Sorry for the 404 error. Please click here for the homepage
Here for the website guide page
iPredator Site Guide
1st Read Dark Psychology, iPredator, iPredator Bridge & Cyberstealth Definitions
Internet Safety 404 Page
by Michael Nuccitelli, Psy.D.
iPredator Internet Safety 404 Page: At iPredator Inc., we are so determined to educate online users about internet safety & the darkside of cyberspace that even our site’s 404 page is informative. We apologize that you were directed to this page and are doing our best to field and fix all 404’s. Whether you have arrived here due to a link misdirection, search engine mistake or an incorrect hyperlink, feel free to move on to the homepage by clicking here: iPredator Homepage, the sitemap page by clicking here: iPredator Sitemap Page or Dr. Nuccitelli’s darkside of human consciousness construct page by clicking here: iPredator Construct.
To give you a small taste of the information presented here at the site, below are iPredator and Internet Safety definitions, as well as, links to our internet safety tools and cyber risk assessments. The author of the iPredator construct, Dr. Nuccitelli, is always available for contact and can be reached by calling their NY office at 347-871-2416 or via email at email@example.com.
Dark Psychology: Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses.
Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior. Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time. It is the remaining 1%, Dark Psychology parts from Adlerian theory and the Teleological Approach.
Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic.
Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.
iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, online psychopaths, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
- A self-awareness of causing harm to others, directly or indirectly, using ICT.
- The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
- A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. 
iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology [ICT] to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not driven by criminal, malevolent or deviant endeavors, iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies.
Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissismor psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.
Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.
Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.
iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung [1875-1961] and his construct of the Collective Unconscious.
Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.
Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.
Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.
INFORMATION AGE WELLNESS
Information Age Wellness: Information Age Wellness is defined as the practice and study of how Information and Communications Technology [ICT] influences people’s physical, psychological, perceptual and spiritual well-being. By incorporating safe and productive knowledge and practices, citizens and their loved ones of the Information Age are both safer from cyber attacks and able to focus on mind, body & spiritual optimization endeavors. Information Age Wellness incorporates mind, body, spirit and information technology for those seeking a healthy lifestyle. In essence, Information Age Wellness is a combination of Internet Safety, Spirituality, Integrative Medicine & Health Psychology while recognizing the growth and dependency of information technology upon people.
Information Age Health & Wellness should not be confused with online healthcare, telemedicine, e-health or any other medically themed field that interfaces with Information and Communications Technology. Not that these arenas are not relevant, because they are vital to the medical health and longevity of all citizens thriving in the Information Age. Information Age Wellness is more of a conceptual framework, which includes physical health, but also includes psychological and spirit health and well-being in relationship to technology.
Information Age Wellness is the practice and study of how Information and Communications Technology [ICT] influences physical, psychological, perceptual and spiritual well-being. By incorporating safe and productive knowledge and practices, citizens of the Information Age are safe from cyber attacks and able to focus on mind, body & spiritual optimization endeavors. Information Age Wellness incorporates mind, body, spirit and ICT for those seeking a healthy lifestyle.
INFORMATION AGE EDUCATION [IAE]
Information Age Education: IAE is a concept describing a person’s conscious awareness and understanding of living in the Information Age, married to the positive and negative impact Information Technology has upon society. Given humanity thrived during the first century of the Information Age; IAE accepts there lies both benefits and detriments yet to be discovered. IAE assumes awareness, prevention education, family values and humility are vital to reconnecting the disconnected, educating the ignorant and conquering the corrupt [aka iPredator].
IAE assumes that, along with the plethora of gifts and benefits information technology offers society, the dark side of cyberspace has ensnared an ever-growing number of the online citizenry. IAE suggests that people of all ages are migrating towards a state of disconnectedness, shying away from tangible interpersonal relationships, pro-social mores, family values, the practice of humility and just basic kindness. IAE asserts that the only way to thwart the disintegration of disconnectedness is by awareness and cyber attack prevention education.
