Education, Investigation, Consultation
Information Age Forensic Services
iPredator Inc. Professional Services: iPredator Inc. was founded in September 2011 to provide educational and advisory products & services to children, adults, schools, businesses and the professional and public safety sectors on Cyber Bullying, Cyber Stalking, Online Sexual Predators, Cyber Crime, Internet Defamation, Corporate Disparagement, Digital Reputation, ICT Psychology and ICT Forensic Psychology.
Created by New York State licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli, iPredator Inc.’s goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, IPI’s mission is to initiate a nationally sustained educational & awareness campaign on internet safety & cyber security.
In 2009, Dr. Nuccitelli became interested in the psychology and profiling of those who use ICT to abuse, steal, taunt and victimize others online. Since 2009, Dr. Nuccitelli has grown even more determined to develop victimization prevention & intervention strategies for ICT users. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners (Identification # 103110.)
Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations. Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist for 10 years and worked in the field of forensic psychology conducting evaluations and consultation to attorneys and court systems. Dr. Nuccitelli has extensive career and academic experiences. His areas of expertise include forensic & criminal psychology, digital forensic psychology, psychiatric & psychological disorders and developmental psychology. He is an avid follower of national & criminal news and enjoys educating the public by interacting with the media.
***Fees for services to iPredator Inc. can be paid using PayPal. Personal and business checks, Money Orders and Certified Checks are accepted, but require bank clearance and confirmation before services are rendered.***
PROFESSIONAL SERVICE FEES
I. Guest expert educational media appearances: No Cost.
II. Phone Consultation Services (Parents, Children Senior Citizens): $300.00 per consult (average length, 30-60 minutes) for non-iPredator Protected members. Dr. Nuccitelli or an iPredator Inc. consultant may waive additional fees if the consultation exceeds the 60 minutes time frame. Consumers are never billed additional fees unless consumer consent has been established.
III. Phone Consultation Services (Public Figures, Organizations): $400.00 per consult (average length, 30-60 minutes) for non-iPredator Protected members. Dr. Nuccitelli or an iPredator Inc. consultant may waive additional fees if the consultation exceeds the 60 minutes timeframe. Consumers are never billed additional fees unless consumer consent has been established.
IV. Dr. Nuccitelli or iPredator Inc. consultant training, certification and educational speaking engagements are $400.00-$2500.00 per engagement and $5000.00-$10,000.00 per keynote engagement (hourly, half day, full day and multiple day rates.)
V. Dr. Nuccitelli or iPredator Inc. consultant online training, certification and educational speaking engagements are $300.00-$1500.00 per engagement (hourly, half day, full day and multiple day rates.)
***iPredator Inc. offers discounted rates for select organizations and public institutions.***
VI. Dr. Nuccitelli or iPredator Inc. law enforcement consultation and/or investigation: $250.00 per hour or $1000.00 per day.
VII. Dr. Nuccitelli or iPredator Inc. consultant expert testimony: $15,000.00 per day (includes testimony preparation.)
VIII. Dr. Nuccitelli or iPredator Inc. consultant attorney or court system consultation and investigation services: $250.00 per hour or $2000.00 per day.
IX. Dr. Nuccitelli or iPredator Inc. consultant online forensic or investigation services: $175.00 per hour and pre-determined by the consumer and iPredator Inc..
X. TIAS: The Telephonic Internet Addiction Screenings (TIAS) is a 60-90 minute telephonic interview designed to assess if an online user, their child, loved one or associate is suffering from a pathological pattern of Information and Communications Technology (ICT) usage. The preferred tool used in a TIAS, not required but encouraged, is the Internet Addiction Risk Checklist (IARC).
Similar in structure as the IARC, the TIAS evaluates cognitive, affective, behavioral and perceptual consequences experienced by the respondent from habitual ICT usage. The cost of a Telephonic Internet Addiction Screening (TIAS) is $200.00 (USD), takes 60-90 minutes to complete and includes all follow-up contacts.
At present, Dr. Nuccitelli consults with the American College of Forensic Examiners Intstitute (ACFEI) with access to their expert members. ACFEI is the largest forensic professional organization in the world with 15,000 members and forensic experts. In ACFEI’s 2011 winter issue of their quarterly journal, The Forensic Examiner, Dr. Nuccitelli’s theory, iPredator, was published. In 2012, ACFEI formally announced their support of Dr. Nuccitelli iPredator technological predator construct.
