Cyber Stalking Prevention & Education
Welcome to iPredator Inc.’s Cyber Stalking Prevention, Education & Prevention page. Cyber stalking is one typology included in the concept of iPredator, which is a theoretical construct developed by New York State licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli.
The typologies of iPredator include: Cyber Bullying, Cyber Harassment, Cyber Stalking, Cyber Crime, Online Sexual Predation and Cyber Terrorism. Within this construct, Cyber Harassment is the adult form of Cyber Bullying and used when the perpetrator is an adult.
As Information and Communications Technology (ICT) becomes more widespread, cyber stalking prevention, education and protection are areas requiring immediate attention. The Information Age has many benefits to humanity, but it is vital to identify and prevent the malevolent and nefarious elements that exist in cyberspace and Information and Communications Technology. The definition and motivations of iPredator and Cyber stalking is as follows:
iPredator: A child, adult or group who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using Information and Communications Technology (ICT.) iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.
iPredator is a global term used to distinguish anyone who engages in criminal, deviant or abusive behaviors using Information and Communications Technology (ICT.) Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, internet troll or cyber terrorist, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of ICT to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth to engage in criminal or deviant acts or to profile, identify, locate, stalk and engage a target.
When an offender profile includes these three characteristics, they meet the definition of iPredator. A fourth criterion, not included in the triad defining an iPredator, is what I have termed iPredator Victim Intuition (IVI) and reserved for seasoned iPredators. IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications. iPredators, through practice and learning, develop a sense and/or skill of being able to experience an intuition to know what online user will be a successful target.
iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. Also different from iPredator are their drives for attacking others.
For those defined in iPredator Bridge, their motivations are cloaked by moral turpitude, self-righteousness and pseudo-justified convictions. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.
Within this new region, and presently without explanation, many people enter cyberspace and access ICT with their instinctual drive for self-preservation remaining dormant. Conversely, other people either quickly or gradually, conclude that ICT and cyberspace offers an environment that allows the pursuit of maladaptive and psychopathological goals undeterred by punishment. It is within this process that the ICT user or groups of ICT users transcend into the world of iPredator. Once an iPredator, the various typologies begin their search for those they deem as vulnerable, easily accosted and not likely to mobilize the required forces leading to their apprehension and punishment.
The iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung (1875-1961) and his construct of the Collective Unconscious.
Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.
The iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism.
In addition to having IVI, the iPredator practices Cyberstealth using multiple covert strategies. In fact, the third criteria used to define an iPredator include a general understanding of Cyberstealth used to profile, identify, locate, stalk and engage a target. Also lying upon a continuum of expertise, iPredators are assessed as being advanced in their Cyberstealth practices as opposed to a haphazard approach of targeting a victim without attempting to hide their identity.
Often times, cyber bullies, ex-partners, ex-employees, angry or self-righteous online users, Internet trolls, organized groups with political, religious and moralistic causes, child molesters, pedophiles and highly narcissistic online users do not attempt to hide their identities. Cyberstealth is a strategy reserved for iPredators who seek to hide their identities online.
Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategies by which iPredators devise tactics to establish and sustain complete anonymity while they troll and stalk an online target. In addition to a stratagem, Cyberstealth is a reality of Information and Communications Technology, that humanity often fails to fathom leading some online users to become high probability targets. Cyberstealth is a learned behavior that becomes more advanced with practice, trial and error and experimentation.
Cyber Stalking: Cyber stalking is defined as the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyber stalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyber stalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.
To meet the criteria of cyber stalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones using ICT. Examples of psychological threats involve using disparagement, humiliation, dis-information dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyber stalker’s demands.
Cyber Harassment: Cyber harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target. Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations devoid of the need to control, dominate or manipulate their target.
Cyber Stalking is one category of iPredator that will continue to grow with the expansion of Information and Communications Technology. Feel free to visit the iPredator Inc. Resource Links & Library filled with an enormous amount of information compiled by Dr. Nuccitelli and his colleagues. As cyberstalking, stalking and cyberstalker content continues to be added, please visit the site for additions to the Resource Links & Library and articles authored by Dr. Nuccitelli and iPredator Team members.
iPredator Inc. is a New York State based Information Age Forensics company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and the new field the founder is pioneering he has termed, Information Age Psychology. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
In addition to assisting citizens, their mission is to initiate a national sustained educational & awareness campaign with the help of private, state and federal agencies. Dr. Nuccitelli and iPredator Inc. colleagues and associates regular update their criminal psychology, cybercrime & forensics blog, called Dark Psychology and their Internet Safety & Information Age Predator blog called Dr. Internet Safety. The parent website, iPredator.co (a.k.a. www.iPredatorInc.com), offers site visitors an enormous database on Cyber Criminal Psychology, Internet Safety and Information Age Predators.
For online users interested in learning more about Dark Psychology & iPredator outside the website or forensic & internet safety blogs, please visit their iPredator & Dark Psychology Google + Community pages and all are welcomed to contribute. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, please email him at firstname.lastname@example.org or via phone at 347-871-2416.
- Google +: The iPredator
- Linked In: iPredator
- Twitter: TheiPredator
- YouTube: iPredator Team
- Facebook: The iPredator
“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” Michael Nuccitelli Psy.D., (2012)
American College of Forensic Examiners Institute announces commitment to iPredator forensic education.
- Michael Nuccitelli Psy.D., C.F.C.
- NYS Licensed Psychologist
- CEO, iPredator Inc.
- Website: www.iPredatorInc.com
- Email: DrNucc@iPredatorInc.com
- Ph: (347) 871-2416
by Michael Nuccitelli, Psy.D.