Internet Safety Education
Cybercrime & Cyber Attack Prevention
iPredator is an internet safety, cybercrime and cyber attack prevention website exploring the dark side of cyberspace and cybercriminal minds. iPredator is also a conceptual framework addressing cyberbullying, cybercrime, cyberstalking, cyber terrorism, cyber harassment, online sexual predation, internet addiction and online deception. iPredator Inc. is a New York State Company providing education, investigation and consultation to professionals and the community.
The vast amount of information provided within this site is available at no cost, nor requires having to enter personal information to access and download. As author of iPredator and founder of iPredator Inc., Dr. Nuccitelli and his associates are always available to answer questions about theirinternet safety tools, professional services, cyber security membership, social media safety services, professional education services, and cyber attack investigation network. To reach Dr. Nuccitelli, feel free to call him at  871-2416, via email at firstname.lastname@example.org or visit the contact page.
iPredator was developed to confront the widespread growth of cyberbullying, cyber harassment, cyberstalking, online sexual predation, cybercrime, cyber terrorism and online victimization. Their mission is to reduce victimization, abuse, theft and disparagement from online assailants engaged in nefarious and malevolent activities. This website began development in June, 2012, officially published Summer 2013 and represents their first step to educate, inform and advise online users, law enforcement, court systems and communities on the dangers lurking in cyberspace.
Chief Executive Officer & founder of iPredator Inc, Michael Nuccitelli Psy.D., is a New York State licensed psychologist and certified forensic consultant. In 2006, Dr. Nuccitelli formulated Dark Psychology, which explores the criminal, destructive and deviant drives in humanity. In 2009, he developed the Information Age Forensics construct, iPredator, which delves into the cybercriminal minds of those who use Information and Communications Technology (ICT) for nefarious and malevolent reasons.
Provided below are brief definitions of Dark Psychology, iPredator and iPredator Bridge central to all iPredator Inc. strategies and tactics, as well as, the typologies that the iPredator construct includes.
Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon others motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior.
Dark Psychology postulates there is a region within the human psyche that enables some people to commit atrocious acts without purpose. All humans have a reservoir of malevolent intent ranging from minimally obtrusive and fleeting thoughts to pure psychopathic deviant behaviors without cohesive rationality.
CRIMINAL, DEVIANT & CYBERCRIMINAL MINDS
Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humans have this proverbial cancer residing deep within their psyche. From the moment we are born to the time of death, there is a side hidden within us that some call evil and others have defined as criminal, deviant or psychopathic. Dark Psychology assumes there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area Dr. Nuccitelli and his associates endeavor to explore.
“Dark Psychology is both the study of criminal and deviant behavior and a conceptual framework for deciphering the potential for evil within all human beings.” Michael Nuccitelli Psy.D., C.F.C. (2009)
The Cybercriminal Mind
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.
iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
I. A self-awareness of causing harm to others, directly or indirectly, using ICT.
II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace.
Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity, if they so decide, while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.
“The study, exploration and understanding of iPredator are the first steps in the humanization of global Information and Communications Technology. By understanding iPredator, humanity walks safely in cyberspace.” Michael Nuccitelli Psy.D., C.F.C. (2012)
iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual and behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant online activities or use complex perceptual distortions to validate the harm they cause. Also different from iPredator are their drives for attacking others.
For those defined in iPredator Bridge, their motivations are cloaked by moral turpitude, self-righteousness and justified convictions. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm, and either proceed in their maladaptive trajectory, or cease and desist. Within this new region, and presently without explanation, many people enter cyberspace and access ICT with their instinctual drive for self-preservation remaining dormant.
Conversely, other people either quickly or gradually conclude that ICT and cyberspace offers an environment that allows the pursuit of maladaptive and pathological goals undeterred by punishment. It is within this process that the ICT user or groups of ICT users transcend into the world of iPredator.
CYBER AGGRESSION MOTIVATED BY PERCEPTUAL DISTORTIONS
Humanity is at the beginning of the Information Age and the motivating factors leading law abiding citizens to engage in nefarious and deceptive online activities cannot be explained. The concept of iPredator and iPredator Bridge construct assumes that ICT has unknown effects upon the mind and influence some to engage in destructive and self-destructive patterns. The creation of ICT and cyberspace is equivalent to the philosophical and psychological societal awe that was created when astronauts took their first steps on the moon.
The Dark Side of Cyberspace
Cyberstalking: Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both an online assailant tactic and typology of psychopathological ICT user. Cyberstalking includes direct or implied threats of physical harm, habitual surveillance and gathering information to manipulate and control a target. Cyberstalking requires a direct or implied threat of physical harm by the assailant.
STALKING & CYBERSTALKING PREVENTION EDUCATION
Examples of psychological threats involves disparagement, humiliation, dis-information dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands. The Internet is a global medium regardless of frontiers, and this creates new possibilities for the growing class of online stalkers.
Cyber Harassment is the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a direct or implied threat of physical harm. Unlike physical harassment involving face-to-face contact, cyber harassment requires the use of ICT and is verbal, sexual, emotional or social abuse of a person, group or organization. The cyber harasser’s primary goal is to exert power and control over the targeted victim(s).
When minors are involved, Cyberbullying is the term describing Cyber Harassment and when direct or implied physical harm to the targeted victim(s) is involved, Cyber Harassment becomes Cyberstalking. Another similar term often used to define Cyber Harassment, but slightly different in assailant modus operandi, is Internet Troll.
Persistent, Repetitive and Offensive Psychological Abuse
Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber harassment differs from cyberstalking in that it is generally does not not involve a credible or implied physical threat.
