share
google iPredator | Dark Side of Cyberspace | Cybercriminal Mindstwitter iPredator | Dark Side of Cyberspace | Cybercriminal Mindsfacebook iPredator | Dark Side of Cyberspace | Cybercriminal Mindslinkedin iPredator | Dark Side of Cyberspace | Cybercriminal Mindstumblr iPredator | Dark Side of Cyberspace | Cybercriminal Minds


iPredator Dark Side of Cyberspace Cybercriminal Minds Internet Safety Website Michael Nuccitelli Author Image iPredator | Dark Side of Cyberspace | Cybercriminal Minds

IPREDATOR

Internet Safety Education

Cybercrime & Cyber Attack Prevention

[347] 871-2416

ipredator internet safety cyber attack prevention spider shield cyberbullying internet safety ipredator symbol1 iPredator | Dark Side of Cyberspace | Cybercriminal Minds

iPredator is an internet safety, cybercrime and cyber attack prevention website exploring the dark side of cyberspace and cybercriminal minds. iPredator is also a conceptual framework addressing cyberbullying, cybercrime, cyberstalking, cyber terrorism, cyber harassment, online sexual predation, internet addiction, online psychopathy and online deception. iPredator Inc. is a New York State Company providing education, investigation and consultation to professionals and the community.

The vast amount of information provided within this site is available at no cost, nor requires having to enter personal information to access and download. As author of iPredator and founder of iPredator Inc., Dr. Nuccitelli and his associates are always available to answer questions about their internet safety tools, professional services, cyber security membership, social media safety services, professional education services, and cyber attack investigation network. To reach Dr. Nuccitelli, feel free to call him at [347] 871-2416, via email at drnucc@ipredatorinc.com or visit the contact page.

WELCOME TO IPREDATOR DARK SIDE OF CYBERSPACE CYBERCRIMINAL MINDS IPREDATOR TEXT IMAGE1 iPredator | Dark Side of Cyberspace | Cybercriminal Minds

iPredator was developed to confront the widespread growth of cyberbullying, cyber harassment, cyberstalking, online sexual predation, cybercrime, cyber terrorism and online victimization. Their mission is to reduce victimization, abuse, theft and disparagement from online assailants engaged in nefarious and malevolent activities. This website began development in June, 2012, officially published Summer 2013 and represents their first step to educate, inform and advise online users, law enforcement, court systems and communities on the dangers lurking in cyberspace.

Chief Executive Officer & founder of iPredator Inc, Michael Nuccitelli Psy.D., is a New York State licensed psychologist and certified forensic consultant. In 2006, Dr. Nuccitelli formulated Dark Psychology, which explores the criminal, destructive and deviant drives in humanity. In 2009, he developed the Information Age Forensics construct, iPredator, which delves into the cybercriminal minds of those who use Information and Communications Technology (ICT) for nefarious and malevolent reasons.

Provided below are brief definitions of Dark Psychology, iPredator and iPredator Bridge central to all iPredator Inc. strategies and tactics, as well as, the typologies that the iPredator construct includes.

Dark Psychology Darkside of Human Consciousness Criminal Psychology Cybercriminal Psychology Michael Nuccitelli Author Image 500x313 iPredator | Dark Side of Cyberspace | Cybercriminal Minds

DARK PSYCHOLOGY DARKSIDE OF HUMAN CONSCIOUSNESS DARKSIDE OF CYBERSPACE CYBERBULLYING CYBERSTALKING INTERNET SAFETY IPREDATOR TEXT IMAGE 500x37 iPredator | Dark Side of Cyberspace | Cybercriminal Minds

Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon others motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior.

Dark Psychology postulates there is a region within the human psyche that enables some people to commit atrocious acts without purpose. All humans have a reservoir of malevolent intent ranging from minimally obtrusive and fleeting thoughts to pure psychopathic deviant behaviors without cohesive rationality.

CRIMINAL, DEVIANT & CYBER CRIMINAL MINDS

Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humans have this proverbial cancer residing deep within their psyche. From the moment we are born to the time of death, there is a side hidden within us that some call evil and others have defined as criminal, deviant or psychopathic. Dark Psychology assumes there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area Dr. Nuccitelli and his associates endeavor to explore.

