U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS

A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Breadcrumb
  1. Home
  2. Cyberbullying
  3. Cyberbullying Tactics

Cyberbullying Tactics

Cyberbullying and bullying can negatively impact the lives of all who are involved. Because cyberbullying can happen in different ways, examples based on real-life experiences can provide a deeper understanding of the tactics typically used.

With the right interventions, cyberbullying can be addressed to lessen potential harm and negative outcomes. When not addressed, cyberbullying can have long-term mental health effects. Along with other risk factors, bullying can increase the risk for suicide-related behaviors. Furthermore, cyberbullying can be relentless, increasing the likelihood of anxiety and depression.

Common cyberbullying tactics

Social targeting and rumor spreading

Posting comments or rumors about someone online that are mean, hurtful, or embarrassing.

Example: A teenage girl was harassed by other girls in her class for dating a very popular boy. The girls sent her hateful messages via text and social media and wrote derogatory messages on her school locker.

Example: A group of students got into trouble at school for being drunk and accused a girl who knew nothing about it of reporting them to the school officials. They began texting her day and night, and posted hateful, derogatory messages on social media. Other students saw their messages and joined in harassing the girl. She was bullied constantly via text, and in person at school. She eventually shut down her social media accounts and changed her phone number. Still, the bullying at school continued.

Encouraging self-harm or suicide

Threatening to hurt someone or telling them to harm or kill themselves.

Example: A young boy with a physical disability and scars on his face was harassed on social media and via text by other students. They called him derogatory names and told him he’d be better off dead. They wrote “why don’t you die?” on his school locker and encouraged him to take his own life.

Impersonation and deception (catfishing)

Pretending to be someone else online in order to solicit or post personal or false information about someone else.

Example: A girl’s classmate created a fake social media account in a boy’s name and began an online relationship with her. Though she had not met him in person, the girl divulged personal information about herself and her family to this “boy.” The classmate who created the fake account then shared the personal information with other children, who used it to bully, shame, and harass the girl.

Privacy violations and exposure (doxing)

Publishing an individual’s personal or private information, such as their real name, address, social security, credit card or phone numbers.

Example: A teenage boy posted comments on a public gaming forum, expressing his dislike of certain game features and tactics. Another user disagreed with him in the forum, then searched for the boy’s information online and posted his address, email address, and social media links in another comment. The boy then received multiple emails and messages from strangers threatening to come to his home and assault him, and to block him from games.

Photo and video sharing and exploitation

Creating, posting, or sharing online content, such as pictures, videos, and webpages, with the intention to be mean or hurtful. In the digital age, the explicit material may have been created through photo editing or generative artificial intelligence (AI).

Sometimes nude photo/video sharing is done in a context described as “revenge porn.” Other times, the sharing of nude photos by someone who obtained the explicit material of a child through threats, deceit, or coercion can be described as “sextortion.”

Example: A teenage girl sent a nude photo of herself to her boyfriend while they were dating. After they broke up, he shared the photo with other children, who then called her hurtful, derogatory names via text and social media.

Example: Late one evening, an adult man pretending to be a 15-year-old girl began chatting with a 15-year-old boy online. The purported girl struck up a flirtatious conversation and sent the boy a naked picture, purportedly of herself, and asked the boy for one in return. Right after the boy agreed and sent the picture, the purported teen girl repeatedly and angrily threatened to widely distribute the boy’s image unless the boy immediately sent $500.

Harassment based on identity or status

Posting mean or hateful names, comments, or content about someone’s identity, status, or other personal characteristics online.

Example: Students posted mean, negative comments on another classmates’ social media account, commenting on his clothes and sneakers, which were not the more expensive name brands most of them were wearing. They ridiculed him, calling him “poor” and continued the bullying in school. The boy missed many days of school trying to avoid the harassment and embarrassment.

Example: A teenage boy began receiving death threats via phone, text, and social media for being gay. Students created an anti-gay social media group and harassed him, posting hateful messages about him.

Some forms of cyberbullying are forms of harassment that cross the line into criminal activity. Some states have chosen to prosecute young people who bully for criminal harassment, including encouraging someone to die by suicide. Other tactics may occur in dating relationships and can turn into interpersonal violence.

What to do

It is important to understand how children are cyberbullied so it can be easily recognized and action can be taken. If you or a child in your life has experienced bullying or cyberbullying, you can get help now.

In 2025, the President signed the bipartisan TAKE IT DOWN Act into law. This law protects victims of digital exploitation by prohibiting the sharing of such content and requires certain online platforms to remove such content.

When sensitive photos or videos are shared without a child’s consent, there are steps that can be taken.  The child can talk with a parent/caregiver, trusted adult, school official, or local authorities. A report can be filed with the Federal Trade Commission.

In addition to federal laws, your state’s laws may offer other protections from cyberbullying.

Date Last Reviewed