Update: I Have Since Blocked All Of The Spam Accounts (24 In All) Which Had Appeared Under My Name, Cat Ellington, In Twitter Search—Created For The Specific Purpose Of Obsessively Stalking Me On The Platform.
. . . The Account Falsely Named "Jane Duncan" Had Too Been Named "Catherine Ellington" Before My "Exposé" Of These Accounts Began On March 22, 2018
— Cat Ellington
My Original Post Is As Follows:
Hello, My Dearly Beloved Men & Women. How Are Y'all Doin'? Y'all Alright? Oh, I Hope So. I Am Bringing About A Series Of Posts On This Date That Pertain To Some Very Disturbing, Not To Mention Lewd And Offensive Activity Towards The Existence Of My Twitter Profile.
Disturbing Because I Have A Legitimate Reason To Suspect That The Following Accounts (Pictured In The Screenshots) Were Created For The Sole Purpose Of Harassing Me By Way Of The "People" Section Under My Name, Cat Ellington, In Twitter Search; And Lewd/Offensive Because Of The Content (Including The Practically Nude Women In The Profile Pics) Associated With Said Accounts.
There Isn't A Doubt In My Mind, Dearest Guys & Gals, That These Accounts Are All Fake, Even Every Single One Of Them. And As I Am Not One Who Goes Through Life Bearing False Witness Against Others, Neither Are Stupidity And Gullibility My Strong Suits. For As Surely As Tar Is Black As The Ace of Spades, I Have Brawny Reason To Believe That These False Accounts—Showcasing Practically Naked Women Attached To Pornographic Content—Were Created In-House, At Twitter, Inc., By Either One Particular (Male) Member, Or By Quite A Few (Male) Members Of That Company's Staff.
I've Also A Brawny Reason To Suspect That The Names Given To The Scantily Clad Women On These Accounts Are Too Fictitious, As It Is Terribly Impossible To Believe That All Of These Individual Women—Each One Different From The Others—Are Named "Catherine Ellington."
Although "Catherine" Is Not My Name, In Order For These Deliberately Created False Accounts To Be Able To Appear In Twitter Search Under My Name, Those Responsible For Creating These Dummy Accounts Would Have Had None Other Choice But To Use The Name "Catherine," As "Cat" Itself Would've Been Too Obvious.
Here, "Russian Hackers" Cannot Be Faulted, No, But Here, The Annoying Obsession Lies In-House.
This, My Dearest Men & Women, Is The Hunch Of My Gut. And The Hunch Of My Gut Has Never Misguided Me.
Today, For The Sake Of "Keeping The Peace" With The One(s) In Power At Twitter, Inc., I Will Not Engage In Name-Dropping. However, Should These In-House Members Continue On With Their Unprofessional, Miserable, Obsessive, Ignorant, Malicious, And Harassing Actions Towards Both My Account (Which I Am Still Not Going To Pay To Have Verified) And Me, Then I Will Be Forced To Drop Names And Bring Forth A Fierce Witness Against Such A Person Or Persons, That The Peoples—Be They Fellow Public Figures, Or Members Of The General Public—Will Surely Come To Know The Truth Of My Sometimes Loathsome Experience, Even Over The Last Six Calendar Years . . . As A User Of Twitter.
Ladies And Gentlemen, I Do Believe That I've Counted—To Date—Between 21 To 25 Of These Fraudulent "Catherine Ellington" Twitter Accounts. And They Will Appear In Succession Over A Number Of Following Posts. I Ask That You All Note These Accounts Well. I Also Ask, My Dear Ones, That You All Note My Name, Cat Ellington, In The Search Bar.
I Love Y'all.
— Cat Ellington (The Real One)
FYI: Least Any Of Them Should Play The Hypocrite, Please Consult The Following Rules Of Twitter's Spam Policy (Note The Check Mark. No Pun):
• The Twitter Rules (and policies)
✔Spam and Security
We strive to protect people on Twitter from technical abuse and spam.
To promote a stable and secure environment on Twitter, you may not do, or attempt to do, any of the following while accessing or using Twitter:
• Access, tamper with, or use non-public areas of Twitter, Twitter’s computer systems, or the technical delivery systems of Twitter’s providers (except as expressly permitted by the Twitter Bug Bounty program).
• Probe, scan, or test the vulnerability of any system or network, or breach or circumvent any security or authentication measures (except as expressly permitted by the Twitter Bug Bounty program).
• Access or search, or attempt to access or search, Twitter by any means (automated or otherwise) other than through our currently available, published interfaces that are provided by Twitter (and only pursuant to the applicable terms and conditions), unless you have been specifically allowed to do so in a separate agreement with Twitter. Note that crawling Twitter is permissible if done in accordance with the provisions of the robots.txt file; however, scraping Twitter without our prior consent is expressly prohibited.
• Forge any TCP/IP packet header or any part of the header information in any email or posting, or in any way use Twitter to send altered, deceptive, or false source-identifying information.
• Interfere with or disrupt the access of any user, host or network, including, without limitation, sending a virus, overloading, flooding, spamming, mail-bombing Twitter’s services, or by scripting the creation of content in such a manner as to interfere with or create an undue burden on Twitter.
Any accounts engaging in the following activities may be temporarily locked or subject to permanent suspension:
• Malware/Phishing: You may not publish or link to malicious content intended to damage or disrupt another person’s browser or computer or to compromise a person’s privacy.
• Spam: You may not use Twitter’s services for the purpose of spamming anyone. Spam is generally defined on Twitter as bulk or aggressive activity that attempts to manipulate or disrupt Twitter or the experience of users on Twitter to drive traffic or attention to unrelated accounts, products, services, or initiatives. Some of the factors that we take into account when determining what conduct is considered to be spamming include:
° if you have followed and/or unfollowed a large number of of accounts in a short time period, particularly by automated means (aggressive following or follower churn);
° if your Tweets or Direct Messages consist mainly of links shared without commentary;
if a large number of people have blocked you in response to high volumes of untargeted, unsolicited, or duplicative content or engagements from your account;
° if a large number of spam complaints have been filed against you;
° if you post duplicative or substantially similar content, replies, or mentions over multiple accounts or multiple duplicate updates on one account, or create duplicate or substantially similar accounts;
° if you post multiple updates to a trending or popular topic with an intent to subvert or manipulate the topic to drive traffic or attention to unrelated accounts, products, services, or initiatives;
° if you send large numbers of unsolicited replies or mentions;
° if you add users to lists in a bulk or aggressive manner;
° if you are randomly or aggressively engaging with Tweets (e.g., likes, Retweets, etc.) or users (e.g., following, adding to lists or Moments, etc.) to drive traffic or attention to unrelated accounts, products, services, or initiatives;
° if you repeatedly post other people’s account information as your own (e.g., bio, Tweets, profile URL, etc.);
° if you post misleading, deceptive, or malicious links (e.g., affiliate links, links to malware/clickjacking pages, etc.);
° if you create fake accounts, account interactions, or impressions;
° if you sell, purchase, or attempt to artificially inflate account interactions (such as followers, Retweets, likes, etc.); and
° if you use or promote third-party services or apps that claim to get you more followers, Retweets, or likes (such as follower trains, sites promising "more followers fast", or any other site that offers to automatically add followers or engagements to your account or Tweets).