100 iPredator Quotes


Thoughts About Online Assailants


100 iPredator Quotes: Provided for you, your loved ones and colleagues below are 100 iPredator quotes, internet safety tips and cyber attack prevention concepts compiled by Michael Nuccitelli, Psy.D. to foster discussions on learning to profile and identify online and Information and Communications Technology (ICT) users who participate in nefarious and malevolent activities.

As Information and Communications Technology (ICT) becomes more widespread, cyberbullying prevention, education and protection are areas requiring immediate attention. The Information Age has many benefits to humanity, but it is vital to identify and prevent the malevolent and nefarious elements that exist in cyberspace. Dr. Nuccitelli’s iPredator quotes and thoughts about online assailants are as followed:



  1. iPredator is a global term used to distinguish all online users who engage in criminal, deviant or abusive behaviors using Information and Communications Technology. Whether the offender is a cyberbully, cyberstalker, cybercriminal, online sexual iPredator, Internet troll or cyber terrorist, they fall within the scope of iPredator.”
  2. “There are three criteria used to define an iPredator including: I. A self-awareness of causing harm using Information and Communications Technology. II. The intermittent to frequent usage of Information and Communications Technology to obtain, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to profile, identify, locate, stalk and engage a target.” .
  3. “A fourth criterion, not included in the triad defining an iPredator, is what I have termed victim Intuition (IVI) and reserved for seasoned iPredators. IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications.” .
  4. “Cyberstealth, a concept formulated along with iPredators, is a term used to define a method and/or strategy by which iPredators devise tactics to establish and sustain complete anonymity while they troll and stalk an online target.” .
  5. “Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in online activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.”  
  6. iPredator is a global concept used to define children, men, women and groups who use Information and Communications Technology to harm innocent, vulnerable and unsuspecting online users. The goal of the United States is to stop the growth of iPredator by educating its citizens on their tactics and strategies.” .
  7. “Technological advancements have changed the way humanity interacts, exchanges and accesses information. Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It’s often difficult to imagine that the Internet used by two billion people globally celebrated its 20th birthday years ago in 2011.” .
  8. “Although the benefits of Information and Communications Technology far outweigh detriments for society, humanity has been seduced by the notion that more technology translates into a better quality of life.” .
  9. “Along with the distorted societal perception that more technology translates into a better quality of life, humanity also fails to heed the warnings of prophetic authors of the past century that wrote about chilling glimpses of a Dystopian society.” .
  10. Dystopia is the concept of humans relying upon and habitually using technology, and at the same time, not being able to effectively cope with the technology that has progressed far more rapidly than their spiritual evolution.” .
  11. “Now where is the picture of Dystopia more clearly depicted than through the literary genre of science fiction. Expressed in the literary works of prophetic writers such as Ray Bradbury, Aldous Huxley and George Orwell, humanity becomes increasingly separate from one another led by technology.” .
  12. “If not addressed, some predict humanity will enter an age that is the embodiment of Dystopia depicted in Ray Bradbury’s novel Fahrenheit 451. The similarities between humanity’s current condition and Ray Bradbury’s well-crafted, cold, detached characters in Fahrenheit 451 are intriguing to say the least.” .
  13. “Dystopia, portrayed in Ray Bradbury’s novel Fahrenheit 451, depicts a society in which technology has replaced human effort and thought and eerily parallels technological forecasts of contemporary culture.”
  14. “The concept of being “connected” paradoxically makes us less connected to what is really happening globally. As Information and Communications Technology becomes increasingly widespread, the less we know our neighbors and the more we assume we know the people with whom we are connected to online.”
  15. “As humanity becomes more dependent on Information and Communications Technology, humanity slowly separates, isolates and disconnects from human contact on a real human and spiritual level.” .
