share
google About Us | iPredator | New York Cyber Forensics & Internet Safetytwitter About Us | iPredator | New York Cyber Forensics & Internet Safetyfacebook About Us | iPredator | New York Cyber Forensics & Internet Safetylinkedin About Us | iPredator | New York Cyber Forensics & Internet Safetytumblr About Us | iPredator | New York Cyber Forensics & Internet Safetyprint About Us | iPredator | New York Cyber Forensics & Internet Safety

ipredator inc professional services About Us | iPredator | New York Cyber Forensics & Internet Safety

About iPredator Inc.

New York Cyber Forensic Profiling & Internet Safety

About Us: Provided below is a brief overview of iPredator Inc., a New York Cyber Forensics & Internet Safety Company, iPredator Inc. was founded in September 2011 to provide educational and advisory products & services to consumers and organizations on Cyber Bullying, Cyber Stalking, Online Predation, Cyber Crime, Internet Defamation, Cyber Terrorism and the new field of Information Age Forensics they are pioneering. Created by a New York State licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli, their goal is to reduce victimization, abuse, theft and disparagement from online assailants.

Founder of iPredator Inc. is Dr. Michael Nuccitelli. Dr. Nuccitelli is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners (Identification # 103110.) As author of the theoretical construct, iPredator, Dr. Nuccitelli is a cyberbullying, internet safety, cybercrime and Information Age Psychology educator and consultant to law enforcement, legal professionals and information security experts on the identification, apprehension and prosecution of iPredators.

DARK PSYCHOLOGY SOCIOPATHY PSYCHOPATHY FORENSIC PSYCHOLOGY IPREDATOR IMAGE About Us | iPredator | New York Cyber Forensics & Internet Safety

New York Information Age Forensics Education, Investigation and Consultation

In addition to assisting citizens, iPredator’s mission is to initiate a nationally sustained educational & awareness campaign with the help of private, state and federal agencies. In June 2012, iPredator launched their website, along with their forensics blog, Dark Psychology and Internet safety blog, Dr. Internet Safety. At their website, they offer an enormous free resource library for site visitors covering the vast range of Tech. Predators, Internet Safety, Cyber Security, Information Age Psychology, Forensic Psychology and Criminal Psychology.

Internet Safety | Cyber Attack Prevention

As Chief Executive Officer, Dr. Nuccitelli became interested in the psychology and profiling of those who use Information and Communications Technology to abuse, steal, taunt and victimize others online in 2009. In 2012, Dr. Nuccitelli and his team of expert consultants grew even more determined to develop victimization prevention & intervention strategies for vulnerable online users utilizing education, investigation, legal, law enforcement and information technology experts.

At the center of iPredator’s products and services is Dr. Nuccitelli’s theoretical construct, iPredator. As a member and consultant to the American College of Forensic Examiners International, iPredator was the feature article in their 2011 winter issue of The Forensic Examiner published quarterly. Since 2009, Dr. Nuccitelli has dedicated himself to learning the psychological composition of those who are engaged in online malevolent activities. The definition of iPredator is as follows:

ipredator information age forensics About Us | iPredator | New York Cyber Forensics & Internet Safety

“The repercussions of the unrestricted latitude of iPredators will be catastrophic for not only the individual, but for society, and potentially, the world over. Therefore, before it is too late, we must re-examine the phenomenon of “social networking” via technology.” Michael Nuccitelli Psy.D., (2012)

iPredator Definition

iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using Information and Communications Technology (ICT.) iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, deviant or abusive behaviors using Information and Communications Technology (ICT). Whether the offender is a cyberbullycyberstalkercyber harassercyber criminalonline sexual predatorinternet troll or cyber terrorist, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of Information and Communications Technology (ICT) to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT.) These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using Information and Communications Technology (ICT) in an abstract electronic universe.

investigation forensics education ipredator inc services About Us | iPredator | New York Cyber Forensics & Internet Safety

“Society is being lulled into a false sense of trust and reliance on technology, taking information and “connection” to others in cyberspace at face value. Like the child in the fairy tale, Little Red Riding Hood, innocently wandering through the forest, we erroneously believe that the “Wolf” is whoever he appears or claims to be. Just as Little Red Riding Hood, we’re in danger of falling prey to iPredator.” Michael Nuccitelli Psy.D., (2012)

INTERNET SAFETY CHECKLIST-ABR SITE LINKS

(All Authored by Dr. Nuccitelli)

social profile safety analysis ipredator inc About Us | iPredator | New York Cyber Forensics & Internet Safety

iPredator Bridge

iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. Also different from iPredator are their drives for attacking others.

For those defined in iPredator Bridge, their motivations are cloaked by moral turpitude, self-righteousness and pseudo-justified convictions. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.

Within this new region, and presently without explanation, many people enter cyberspace and access ICT with their instinctual drive for self-preservation remaining dormant. Conversely, other people either quickly or gradually, conclude that ICT and cyberspace offers an environment that allows the pursuit of maladaptive and psychopathological goals undeterred by punishment. It is within this process that the ICT user or groups of ICT users transcend into the world of iPredator. Once an iPredator, the various typologies begin their search for those they deem as vulnerable, easily accosted and not likely to mobilize the required forces leading to their apprehension and punishment.

IPREDATOR BRIDGE CYBER ATTACKER CONSTRUCT IPREDATOR About Us | iPredator | New York Cyber Forensics & Internet Safety

The iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung (1875-1961) and his construct of the Collective Unconscious.

Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.

The iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism.

Cyberstealth

ipredator inc ipredator protected membership internet safety image About Us | iPredator | New York Cyber Forensics & Internet Safety

Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception.

Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, Information Age Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age Deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

CYBERSTEALTH ONLINE DECEPTION CYBER DECEPTION INTERNET SAFETY FRAUD IPREDATOR About Us | iPredator | New York Cyber Forensics & Internet Safety

As the Internet naturally offers all ICT users anonymity if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. iPredators rely on the multitude of benefits offered by ICT.

These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others in the abstract electronic universe known as cyberspace.

As ICT, social media, virtual reality and the Information Age rapidly expands becoming integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. At present, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within cyberspace, which ICT users and their loved ones must be vigilant about.

Technological advancements have changed the way humanity interacts, exchanges and accesses information. Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It is often difficult to imagine that the Internet used by more than two billion people globally celebrated its 20th birthday in 2011. Clearly, the Information Age has spread to all corners of the planet.

IPREDATOR GOOGLE PLUS LINKS

[VISIT, JOIN & SHARING APPRECIATED]

HOMEPAGE BUTTON IPREDATOR INTERNET SAFETY IMAGE About Us | iPredator | New York Cyber Forensics & Internet Safety