Prevention education is defined as a community’s proactive approach to minimizing and/or preventing potential negative events, experienced by community members, via educating them about the negative outcomes of their cyber behaviors and beliefs and focusing on the benefits of practicing adaptive and healthy behaviors [aka Internet Safety]. Prevention education is the only solution to helping present and future generations break the growing trajectory of falling into the proverbial abyss of interpersonal disengagement. Not only are disconnected people more apt to engage in criminal, deviant, deceptive, dysfunctional and self-destructive behaviors, they also become exponentially more vulnerable to being targeted by iPredators, and offline criminals and/or assailants.
The harbingers of Information Age Education are educational systems for children and young adults, religious organizations and healthcare professionals for families and pro-social public figures for adults. Equally important to prevention education is the return and reinterpretation of family values and the practice of humility.
In relationship to Information Age Education, family values are defined as “the political and social beliefs that hold the nuclear family to be the essential unit of society” [Wikipedia]. The IAE definition of “family values” is apolitical, irreligious, and not bound by any specific philosophic assumptions, culture, race, or gender bias. Strong and consistent family values are necessary for building trust and confidence in each family member. Family Values are the hallmarks of IAE and consist of respect, forgiveness, responsibility, traditions, generosity and patience. When family values are ingrained into a child, he/she has a higher probability of growing up to be a highly functioning adult, connected to his/her community, and insulated from becoming either an online assailant or victim.
The third tenet of IAE puts forth, as the solution to Information Age societal disconnectedness, is the emphasis and practice of humility. Humility, as defined by Merriam-Webster is “the quality or state of not thinking you are better than other people and the quality or state of being humble”. More than any other moral, value, or philosophical ideology that a person can embrace, the concept of humility seems to be the direct target for extermination by cyberspace and Information Technology. The concept of Humility is practiced and encouraged by all religious dogmas and is equally supported by agnostic and atheistic segments of society. There are few adults walking the face of the Earth who disagree with the practice of humility, as this quality is upheld as being one of the most pro-social qualities an individual can possess.
INFORMATION AGE FORENSICS
Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.
Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to humanity for centuries to follow. iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive, nefarious and malevolent online activities.
“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. 
iPredator Internet Safety Tools
- Adult Internet Safety Checklist [AISC]
- Business Internet Safety Checklist [BISC]
- Cyberbully Abuser Checklist [CBAC]
- Cyberbully Target Checklist [CBTC]
- Cybercrime Protection Checklist [CCPC]
- Cyberstalking Prevention Checklist [CSPC]
- Digital Reputation Protection Checklist [DRPC]
- Educator Internet Safety Checklist [EISC]
- Internet Safety Checklist-Psychology [ISCP]
- Online Predator Prevention Checklist [OPPC]
- Parent Cyber Safety Checklist [PCSC]
- Pediatric Internet Safety Checklist [PISC]
- Teen Internet Safety Checklist [TISC]
- Cyberstalker Identification Interview [CSII]
- iPredator Probability Inventory-330 [IPI-330]
- iPredator Probability Inventory-Adult [IPI-A]
- iPredator Probability Inventory-Business [IPI-B]
- iPredator Probability Inventory-Cyberbully [IPI-CB]
- iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]
- iPredator Probability Inventory-Cybercrime [IPI-C]
- iPredator Probability Inventory-Cyberstalking [IPI-CS]
- iPredator Probability Inventory-Educator [IPI-E]
- iPredator Probability Inventory-Internet Predator [IPI-IP]
- iPredator Probability Inventory-Pediatric [IPI-P]
- iPredator Probability Inventory-Psychologist [IPI-PSY]
- iPredator Probability Inventory-Teen [IPI-T]
iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA]. In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections].
iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education. Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.
- Google +: The iPredator
- Facebook: The iPredator
- LinkedIn: The iPredator
- Twitter: @TheiPredator
- Pinterest: iPredator
- Google + Community: iPredator
- Google + Community: Dark Psychology
“By virtue of the proverbial “cloak of anonymity” so conveniently provided by Information and Communications Technology, iPredators troll cyberspace with a distinct advantage in that they may represent themselves in any way they choose.” Michael Nuccitelli, Psy.D.