“Dark Psychology is both the study of criminal and deviant behavior and a conceptual framework for deciphering the potential for evil within all human beings.” Michael Nuccitelli Psy.D., C.F.C. (2009)

INFORMATION AGE FORENSICS CYBERCRIMINAL PSYCHOLOGY DARKSIDE OF CYBERSPACE CYBERBULLYING CYBERSTALKING CYBERCRIME INTERNET SAFETY IPREDATOR IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

IPREDATOR DARKSIDE OF CYBERSPACE CYBERBULLYING CYBERSTALKING INTERNET SAFETY IPREDATOR TEXT IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

The Cybercriminal Mind

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT.
II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace.

Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity, if they so decide, while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

“The study, exploration and understanding of iPredator are the first steps in the humanization of global Information and Communications Technology. By understanding iPredator, humanity walks safely in cyberspace.” Michael Nuccitelli Psy.D., C.F.C. (2012)

IPREDATOR BRIDGE IPREDATOR CONSTRUCT DARKSIDE OF CYBERSPACE CYBERBULLYING CYBERSTALKING INTERNET SAFETY IPREDATOR IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

IPREDATOR BRIDGE IPREDATOR CONSTRUCT DARKSIDE OF CYBERSPACE CYBERBULLYING CYBERSTALKING INTERNET SAFETY IPREDATOR TEXT IMAGE 500x37 iPredator | Dark Side of Cyberspace | Cybercriminal Minds

iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual and behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant online activities or use complex perceptual distortions to validate the harm they cause. Also different from iPredator are their drives for attacking others.

For those defined in iPredator Bridge, their motivations are cloaked by moral turpitude, self-righteousness and justified convictions. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm, and either proceed in their maladaptive trajectory, or cease and desist. Within this new region, and presently without explanation, many people enter cyberspace and access ICT with their instinctual drive for self-preservation remaining dormant.

Conversely, other people either quickly or gradually conclude that ICT and cyberspace offers an environment that allows the pursuit of maladaptive and pathological goals undeterred by punishment. It is within this process that the ICT user or groups of ICT users transcend into the world of iPredator.

CYBER AGGRESSION MOTIVATED BY PERCEPTUAL DISTORTIONS

Humanity is at the beginning of the Information Age and the motivating factors leading law abiding citizens to engage in nefarious and deceptive online activities cannot be explained. The concept of iPredator and iPredator Bridge construct assumes that ICT has unknown effects upon the mind and influence some to engage in destructive and self-destructive patterns. The creation of ICT and cyberspace is equivalent to the philosophical and psychological societal awe that was created when astronauts took their first steps on the moon.

IPREDATOR TYPOLOGIES

The Dark Side of Cyberspace

CYERSTALKERS FEAR IDENTIFICATION PREDATOR iPredator | Dark Side of Cyberspace | Cybercriminal Minds

CYBERSTALKING

Cyberstalking: Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both an online assailant  tactic and typology of psychopathological ICT user. Cyberstalking includes direct or implied threats of physical harm, habitual surveillance and gathering information to manipulate and control a target. Cyberstalking requires a direct or implied threat of physical harm by the assailant.

STALKING & CYBERSTALKING PREVENTION EDUCATION

Examples of psychological threats involves disparagement, humiliation, dis-information dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands. The Internet is a global medium regardless of frontiers, and this creates new possibilities for the growing class of online stalkers.

Cyber Stalking Prevention Checklist (CSPC)
Cyber Stalking Prevention Checklist (CSPC-ABR)
Cyber Stalker Identification Interview (CSII)
iPredator Probability Inventory-Cyber Stalking (IPI-CS)

CYBER HARASSMENT REPETITIVE PERSISTENT OFFENSIVE CYBER ABUSE IPREDATOR IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

CYBER HARASSMENT

Cyber Harassment is the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a direct or implied threat of physical harm. Unlike physical harassment involving face-to-face contact, cyber harassment requires the use of ICT and is verbal, sexual, emotional or social abuse of a person, group or organization. The cyber harasser’s primary goal is to exert power and control over the targeted victim(s).

When minors are involved, Cyberbullying is the term describing Cyber Harassment and when direct or implied physical harm to the targeted victim(s) is involved, Cyber Harassment becomes Cyberstalking. Another similar term often used to define Cyber Harassment, but slightly different in assailant modus operandi, is Internet Troll.

Persistent, Repetitive and Offensive Psychological Abuse

Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber harassment differs from cyberstalking in that it is generally does not not involve a credible or implied physical threat.