  16. “Society is being lulled into a false sense of trust and reliance on technology, taking information and “connection” to others in cyberspace at face value. Like the child in the fairy tale, Little Red Riding Hood, innocently wandering through the forest, we erroneously believe that the “Wolf” is whoever he appears or claims to be. Just as Little Red Riding Hood, we’re in danger of falling prey to iPredator.” .
  17. “Although disguised, Little Red Riding could see her stalker, whereas we cannot thanks to Cyberstealth and the inherent anonymity provided by Information and Communications Technology.” .
  18. “It is brilliant how the 17th-century fairy tale, Little Red Riding Hood, evolved to strikingly resemble the tactics of impersonation used in cyberbullying and online predator stalking. Unfortunately, the familiar theme of an efficient predator disguised as someone or something else is exactly what currently occurs in cyberspace.”
  19. “By virtue of this proverbial “cloak of anonymity” so conveniently provided by Information and Communications Technology; iPredators troll cyberspace with a distinct advantage in that they may represent themselves in any way they choose.”
  20. “Some iPredators stalk their target’s online activities from an undetectable and discreet distance. iPredators won’t merely become who they elect to be, but they can subconsciously transform into anyone their target desires them to be.”
  21. “The grave repercussions from iPredators devoid of answerability will be catastrophic for all citizens of the Information Age. Therefore, we must re-examine the extraordinary phenomenon of information technology and its deleterious impact upon the human psyche.” .
  22. “Society must familiarize itself with the Dark Psychology of information and communications technology and learn to properly respect the mighty potential for harm that lurks beneath its surface.”
  23. “Civilization has become ripe for the cancerous growth of a new human predator advanced in all things internet. This online aggressor’s selected name is iPredator.”
  24. “The social arena iPredators stalk their targets is in cyberspace with offline contact often a secondary objective. How many will have to be molested before citizens of the Information Age prioritize internet safety and digital citizenship?”
  25. “Whereas virtual reality is artificial, simulated and increasingly helpful to humans; iPredators (aka, Online Aggressors) are absolutely real, deceitful and potentially downright dangerous.”
  26. “In many cases, iPredators exhibit minimal disquiet for their target’s psychological welfare by injecting fear, abject humiliation and panic into their world.”
  27. “iPredators represent the antithesis to the productive environment undoubtedly created by Information and Communications Technology (ICT) & hinders humanity’s exploration in cyberspace.”
  28. “Unlike traditional human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to the data available.” .
  29. “Malevolent in intent, iPredators rely on their capacity to deceive others using Information and Communications Technology in an abstract electronic universe.” .
  30. “Within the next three decades, iPredator acts of theft, violence, abuse, cyber warfare and cyber terrorism will grow into a global plague if not quashed and thwarted.” .
  31. “In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” .
  32. “iPredators use a tactical weapon I’ve termed “Cyberstealth” furnished by Information and Communications Technology. Cyberstealth is a method iPredators create and implement while they taunt, troll and stalk their prey.” .
  33. “iPredators target online users, corporate entities and organized groups oblivious, inexperienced, ill-informed or unaware they are covertly being evaluated as a potential target for a cyber attack.” .
  34. “The prime target iPredators cyberstalk are those who lack internet safety strategies, healthy skepticism and digital citizenship practices.” 
  35. “Cyberspace does not forgive, forget or explain. What we publish online is permanently imprinted like memories of the mind.” 
  36. “Humans are the only living organisms that stalk, hunt and attack their own species without the primary instinctual drives of procreation, social positioning, survival or food.” 
  37. “Although I view the World Wide Web, Telecommunications, Digital Technology and Mobile Device Technology as highly beneficial tools and areas helpful to society, I do recognize tools have many different purposes. When chosen for nefarious reasons, Information and Communications Technology are tools that become weapons.” 
  38. “iPredators primarily use Information and Communications Technology as weapons in their efforts to offend, dominate or steal.” .
  39. “When chosen for nefarious reasons, Information and Communications Technology are tools that become weapons, which can be lethal.” .
