iPredator Social Media Profiles
Social Media Safety
Provided below is a truncated list of iPredator social media profiles & site membership links. Join us, via social media, in disseminating social media safety and cyber attack prevention information. Social media is an electronic virtual environment where information is obtained, exchanged and disseminated. Despite social media’s vast array of benefits, the Dark Psychology of temptation, deception and malevolent intent are always available trajectories.
Welcome to the Information Age!
Welcome to the iPredator social media profiles and social networking site membership links page. Below are some of the social networking sites iPredator has joined. iPredator belongs to other social sites, but does not post or publish them for private surveillance purposes. If there is a social media site listed that you have a membership with, please connect with us in that social site. iPredator Inc. is always grateful for site visitors help to disseminate internet safety and digital citizenship information.
Please help iPredator Inc. encourage all online users to practice Internet safety and cyber security. If purchasing one of our internet safety tools, the iPredator Protected Membership or iPredator Facebook Safety Assessment (iFSA) is not an option, listing iPredator Inc. or iPredator Inc. founder, Dr. Michael Nuccitelli, as a friend or buddy sends the message to trolls and cyber attackers that you recognize the importance of Internet Safety.
Given we do not have time to frequently visit all of the social sites we have joined, provided at the beginning of the list are the fifteen sites we regularly check. If you are ever in distress or need help, feel free to write Dr. Nuccitelli at firstname.lastname@example.org. If you are new to this website, included below is a brief overview of Dr. Nuccitelli’s Information Age Forensic construct, iPredator.
iPredator was founded in September 2011 to provide educational and advisory products & services to consumers and organizations on Cyber Bullying, Cyber Stalking, Child Predators, Cyber Crime, Internet Defamation, Cyber Terrorism and the new fields of Information Age Forensics & Infocom Psychology they are pioneering. Created by a New York State licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli, iPredator Inc.’s goal is to reduce victimization, abuse, theft and disparagement from online assailants.
In addition to assisting citizens, iPredator’s mission is to initiate a nationally sustained educational & awareness campaign with the help of private, state and federal agencies. In June 2013, iPredator launched their website, www.iPredator.co along with their forensics blog, Dark Psychology and internet safety blog, Dr. Internet Safety. At this website, they offer an enormous free resource library for site visitors covering the vast range of Cyber Predators, Internet Safety, Cyber Security, ICT Psychology, Forensic Psychology and Criminal Psychology.
At the center of iPredator’s products and services is Dr. Nuccitelli’s theoretical construct, iPredator. As a member and consultant to the American College of Forensic Examiners Institute, iPredator was the feature article in their 2011 winter issue of The Forensic Examiner. Since 2009, Dr. Nuccitelli has dedicated himself to learning the psychological composition of those who are engaged in online malevolent activities. His definition of iPredator, iPredator Bridge and Cyberstealth are as follows:
(click image to visit page)
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.
iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.
Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli Psy.D. C.F.C., iPredator Inc. (2013)
iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not driven by criminal, malevolent or deviant endeavors, iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies.
Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissismor psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.
Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.
Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.
iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung (1875-1961) and his construct of the Collective Unconscious.
Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception.
Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.
Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.
Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.
Online Sexual Predator Prevention
As Information and Communications Technology, social media, virtual reality and the Information Age rapidly expands becoming integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. At present, most of humanity continues to fail in understanding the golden rule of all new territory exploration.
“What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements lurking within cyberspace online users must be vigilant about ready to practice iPredator Protection.” Michael Nuccitelli, Psy.D. (2012)
In addition to this social networking site page, iPredator has many site pages filled with educational information free to copy. Thank you for visiting our site and remember to always think first before you post or share your personal information on social sites, chat rooms and forums.
“Although the benefits of Information and Communications Technology far outweigh detriments for society, humanity has been seduced by the notion that more technology translates into a better quality of life.” Michael Nuccitelli Psy.D., C.F.C. (2012)
iPredator Inc. Social Media Site Profile List
iPredator Frequented Social Networking Sites
Username: The iPredator
Username: Michael Nuccitelli
Google Plus Business
Google Plus Community
Linked In Business
Username: Dr. Michael Nuccitelli
Username: Michael Nuccitelli
iPredator Social Networking Sites A-Z List
Username: iPredator Inc
Username: iPredator Inc.
IPREDATOR GOOGLE PLUS LINKS
[VISIT, JOIN & SHARING APPRECIATED]
- Google + Profile | Dr. Nuccitelli
- Google + Page | iPredator
- Google + Page | Dark Psychology
- Google + Page | Dr. Internet Safety
- Google + Community | iPredator
- Google + Community | Dark Psychology