Cyberstalking and Cyber Harassment Laws by State 

(click yellow link for 3rd party site with state laws)

NARCISSISTIC CYBERBULLY iPredator | Dark Side of Cyberspace | Cybercriminal Minds

CYBERBULLYING

Cyberbullying: Cyberbullying is the use of Information and Communications Technology between minors to humiliate, taunt and disparage one another. Cyberbullying is intended to tease, embarrass, deprecate & defame a targeted minor with the assailant’s developmental needs for peer acceptance and recognition being a priori. Dissimilar to physical bullying, cyberbullying does not involve face-to-face contact and primarily occurs online using electronic devices as the tools for information dissemination.

CYBERBULLYING PREVENTION EDUCATION

Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of online bullying can become psychologically devastated and/or internet bullies themselves.

Cyber Bullying Abuser Checklist (CBAC)
Cyber Bullying Abuser Checklist (CBAC-ABR)
Cyber Bullying Target Checklist (CBTC)
Cyber Bullying Target Checklist (CBTC-ABR)
iPredator Probability Inventory-Cyber Bully (IPI-CB)
iPredator Probability Inventory-Cyber Bully Abuser (IPI-CBA)

OFFLINE DISTRESS DICTATES ONLINE RESPONSE ODDOR IPREDATOR INTERNET SAFETY CYBERCRIME CYBERBULLYING 500X319 PX PNG IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

CYBERCRIME

Cybercrime: Cybercrime is defined as crimes and criminal activity committed on the Internet using Information and Communications Technology as the tools to target victims. All forms of cybercrime involve both Information and Communications Technology and a targeted victim(s). Cybercrime is segmented into two distinct categories involving the focus of the cyber criminal activities.

These activities are focalized on the technology of ICT to achieve the cyber criminal’s aims for personal and financial gain or targeted at the person using the Information and Communications Technology. When the individual is the main target of cybercrime, ICT is the tool rather than the target. These are the crimes, which have existed for centuries in offline societies.

LEARN CYBERCRIME PROTECTION

Scams, Identity Theft and Internet Fraud have existed long before the development of information technology, but in non-digital form. Cyber criminals utilize technological tools that increase their potential pool of victims and make them difficult to identify and apprehend. Cybercrime targets people, property or governments using Information and Communications Technology.

Cyber Crime Protection Checklist (CCPC)
Cyber Crime Protection Checklist (CCPC-ABR)
iPredator Probability Inventory-Cybercrime (IPI-C)

UNITED STATES CYBER COMMAND US CYBER COMMAND USCYBERCOM IPREDATOR INTERNET SAFETY CYBERCRIME CYBERBULLYING 375X375 PX PNG IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

CYBER TERRORISM

Cyber Terrorism:  Cyber Terrorism is the use of Information and Communications Technology (ICT) by iPredators, organized groups and/or terrorist groups to advance their agenda motivated by religious, political and/or philosophical ideologies. Examples of cyber terrorism include:

  • I. The use of ICT to organize and execute attacks against networks, and Information and Communications Technology (ICT) infrastructures.
  • II. The exchanging of information or making threats electronically.
  • III. The act of hacking into computer systems.
  • IV. Introducing viruses and malware to vulnerable networks.
  • V. Defacement of websites and blogs.
  • VI. Denial-of-Service Attacks.
  • VII. Terrorist threats made via electronic communication.

HELP COMBAT CYBER TERRORISM

When strategic cyber attacks are motivated for financial gain, these attacks are defined as cybercrime. Cyber terrorism is any premeditated, politically, religious or philosophically motivated attack against information, computer systems, computer programs and data, which results in violence against non-combatant targets by sub-national groups or clandestine agents. A cyber terrorist attack is designed to cause physical violence or extreme financial harm to the targeted victims or community.

The F.B.I. define cyber terrorism as “The premeditated, politically motivated attack against information, computer systems, computer programs and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.”

ONLINE SEXUAL PREDATION SEXUAL PREDATORS INTERNET PREDATORS DARKSIDE OF CYBERSPACE CYBERSTALKING INTERNET SAFETY IPREDATOR IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

ONLINE SEXUAL PREDATORS

Online Predation: The typology of iPredator categorized as Online Predators have a variety of different terms used to describe the same patterns and motivations for their abuse. Online Sexual Predators are defined as adult online users who seek to exploit vulnerable children or adolescents for sexual and other abusive purposes. Online Predators are sexual predators who use Information and Communications Technology and the Internet to locate, target and victimize minors.

