in internet insagtivetion and computer crimes. this kind of pi can take an email and trace it back to the owner. they can contact the web owner and obtain identifying information beyond the proxy registration. they can even contact anonymous blog sites and identify those bloggers.the cyber bully