  40. “Prior to Information and Communications Technology, all methods of communication involved some form of identification and response recognition skills using at least one of the five senses. Although deception, crime and immoral acts were committed, they entailed far more creativity, design and planning than what is required online.” .
  41. ““The more psychologically isolated we become, the more cyberspace perceptually distorts our reality.” .
  42. “In cyberspace, our physical senses are relatively subdued as we exchange and/or verify information as valid isolated from the source.” .
  43. The “veil of invisibility” that Information and Communications Technology and cyberspace offers humanity has numerous benefits, but the detriments can far outweigh the assistances for the vulnerable, unaware or ignorant online user.” .
  44. “iPredators use Cyberstealth for vindictive, abusive, malevolent or criminal pursuits. They purposely strategize and plan how they will use Cyberstealth without the negative consequences of law enforcement or authority figure identification.” .
  45. “The energy required in planning and designing Cyberstealth strategies by an iPredator correlates with their perverse objectives.” .
  46. “To the child cyberbully, they tend to practice minimal online deception given they are fueled by needs of recognition and peer acceptance.” .
  47. “Depending on the cyber bullies strategy of taunting and harassment, their Cyberstealth may range from non- existent to cyberbullying by proxy. Cyberbullying by proxy is when a cyber bully coerces or encourages other online users, who do not know the target victim, to become an accomplice of the cyber bully and join in assaulting the target child.” .
  48. “At the advanced end of the Cyberstealth continuum are online sexual iPredators, cyber criminals and those seeking to target victims motivated by violent and/or sadistic intent. Although the majority of child sexual assaults takes place offline by friends, family members and young adults close in age to the target child, there still are thousands of online sexual predators confirmed by the FBI online trolling for discouraged, easily manipulated children.” .
  49. “At the advanced end of the Cyberstealth continuum are online sexual predators, cyber criminals and those seeking to target victims motivated by violent and/or sadistic intent.” .
  50. “Although the majority of child sexual assaults take place offline by friends, family members and young adults close in age to the target child, there still are thousands of online sexual iPredators confirmed by the FBI online trolling for discouraged, easily manipulated children.” .
  51. “As part of the human condition, we tend to embellish our attributes, both offline & online wanting to present ourselves as more successful, attractive and worldly. The purpose of embellishing our attributes is not to abuse or victimize the recipient, but to increase our perceived worth.”
  52. “Information and Communications Technology can paralyze our innate evolved instinct for “survival of the species” and cause us to lose sight of being skeptical and wary of people we meet online.” .
  53. “Although federal, state and local officials work diligently to combat iPredators, their endeavors, as of 2012, are minimal at best given the size of the iPredator contingent. iPredators have the luxury of trolling for victims at a leisurely pace without fear of punishment.” .
  54. “Unassuming online users are easily lulled into complacency because they are either ignorant to iPredator Cyberstealth practices, seeking social acceptance by someone they think will “like them” or engaged in high-risk online behaviors.” .
  55. “The reasons for online users engaging in high-risk behaviors are multi-faceted, but relied upon by iPredators in order for their Cyberstealth to be effective.”
  56. “Cyberstealth is an iPredators most powerful weapon in their strategy of hunting online human quarry.” .
  57. “Fueled by anger, depression, greed, narcissism and/or sociopathy, many iPredators revel in their Information and Communications Technology anonymity.”
  58. “Many also become grandiose from their criminal and abusive triumphs and feel galvanized knowing they can freely troll for potential victims, seemingly immune from law enforcement identify or apprehension.” . “Depending on their relationship to the victim, iPredators have the freedom to preserve or divulge their identity at will.”
  59. “Without fearing reprimand, iPredators participate in creative design and focused purpose in their line of attack.” .
  60. “In the Information Age, the new dimension of cyberspace is unchartered territory filled with opportunity and hope. The antithesis to these opportunities are iPredators.”