American College Of Forensic Examiners Institute Announces Commitment to Technological Predator Education
Dr. Nuccitelli and iPredator Inc. consultants interact with regional and national attorneys, law enforcement, Internet security experts and criminal investigators. As information technology continues to expand, law enforcement, the legal system, community organizations and national activist organizations support Dr. Nuccitelli, iPredator Inc., their mission and educational endeavors.
Over the last 4 years, Dr. Nuccitelli has dedicated himself to learning the psychological composition of those who are engaged in malevolent and nefarious activities using ICT. The definition is as follows:
iPredator: A child, adult, group or nation who, directly or indirectly, engages in exploitation, victimization, stalking, theft or disparagement of others using Information and Communications Technology (ICT.) iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age, either gender and not bound by economic status, race or national heritage.
iPredator is a global term used to distinguish anyone who engages in criminal, deviant or abusive behaviors using Information and Communications Technology (ICT.) Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, internet troll or cyber terrorist, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The intermittent to frequent usage of Information and Communications Technology (ICT) to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT.) These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using Information and Communications Technology (ICT) in an abstract electronic universe.
iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. Also different from iPredator are their drives for attacking others.
For those defined in iPredator Bridge, their motivations are cloaked by moral turpitude, self-righteousness and pseudo-justified convictions. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.
Within this new region, and presently without explanation, many people enter cyberspace and access ICT with their instinctual drive for self-preservation remaining dormant. Conversely, other people either quickly or gradually, conclude that ICT and cyberspace offers an environment that allows the pursuit of maladaptive and psychopathological goals undeterred by punishment.
It is within this process that the ICT user or groups of ICT users transcend into the world of iPredator. Once an iPredator, the various typologies begin their search for those they deem as vulnerable, easily accosted and not likely to mobilize the required forces leading to their apprehension and punishment.
The iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung (1875-1961) and his construct of the Collective Unconscious.
Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.
The iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism.
The Information Age is a societal paradigm and period beginning in the last quarter of the 20th century and presently thriving in the second decade of the 21st century. The Information Age represents the evolution, emergence, consumption of and reliance upon Information and Communications Technology (ICT). In a mere four decades, ICT and its importance to humanity have led many to surmise that the planet and its human inhabitants are amidst an Information Revolution.
Mobile device technology, telecommunications, social media & cyberspace are just a few examples of humanities newest communication channels. In all of these arenas, they deal with the new frontier of how humankind obtains exchanges and disseminates information.
Information and Communications Technology (ICT) and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the classic sociopath, deviant, narcissist or criminal, but a new generation called iPredators. These Information Age assailants will be permanent fixtures to humanity for centuries to follow.
In order to effectively educate, evaluate, investigate or advise any ICT user on Internet safety, whether they are a child, adult, group or business, it is paramount to grasp the basic concepts and terms vital to all ICT users. The two terms important to be familiar with are iPredator & Cyberstealth. For it is in cyberspace & the internet, using ICT, that vast majority of iPredators develop, activate and institute Cyberstealth.
Advancements in technology, behavioral sciences and the field of medicine are inevitable along with all aspects of human existence. With the passage of time, it is guaranteed that present day Information Age humanity will one day, at a time in the distant future, be viewed as archaic and primitive. The question to be answered by future historians, in the timeline of human progression, is when iPredators and their tactics of Cyberstealth are no longer problematic to society.
Not being able to predict humanities future trajectory, the concept of hope for an expedient strategy is applied. Given the elements of crime, deviance & evil have always been part of all cultures throughout history and the analogy of “past behavior is the best predictor or future behavior, it falls to reason iPredators and Cyberstealth will be maladaptive facets of human existence for centuries to come. The concepts of iPredator & Cyberstealth are presented as follows:
Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception.
Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.
Unlike classic deception used by traditional criminals and deviants, Information Age Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims.
As the Internet naturally offers all ICT users anonymity if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is IVI or iPredator Victim Intuition. By using Cyberstealth, an iPredator’s IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications.
iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others in the abstract electronic universe known as cyberspace.
As ICT, social media, virtual reality and the Information Age rapidly expands becoming integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. In 2013, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within cyberspace, which ICT users and their loved ones must be vigilant about. Technological advancements have changed the way humanity interacts, exchanges and accesses information.
Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It is often difficult to imagine that the Internet used by more than two billion people globally celebrated its 20th birthday in 2011. Clearly, the Information Age has spread to all corners of the planet.
IPREDATOR GOOGLE PLUS LINKS
[VISIT, JOIN & SHARING APPRECIATED]
- Google + Profile | Dr. Nuccitelli
- Google + Page | iPredator
- Google + Page | Dark Psychology
- Google + Page | Dr. Internet Safety
- Google + Community | iPredator
- Google + Community | Dark Psychology