(click yellow link for 3rd party site with state laws)
Cyberbullying: Cyberbullying is the use of Information and Communications Technology between minors to humiliate, taunt and disparage one another. Cyberbullying is intended to tease, embarrass, deprecate & defame a targeted minor with the assailant’s developmental needs for peer acceptance and recognition being a priori. Dissimilar to physical bullying, cyberbullying does not involve face-to-face contact and primarily occurs online using electronic devices as the tools for information dissemination.
CYBERBULLYING PREVENTION EDUCATION
Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of online bullying can become psychologically devastated and/or internet bullies themselves.
Cyber Bullying Abuser Checklist (CBAC)
Cyber Bullying Abuser Checklist (CBAC-ABR)
Cyber Bullying Target Checklist (CBTC)
Cyber Bullying Target Checklist (CBTC-ABR)
iPredator Probability Inventory-Cyber Bully (IPI-CB)
iPredator Probability Inventory-Cyber Bully Abuser (IPI-CBA)
Cybercrime: Cybercrime is defined as crimes and criminal activity committed on the Internet using Information and Communications Technology as the tools to target victims. All forms of cybercrime involve both Information and Communications Technology and a targeted victim(s). Cybercrime is segmented into two distinct categories involving the focus of the cyber criminal activities.
These activities are focalized on the technology of ICT to achieve the cyber criminal’s aims for personal and financial gain or targeted at the person using the Information and Communications Technology. When the individual is the main target of cybercrime, ICT is the tool rather than the target. These are the crimes, which have existed for centuries in offline societies.
LEARN CYBERCRIME PROTECTION
Scams, Identity Theft and Internet Fraud have existed long before the development of information technology, but in non-digital form. Cyber criminals utilize technological tools that increase their potential pool of victims and make them difficult to identify and apprehend. Cybercrime targets people, property or governments using Information and Communications Technology.
Cyber Terrorism: Cyber Terrorism is the use of Information and Communications Technology (ICT) by iPredators, organized groups and/or terrorist groups to advance their agenda motivated by religious, political and/or philosophical ideologies. Examples of cyber terrorism include:
- I. The use of ICT to organize and execute attacks against networks, and Information and Communications Technology (ICT) infrastructures.
- II. The exchanging of information or making threats electronically.
- III. The act of hacking into computer systems.
- IV. Introducing viruses and malware to vulnerable networks.
- V. Defacement of websites and blogs.
- VI. Denial-of-Service Attacks.
- VII. Terrorist threats made via electronic communication.
HELP COMBAT CYBER TERRORISM
When strategic cyber attacks are motivated for financial gain, these attacks are defined as cybercrime. Cyber terrorism is any premeditated, politically, religious or philosophically motivated attack against information, computer systems, computer programs and data, which results in violence against non-combatant targets by sub-national groups or clandestine agents. A cyber terrorist attack is designed to cause physical violence or extreme financial harm to the targeted victims or community.
The F.B.I. define cyber terrorism as “The premeditated, politically motivated attack against information, computer systems, computer programs and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.”
ONLINE SEXUAL PREDATORS
Online Predation: The typology of iPredator categorized as Online Predators have a variety of different terms used to describe the same patterns and motivations for their abuse. Online Sexual Predators are defined as adult online users who seek to exploit vulnerable children or adolescents for sexual and other abusive purposes. Online Predators are sexual predators who use Information and Communications Technology and the Internet to locate, target and victimize minors.
Common forums used by Internet Predators to target children include chat rooms, instant messaging or social networking sites for the purpose of flirting with and meeting others for illicit sexual experiences. Online Child Predators are motivated to manipulate or “groom” a minor with the ultimate goal of meeting and engaging in sexual activity, despite knowing they are engaging in illegal activities.
In instances where meeting their victims is not the primary objective, Online Predators also attempt to persuade children and adolescents to participate in some form of online sexual and/or sexually provocative activity motivated by financial gain engaging in the distribution and sale of child pornography.
HELP COMBAT ONLINE SEXUAL PREDATION
iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others in the abstract electronic universe known as cyberspace.
Technological advancements have changed the way humanity interacts, exchanges and accesses information. Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It is often difficult to imagine that the Internet used by more than two billion people globally celebrated its 20th birthday in 2011. Clearly, the Information Age has spread to all corners of the planet.
“As society becomes more technologically advanced, the importance of Information and Communications Technology (ICT) becomes vital in the daily living of humanity. Despite the multitude of benefits, the dangers lurking in cyberspace are real, growing and need to be stopped. It may take me 30-40 years, but iPredator Inc. will diligently persist until one day online sexual predators, cyberstalkers and all iPredators experience fear before they proceed with their nefarious, deviant & malevolent plans.” Michael Nuccitelli Psy.D., C.F.C., iPredator Inc. (2013)
IPREDATOR GOOGLE PLUS LINKS
[VISIT, JOIN & SHARING APPRECIATED]
- Google + Profile | Dr. Nuccitelli
- Google + Page | iPredator
- Google + Page | Dark Psychology
- Google + Page | Dr. Internet Safety
- Google + Community | iPredator
- Google + Community | Dark Psychology
(click image for barnes and noble site verifying construct professional recognition)
iPredator Inc. is a New York State based Information Age Forensics company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and the new field they are pioneering termed, Information Age Forensics. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
For visitors interested in learning more about Dark Psychology & iPredator, outside the website, please visit our iPredator & Dark Psychology Google + Community pages and all are welcomed to contribute. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles.
Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media and consult with all online users. To invite Dr. Nuccitelli to conduct training, educational services or consultation, please email him at email@example.com or via phone at 347-871-2416.
- Google +: The iPredator
- Linked In: iPredator
- Twitter: TheiPredator
- YouTube: iPredator Team
- Facebook: The iPredator
- Pinterest: iPredator
“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” Michael Nuccitelli Psy.D., (2012)