapses and neurons?

    Michael Stone, professor of clinical psychiatry at Columbia University and author of “The Anatomy of Evil,” says it is. Ever-more-detailed brain scans are revealing the biological origins of psychological issues in “evil” people, from those who are mildly antisocial to serial murderers.

    Under each brain’s wrinkly cortex lies the limbic system, an evolutionary heirloom controlling emotion and motivation, among other functions. Within this limbic system is the amygdala, an almond-shaped cluster of nuclei that processes our feelings of fear and pleasure.

    Murderers and other violent criminals have been shown to have amygdalae that are smaller or that don’t function properly, explains Stone. One recent study concluded that individuals who exhibit a marker of “limbic neural maldevelopment” have “significantly higher levels of antisocial personality, psychopathy, arrests and convictions compared with controls.”

    The amygdala is important because, among its other functions, it allows an individual to respond to the facial expressions of others. When a person has an abnormal amygdala—one that doesn’t process the facial expressions of emotion—they can have an inability to register the fear and suffering of a victim, says Stone. This lack of response to the emotions of others predisposes an individual to antisocial, even criminal, behavior.

    Under normal development, empathy from a full-functioning amygdala pairs with a moral “braking system” in the brain’s higher-functioning cortex. This connection halts deep-rooted urges from our neural-narcissistic lizard brain, keeping each of us morally and socially in step. However, if that connection is not operating properly, says Stone, “the person may go ahead and do the unspeakable, which otherwise he would have put the brakes on or maybe even not even contemplated doing it in the first place.”

    A biological predisposition to antisocial behavior is not a sentence to criminality, but research shows a significant population of antisocial personality disorder among people in prison. A 2002 review of 62 studies sampling 2,300 prisoners found that almost half—47%—had antisocial personality disorder, which can be linked to or aggravated by developmental issues with the prefrontal cortex and with other parts of the brain.

    This link between criminality and the brain has generated interest in where neurology and the law meet. Neurolaw—and more generally neuroethics—is a hot topic in universities, law schools and, increasingly, the judicial system. The newest brain-scanning technology is leading academics, lawyers, judges and scientists to reevaluate or reinforce laws that have been based on the culpability of the person, not of the brain. Legal defenses that blame the brain while exonerating the “person” have not flooded the courts, yet the attention among academics is undeniable, with papers, foundation-organized seminars, blogs and courses proliferating. In 2007, for example, more than two dozen universities were awarded a share of a $10 million MacArthur project specifically to study this intersection of law and neuroscience.

    The implications don’t end there. Brains are built from the blueprints encoded in our DNA, a fact which is leading the newest research to seek out specific genes that predispose people toward antisocial—even “evil”—behavior. According to a review of recent research, at least seven specific genes have been identified that both are linked to antisocial or aggressive behavior and are thought to organize how brain growth is structured. These seven—MAOA, 5HTT, BDNF, NOTCH4, NCAM, tlx, and Pet-1-ETS—are the usual suspects for neuroscientists looking beyond brain anatomy to the genetic origins of “evil”.

    Takeaway

    Thanks to MRI and PET brain scans, we now know more than ever about how deficiencies in certain parts of the brain may underlie “evil” behavior. These scans show antisocial, rule-breaking populations who prone to criminality have structurally impaired sections of the brain, such as the amygdala.

    The implications of a brain-based origin for “evil” potentially open up testing for predisposition to antisocial, even psychopathic, behavior early in a life. A study published in November by the American Journal of Psychiatry suggests that amygdala dysfunction in children as young as three can cause a lacking response to fear that precedes criminality in adulthood.

    http://bigthink.com/ideas/23882

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel
%d bloggers like this: