i-am-ipredator-dark-side-of-cyberspace-parable-ipredator-inc.-1200X675

I AM IPREDATOR

 Dark Side of Cyberspace Parable

I am iPredator and writing to introduce myself. You probably have not heard of me, with my present moniker, but I was here long before you and will be here long after you are gone. Over the millennia, since the beginning, I have been given many names, reasons for existing and places of residence. You cannot see, hear, touch, taste or smell me. Nevertheless, I assure you, I am real. So real, I walk unfettered throughout the universe and amongst all humanity preferring to hide undetected and quiet. I do not require an abode because I reside in you. My home lies within your soul, mind and conscience. This letter is my way of saying thank you for your invitation, which I gratefully accept.

As I had predicted long ago, which will be true ad nauseum until end time, you have once again created a portal allowing my long awaited return. In a mere five decades, humanity has created the realm you call cyberspace. As you may know, cyberspace is defined as a global network of interdependent information technology infrastructures, telecommunications networks and computer data processing. How eloquent a definition for a realm that created a portal for me to visit. All I can say is that I am honored you would create a digital realm where you, myself and all humanity can interact with one another free of having to disclose our true identities.

To me, cyberspace is nothing more than an abstract artificial universe connecting every human who enters and offering you the ability to effect and influence each other. Moreover, the last time I checked, approximately three plus billion of you are connected in cyberspace. The beauty of who I am, being an immortal and infinite construct, is my capacity to practice pristine patience. Using basic mathematics and laws of probability, it is safe to say, within the next century that 100% of your kind will be active and dependent upon Information and Communications Technology (ICT). Without sounding too facetious, your growing dependency upon information and ICT is an addiction I fully support and encourage.

Just as a knife is used as both an implement for cutting and as a weapon, ICT is a tool serving the purpose to connect humanity to cyberspace. From this connection in cyberspace, a planetary digital thread connecting all humans is born. Having incredible patience, waiting another century is like a nanosecond from where I hail from.

When the 100% connected threshold is reached, it will be the first time in humanities existence, what you call a “global community,” that every surviving person will be able to obtain, exchange & disseminate information with each other. Not only is that a highly creative feat, but an attainable endeavor I did not think possible at your stage of evolutionary development. Not that I thought humanity was incapable of such an accomplishment, but I did not think your species was stupid enough to create this metaphorical connected thread in a virtual environment. Moreover, what is a virtual environment? Simply stated, a virtual environment is imitation or facsimile of reality that creates an illusion.

i-am-ipredator-dark-side-of-cyberspace-parable-ipredator-inc.-400x316

Dark Side of Cyberspace

Virtual environments and virtual worlds are not “real” in the concrete sense or actual physical places. Your virtual world is nothing more than a series of electronic impulses passing through at least one digital device up to billions of them. Furthermore, even though your species knows this, you have become so enamored with ICT that you actually have defined your societal period as the Information Age & Information Revolution. Without sounding facetious again, I think you should call it the Disconnected Age. Only humans could invent a technology with social media being a central theme that, instead of connecting humanity, has slowly fragmented and disconnected interpersonal relationships, families & communities.

Why any living organism would invent and become addicted to an artificial facsimile when they have the original is beyond me. But then again, I am not human. So how could I understand? Although I find your new dependency on ICT & cyberspace utterly ridiculous and short sighted, I support you 100%. For it is only in cyberspace that humans can legally deceive others without fear of consequences. Only in cyberspace, a 50-year-old man, who is severely disturbed, can create a “virtual identity” and enter chat rooms as a 15-year-old high school freshman looking to meet other young males and females to fraternize with. How wonderful is that and I give you a standing ovation.

I thought I was the only one who could successfully cloak his identity, so others would feel completely at peace in my presence. I guess I am slowly succeeding in getting humanity to understand the multitude of benefits living life governed by deceptive practices. Thank God for the Information Age!” iPredator (2012)

When I think of how many times I have had to cloak my identity throughout history, I cannot even begin to tabulate the number of times and methods of deception used. If I were to offer a rough estimate, using a term from your dimension, I would have to say approximately a Zettabyte, give or take an Exabyte or two. If you are not familiar with the term, even though it applies to your addicted habits, it refers to a quantity of information or information storage capacity. Can you calculate, conceptualize or fathom the number 1021?

one-zettabyte-in-bytes-ipredator-beelzebub-i-am-ipredator-dark-psychology-internet-safety-information-age-forensics-ipredator

In fact, one of your largest and most respected techno-centric companies, Cisco, reported by 2016, global internet traffic is expected to reach a staggering 1.3 zettabytes annually. They also predict 3.4 billion Internet users, or about 45% of the world’s projected population by 2016. They have called this time in your Information Age the Zettabyte Era.

If Cisco is correct, that is wonderful given I estimated a 100% connected threshold by 2113. Much faster growth than even I had predicted. How industrious you have been, which is both impressive & remarkable. To help you understand using your present day nomenclature, 1.3 Zettabytes is the equivalent of 38 million DVDs of information exchanged per hour.

It is easy to become perplexed thinking about those numbers, but the 100% connected threshold is a short distance from today and the mere thought of this time causes me to salivate with anticipation. Within cyberspace and the internet, there are no police, law enforcement entities, guardians or even archangels. Not that there is such an entity, but St. Michael, the Warrior Prince & Archangel, is nowhere to be found either. As I have stated above, “How wonderful is that and I give humanity a standing ovation.”

In cyberspace and within you, I reside. Within each human, lying deep within your psyche is a place of darkness and malevolence. Unfortunately, most of you are ignorant to this realm and even fewer of you act upon my callings and commands. Thankfully, the Information Age and your addiction to technology has opened your eyes to my ways of thinking and perceiving. Depending on your beliefs, you may call it evil, psychopathy or profound immorality. You may also place the nature of evil in four differing camps: Moral Absolutism, Amoralism, Moral Relativism and Moral Universalism. Whatever your definition is and how you describe how malevolence manifests, cyberspace is a realm where I can relax in peace and travel without worry of identification or apprehension. In addition, because I dwell in all of you and in cyberspace, I can see the fruits of my labor.

“Fear is pain arising from the anticipation of evil.” Aristotle

From a macroscopic perspective, a growing portion of humankind is becoming increasingly narcissistic, isolated, disconnected and divorced from reality due to your increasing compulsive dependency on ICT. Instead of using ICT for good and benevolent causes, many of you have chosen a nefarious and malevolent trajectory. As iPredator, I welcome your chosen path and will do my best to ensure you do not deviate or change your mind once you cross my bridge. I will always be waiting with open arms and a warm embrace welcoming you to my kingdom.

If you have not noticed, I have infiltrated the hearts and minds of many of your fellow citizens. Moreover, as always, I do not discriminate due to age, gender, race, religion or socioeconomic status. Although I will remain hidden, undetected and quiet, I have injected my will and venom inside 1000’s, and soon millions, of people worldwide. Just as my servant, cancer, knows how to metastasize, I have used cyberspace and ICT as devices for transport to spread from one part of your mind to another, from one person to another and from one community to another.

My home lies within your soul, mind and conscience. And thanks to ICT, the internet and cyberspace, my capacity to spread hatred, harm and disdain for ones fellow man has accelerated exponentially. Within the real universe, the majority of space is desolate, cold and void of life. As dark as that may sound, it is nature and not filled with anything nefarious. Within cyberspace, and because it is man made and uncharted it is teaming with people filled with malice, deviance and what you call evil.

My true work of art is how I have been successful in persuading “kind hearted” people to engage in harmful online activities cloaked by moral turpitude, religious conviction & self-righteousness. This growing segment is ignorant to their actions because they truly believe it is either the right thing to do or the last option. In fact, both segments, whether motivated by criminal or deviant drives or righteous indignation, are easily swayed into practicing Cyberstealth.

i-am-ipredator-dark-side-of-cyberspace-parable-ipredator-inc.-1000x625

“The mind is its own place, and in itself, can make a Heaven of Hell, a Hell of Heaven.” John Milton, Paradise Lost (1667)

Cyberstealth is an Information Age method and/or strategy by which criminals, deviants, severely disturbed and the misguided use ICT to establish and sustain complete anonymity while they troll, stalk and attack their target. Given the Internet inherently affords everyone anonymity, Cyberstealth ranges from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind you the primary intent fueling those that seek to harm others using ICT.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment. Therefore, as the internet naturally offers all ICT users anonymity if they decide, many actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth is a covert method allowing them to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Not all humans use Cyberstealth nor attempt to cloak or hide their identities. Many actively exhibit their identity, because for them, they are driven by martyrdom, a need for recognition, peer acceptance or deep-seated inadequacies. What better cocktail of perceived low self-worth than a person driven to assault others motivated by inadequacy. If you cannot tell, I am quite excited to have been invited back to your dimension. Especially since it looks as if a greater number of people are using ICT for reasons other than what it was intended to accomplish.

As it is not hard to undo the damage that has been done by the misuse and prostitution of ICT, I remain confident humanity will sustain its self-destructive trajectory. All that is required now to seal humanities fate in dark psychological spheres is a national tragedy caused by a cyber terrorism attack. All any nation requires to attack and destroy another nation is a reason. A cyber terrorist attack would accomplish this goal and inevitably lead to a global military engagement.

As I could go on for pages writing about my hopes for humanity and its demise and without going into a long diatribe, I present for you brief definitions of iPredator, iPredator Bridge and Dark Psychology. All three concepts are easily understood, easily confronted and capable of being thwarted. Fortunately, humanity is not likely to heed my warnings until many people have been devastated and a war spawned by cyber terrorist attacks ensues. I yearn for that day.

DARK PSYCHOLOGY

Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has this potential to victimize other humans and living creatures. While many restrain or sublimate this tendency, some act upon these impulses.

Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior. Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal- oriented motivation 99% of the time. It is the remaining 1%, Dark Psychology parts from Adlerian theory and the Teleology. Dark Psychology postulates there is a region within the human psyche that enables some people to commit atrocious acts without purpose. In this theory, it has been coined the Dark Singularity.

Dark Psychology posits that all humanity has a reservoir of malevolent intent towards others ranging from minimally obtrusive and fleeting thoughts to pure psychopathic deviant behaviors without any cohesive rationality. This is called the Dark Continuum. Mitigating factors acting as accelerants and/or attractants to approaching the Dark Singularity, and where a person’s heinous actions fall on the Dark Continuum, is what Dark Psychology calls Dark Factor.

Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, all faiths and all humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side lurking within us all that some have called “Evil” and others have defined as criminal, deviant, and pathological. Dark Psychology introduces a third philosophical construct that views these behaviors different from religious dogmas and contemporary social sciences theories.

It is the individual who is not interested in his fellow men who has the greatest difficulties in life and provides the greatest injury to others. It is from among such individuals that all human failures spring.” Alfred Adler (1870–1937)

Dark Psychology assumes there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit these horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area this writer explores. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.

All of us have had thoughts and feelings at one time or another of wanting to behave in a brutal manner. We all have had thoughts of wanting to hurt others severely without mercy. If you are honest with yourself, you will have to agree we all have had thoughts and feeling of wanting to commit heinous acts.

Dark Psychology is both the study of criminal & deviant behavior and a conceptual framework for deciphering the potential for evil within all human beings.” Michael Nuccitelli Psy.D., C.F.C. (2009)

i-am-ipredator-dark-side-of-cyberspace-parable-ipredator-inc.-808x525

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI], an iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

i-am-ipredator-dark-side-of-cyberspace-parable-ipredator-inc.-490x366

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from Adler University in Chicago, Illinois. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services related to cyberstalking, cyberbullying, internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched this internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety. These sites offer online users an incredible amount of information, education and advisory services. Since 1985, Dr. Nuccitelli has worked in behavioral healthcare in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations. Their areas of expertise include cyberbullying, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to their professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. If you have questions, feel free to call iPredator Inc. anytime at (347) 871-2416 in New York or by sending correspondence using this website’s contact page by clicking on this link: Contact Us Dr. Nuccitelli or an iPredator Inc. associate return all contacts within 24 hours.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

 

MY-NAME-IS-LEGION-FOR-WE-ARE-MANY
MARK-5-9-GOSPEL-OF-MARK-65-80-AD-I-AM-IPREDATOR-PARABLE-TEXT-IMAGE

Note to Readers: The parable titled “I am iPredator” authored by Michael Nuccitelli, Psy.D. is an allegorical story not to be considered a literal interpretation. The purpose of his parable is to present to readers the importance of creating awareness of the dangers lurking in cyberspace. Dr. Nuccitelli believes society has become enamored by information technology causing a growing disconnectedness and the need for America to address inrenet defamation, social engineering and homeland security. Dr. Nuccitelli both enjoys and fully supports the advancement and growth of Information and Communications Technology. What he does not approve of and hopes to encourage others to fight against is the use and abuse of ICT to victimize, abuse and steal from others. It is for this reason that he created iPredator Inc. and their mission to initiate a nationally sustained educational & awareness campaign with the help of private, state and federal agencies.

i-am-ipredator-dark-side-of-cyberspace-parable-ipredator-inc.-cybercriminal-psychology

COMFORT THE VICTIMS, EDUCATE THE IGNORANT
&
CONQUER THE CORRUPT!

HOME-BUTTON-IPREDATOR-INTERNET-SAFETY-IMAGE

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

iPredator Inc. is a New York based Internet Safety Company founded to provide products and services addressing cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation and online deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
New York
US
Phone: 347-871-2416
i-am-ipredator-dark-side-of-cyberspace-parable-ipredator-inc.-cyberstalk
i-am-ipredator-dark-side-of-cyberspace-parable-ipredator-inc.-dark-psychology
i-am-ipredator-dark-side-of-cyberspace-parable-ipredator-inc.-online-predator
i-am-ipredator-dark-side-of-cyberspace-parable-ipredator-inc. -cybercriminal

Pin It on Pinterest