Common forums used by Internet  Predators to target children include chat rooms, instant messaging or social networking sites for the purpose of flirting with and meeting others for illicit sexual experiences. Online Child Predators are motivated to manipulate or “groom” a minor with the ultimate goal of meeting and engaging in sexual activity, despite knowing they are engaging in illegal activities.

In instances where meeting their victims is not the primary objective, Online Predators also attempt to persuade children and adolescents to participate in some form of online sexual and/or sexually provocative activity motivated by financial gain engaging in the distribution and sale of child pornography.

Online Predator Prevention Checklist (OPPC)
Online Predator Prevention Checklist (OPPC-ABR)
iPredator Probability Inventory-Internet Predator (IPI-IP)

HELP COMBAT ONLINE SEXUAL PREDATION

CYBER ATTACK RISK ASSESSMENTS IPREDATOR INTERNET SAFETY CYBERCRIME CYBERBULLYING 500X314 PX PNG IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

DARK SIDE OF CYBERSPACE INTERNET SAFETY ONLINE SEXUAL PREDATOR PREVENTION CYBERBULLYING PREVENTION IPREDATOR TEXT IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others in the abstract electronic universe known as cyberspace.

Technological advancements have changed the way humanity interacts, exchanges and accesses information. Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It is often difficult to imagine that the Internet used by more than two billion people globally celebrated its 20th birthday in 2011. Clearly, the Information Age has spread to all corners of the planet.

“As society becomes more technologically advanced, the importance of Information and Communications Technology (ICT) becomes vital in the daily living of humanity. Despite the multitude of benefits, the dangers lurking in cyberspace are real, growing and need to be stopped. It may take me 30-40 years, but iPredator Inc. will diligently persist until one day online sexual predators, cyberstalkers and all iPredators experience fear before they proceed with their nefarious, deviant & malevolent plans.” Michael Nuccitelli Psy.D., C.F.C., iPredator Inc. (2013)

IPREDATOR GOOGLE PLUS LINKS

[VISIT, JOIN & SHARING APPRECIATED]

 

2011 WINTER ISSUE THE FORENSIC EXAMINER IPREDATOR INTERNET SAFETY CYBERCRIME CYBERBULLYING 386X500 PX PNG IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

(click image for barnes and noble site verifying construct professional recognition)


IPREDATOR INC INFORMATION AGE FORENSICS DARKSIDE OF CYBERSPACE CYBERBULLYING CYBERSTALKING INTERNET SAFETY IPREDATOR TEXT IMAGE 500x46 iPredator | Dark Side of Cyberspace | Cybercriminal MindsiPredator Inc.
 is a New York State based Information Age Forensics company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullyingcyber harassmentcyberstalkingcybercrimeinternet defamationcyber terrorismonline sexual predation and the new field they are pioneering termed, Information Age Forensics. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

For visitors interested in learning more about Dark Psychology & iPredator, outside the website, please visit our iPredator & Dark Psychology Google + Community pages and all are welcomed to contribute. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media and consult with all online users. To invite Dr. Nuccitelli to conduct training, educational services or consultation, please email him at drnucc@ipredatorinc.com  or via phone at 347-871-2416.

“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” Michael Nuccitelli Psy.D., (2012)

Online Psychopaths Click Text Image for Formatted PDF Article Michael Nuccitelli Authored iPredator Text Image 500x51 iPredator | Dark Side of Cyberspace | Cybercriminal Minds

[Click Online Psychopaths Text Image for Full PDF Article Download]

Homo Homini Lupus Psychopathy Sociopathy iPredopath iPredator Criminology Criminal Psychology Dark Psychology Michael Nuccitelli Authored Image 500x351 iPredator | Dark Side of Cyberspace | Cybercriminal Minds

HOMEPAGE BUTTON IPREDATOR INTERNET SAFETY IMAGE iPredator | Dark Side of Cyberspace | Cybercriminal Minds

[347] 871-2416

by Michael Nuccitelli, Psy.D.
Google
by iPredator Inc.
Find us on Google+

IPREDATOR PRINT PDF BUTTON1 iPredator | Dark Side of Cyberspace | Cybercriminal Minds
share
google iPredator | Dark Side of Cyberspace | Cybercriminal Mindstwitter iPredator | Dark Side of Cyberspace | Cybercriminal Mindsfacebook iPredator | Dark Side of Cyberspace | Cybercriminal Mindslinkedin iPredator | Dark Side of Cyberspace | Cybercriminal Mindstumblr iPredator | Dark Side of Cyberspace | Cybercriminal Minds
checklist