Cyber Deception Warning Signs Checklist
RISK ASSESSMENT TOOL
iPredator Bridge Warning Signs Checklist (IBWSC): Based on the iPredator Bridge construct, the iPredator Bridge Warning Signs Checklist (IBWSC) is a 50 item checklist designed to investigate if a loved one, colleague or peer is participating in or close to participating in harmful online and/or ICT activities towards others.
Multiple affirmative responses to IBWSC statements suggests the person being queried exhibits patterned and/or observable behavioral patterns indicating they may be engaged in iPredator activities. The IBWSC focuses on confirmed behavioral observations and not upon personal convictions and/or philosophical reasons for harming others online or using ICT.
Based on iPredator Bridge construct, the IBWSC assumes there are both people engaged in nefarious and malevolent activities and those engaged in harming others driven by distorted beliefs they are doing so for righteous and/or morally supported reasons. The common thread identical in both segments is the victims they target suffer from their attacks.
The IBWSC has not been validated by clinical research, a governing body or academic institution. It has been compiled and published to be a point of reference to educate and assist anyone who is concerned that they, their children, business or community are in the presence of an iPredator or someone in transit to becoming an iPredator.
iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology.
Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.
Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.
Given this writer’s strong belief that there are neurochemical, neuropsychological, perceptual and dissociative based changes occurring in all humans who access and interact with ICT and cyberspace, the compilation of all these factors leads to both a new breed of assailant and victim.
iPredator Bridge is the connection between the dark aspects of the human mind, ICT, cyberspace and activation of direct or indirect harm towards others. The victim or target of an iPredator may or may not have previously engaged the iPredator Bridge construct themselves, and for that matter, may not even know that their loved ones, peers, associates or new online contacts are posturing to become iPredators or actively engaging in iPredator attacks.
Clearly, there is a plethora of contributing factors influencing people to become iPredators. There are also a multitude of factors that influence some people to approach and cross the iPredator Bridge. And unfortunately, there are a variety of constituents that influence some to be unwilling to institute the necessary practices and safety measures to reduce their probability of becoming a target or victim. The harsh reality is that the wonderful abstract universe of cyberspace and the ICT used to enter cyberspace does not come with directions or blueprints on how to prevent being attacked, disparaged or harmed by iPredators.
Based on this writer’s research and extensive investigation leading to the creation of the iPredator construct, he and his colleagues have compiled a checklist of warning signs that may suggest a person being queried is approaching the iPredator Bridge, in transit or has fully crossed to the realm of iPredator. The iPredator Bridge Warning Signs Checklist (IBWSC) has not been validated by clinical research, a governing body or academic institution. It has been compiled and published to be a point of reference to educate and assist anyone who is concerned that they, their children, business or community are in the presence of an iPredator or someone in transit to becoming an iPredator.
Note: Responding “Yes, I Agree, True” to any of the statements does not confirm the person being queried is an iPredator or close to becoming one. Responding with an affirmative response should be noted and further investigation is recommended. The term “social networking site” in the IBWSC applies to the multitude of social media sites available online. As of 2012-2013, Facebook, Twitter, Linked In, YouTube, Pinterst and Google + are the most popular social networking sites.
Please be mindful that iPredators use many forums in cyberspace and numerous ICT tools to victimize their targets. In the IBWSC, the term “habitual” represents regular usage of ICT and the Internet. Also in the IBWSC, the acronym, ICT, is defined as Information and Communications Technology and represents an umbrella term consisting of all forms of telecommunication, information technology, broadcast media, audio and video processing, transmission and network based control and monitoring functions.
As stated above, responding “Yes, I Agree, True” to any of the statements does not confirm the person is an iPredator or close to becoming one. However, affirmative responses to five or more of the statements are a strong indicator that the person being queried is either an iPredator, crossing the iPredator Bridge or suffering from some psychological and/or perceptual dysfunction.