iP3141 Homeland Security Initiative
USA Cyber Terrorism Prevention Plan
iP3141 is a national homeland security & cyber terrorism prevention initiative developed by New York State licensed psychologist and forensic consultant, Michael Nuccitelli, Psy.D. As part of iP3141, he has designed a template that will reduce the probability of a cyber-terrorist attack, increase homeland security information dissemination speed and ignite an Information Age educational movement. Provided is a brief overview of iP3141.
iP3141 is a national homeland security & cyber terrorism prevention initiative developed by New York State licensed psychologist and author of the Information Age iPredator construct, Michael Nuccitelli Psy.D. In light of growing reports America is at risk for a cyber terrorism attack and what authorities have termed Cyber Pearl Harbor, Dr. Nuccitelli has designed a plan that will reduce the probability of a cyber-terrorist attack, increase homeland security information dissemination speed and ignite an Information Age educational movement in the United States.
iP3141 is a national initiative to establish an educational, homeland security and iPredator professional and public sector network to service, educate & monitor Americans of the 3141 counties and county equivalents in the 50 States and the District of Columbia. The National Conference of State Legislatures defines cyber terrorism as the use of Information and Communications Technology by terrorist groups and individuals to further their agenda.
This can include use of ICT to organize and execute attacks against networks, computer systems and telecommunications infrastructures or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, denial-of-service attacks, or terrorist threats made via electronic communication.
According to the FBI, cyber terrorism is any “premeditated, politically motivated attack against information, computer systems, computer programs and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.” As the author of a new technological predator construct called iPredator, cyberstalkers, cyber terrorist, cyber criminals and the severely disturbed are just a few of the typologies included in his theory that victimize others using Information and Communications Technology (ICT). Also included is how Information Age society has drastically changed, becoming more isolated and disconnected leading to a paradigm shift in violence, crime and deviance. Dr. Nuccitelli’s definition of iPredator is as follows:
iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using ICT. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. They can be any age, either gender and not bound by economic status, race or national heritage.
iPredator is a global term used to distinguish anyone who engages in criminal, deviant or abusive behaviors using ICT. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator or cyber terrorist, they fall within the scope of iPredator. The three criteria used to define an iPredator include: I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of ICT to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) to establish and sustain complete anonymity while they troll and stalk a target. Given the Internet inherently affords everyone’s anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.
Therefore, as the Internet naturally offers all ICT users’ anonymity if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault or researching the social profiles of their next target. From a nationalistic perspective, industrialized nations must now allocate increasing amounts of time, money, work force and strategic planning on cyber terrorism prevention.
Needing to be addressed is the growing concerns of homeland security, cyber terrorism and cyber warfare all due to social media and the speed and magnitude of Information and Communications Technology. In addition to cyber threats to our national security, it is fair to assume iPredators and iPredator groups will become willing activists attempting to access and design larger and more deadly forms of cyber aggression. Social science experts and educators have attempted to enlighten and warn the global community, but their impact to date pales in comparison to the wrath and inevitable growth of the threat of iPredator and the growing number of iPredator groups.
iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others in the abstract electronic universe known as cyberspace.
In September 2011, Dr. Nuccitelli founded iPredator Inc. to provide educational and advisory products & services to online users and organizations on cyber bullying, cyber stalking, online sexual predators, cyber terrorism, cybercrime, internet defamation, digital reputation and cyber psychology. Their goal is to reduce victimization, theft and disparagement from online assailants and increase awareness of the dangers lurking in cyberspace.
In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained educational & awareness campaign and Dr. Nuccitelli’s plan of what he has called the United States iP3141 National Network. Once implemented, the mission of the iP3141 Network is to increase awareness of the benefits and dangers of Information and Communications Technology (ICT), decrease rates of cybercrime and human online victimization, educate citizens on homeland security and significantly increase education & awareness of pediatric online users via an ICT educational curriculum covering iPredator issues.
There are 3,141 counties and county equivalents in the 50 States and the District of Columbia. (United States Geological Survey) The letter “i” in iPredator stands for Information and Communications Technology. Cyber Terrorism is one typology of the construct iPredator. Hence, iP3141 is the tentative name of Dr. Nuccitelli’s initiative. A brief description of Information and Communications Technology is as follows:
Information and Communications Technology (ICT): Defined as “the role of unified communications and the integration of telecommunications (telephone lines and wireless signals), computers, middleware as well as necessary software, storage- and audio-visual systems, which enable users to create, access, store, transmit, and manipulate information. In other words, ICT consists of IT as well as telecommunication, broadcast media, all types of audio and video processing and transmission and network based control and monitoring functions.” (Wikipedia)
i3141 General Template
Within each county, county equivalent and the United States, there would be the following:
3 Appointed Professional Officials: The county district attorney, the chief and/or appointed law enforcement official, and the superintendent of schools or an appointed superintendent representative.
1 Elected Government Official: The county mayor or elected official that reports to the state elected governor.
4 Appointed County Private Citizens: 1 private citizen representing county media, 1 private citizen representing all county educators, 1 private citizen representing county homeland security and 1 private citizen with expertise and/or trained in Information and Communications Technology (ICT) and a proposed United States Library of ICT (to be developed.)
1 Federal iP3141 Network Website: 1 federally funded and managed central ICT website & social networking service for county appointed officials & citizens to obtain all ICT information related to homeland security, state and federal laws, educational curriculum and the United States Library of ICT (to be developed.)
United States Library of ICT: The United States Library of ICT would be a central database of all past, present and future Information and Communications Technology (ICT) intelligence, news and trends available to all United States citizens and those seeking to prevent cyber terrorism and online victimization. The six areas of focus would be on Education, Law and Law Enforcement, Homeland Security, Social Sciences, ICT and ICT Research & Development.
Homeland Security | Cyber Terrorism Prevention
The iP3141 plan is a work in progress and requires local, state and federal assistance. In 2013, iPredator Inc. is a small business and seeking proactive citizens and organizations of America to assist them in their endeavor to encourage a national discussion. In addition to the obvious benefits to Americans, Dr. Nuccitelli predicts it would help create new employment opportunities, expand homeland security awareness regarding cyber terrorism and cyber security threats, create a centralized forum for exchange of ICT, inspire educated consumerism for ecommerce & m-commerce and place the United States in the forefront globally in ICT & ICT safety.