  61. “Without strict penal regulations, a sustained law enforcement presence and structured educational methods, cyberspace will become a prime hunting environment for iPredators’ abusive, criminal or sexually deviant pursuits.” .
  62. “Although this writer staunchly advocates for online privacy, iPredators must have in the back of their minds a serious potential for identification, apprehension and prosecution when they engage in nefarious and/or malevolent activities.” .
  63. 5PV is a five-factor theoretic model used to conceptualize all interactions between people who use Information and Communications Technology for benevolent reasons and iPredators who use it for selfish and/or malevolent reasons.” .
  64. “The five terms pertaining to 5PV are iPredator, iPrey, iPrevention, iPreservation and iVictim. The 5PV Model is a representation of the five elements involved in all Information and Communications Technology, cyberspace and the criminal, deviant or abusive interactions between online users.” .
  65. “The primary difference between the 5PV model and other criminal and deviant victimization dynamics is the environment in which offender and victim interact. This environment, which benefits iPredator, is the Geosocial Universe.” .
  66. “Unlike any other territory, cyberspace is a frontier where the potential victim has little authority to evaluate their social exchanges in a realistic way.” .
  67. “Information and Communications Technology and Cyberstealth have afforded the criminal, deviant and sociopath pristine anonymity in their hunt for target victims.” .
  68. “It is in this realm, cyberspace, that iPredators are able to create a persona judged effective in their tactical strategy to achieve success in stalking.” .
  69. “Without fear of identification, many iPredators have free reign to behave, interact and personify what they believe to be their most successful scheme.” .
  70. “A fifty-year-old man can create an online social profile exactly how he feels will be viewed as most favorable by his target. If his prey is a 14-year-old female, he can download adolescent images, develop a creative teen background and interact with his teen target as someone close to her age and stage in life.” .
  71. “Cyberspace and the online world provide iPredators a forum for pristine virtual reality and a forum to seduce their prey into believing their online identities are their true identities.” .
  72. Virtual reality is a term that applies to computer-simulated environments that can simulate the physical presence in places in the real world, as well as in imaginary worlds. iPredators no longer have to hide behind the proverbial bushes and can skulk about in the dimension of cyberspace undetected, hidden and cloaked to perfection.” .
  73. “Many iPredators evaluate their target quarry by first assessing if they are exercising personal security, harm reduction or victim prevention measures.” .
  74. “The concept that I have termed iPrevention, describes the sustained practice of Internet safety, cyber security and self-awareness. iPrevention is a strategy, practice and conscious sustained approach to reducing the probability of becoming an iVictim. These strategies involve a concerted effort to learn personal aspects and relevant demographic information about oneself that would increase the chances of becoming a target.” .
  75. “As Information and Communications Technology will always advance, iPrevention as well must be a proactive and progressive activity.” .
  76. “As Information and Communications Technology will always advance, iPrevention as well must be a proactive and progressive activity. This is not to say that iPrevention requires advanced training in Information and Communications Technology, but a sustained effort to learn and evolve given its rapid expansion. What is required is a willingness to exercise diligent awareness and confirmed acceptance that some iPredators will always be one-step ahead in technological acumen.” .
  77. “Under the theory of iPrevention, the goal is not to be a step ahead of iPredators but being keenly aware that they are always on the prowl and are using creative Cyberstealth methods to find and stalk their prey.”
  78. “Internet users can reduce the probability of becoming an iVictim, while accessing Information and Communications Technology, by practicing effective iPrevention.” .
  79. “iPreservation is defined as an innate state of self-survival that manifests in an Information and Communications Technology and cyberspace environment.”
  80. “Just as humanity has evolved their five senses to survive and thrive, humanity will now have to evolve a new sense to survive and thrive in the infant dimension of cyberspace.”
  81. “Using a symbolic equation, the importance of iPrevention & iPreservation to internet safety is as follows: iPrevention=iPreservation.” .
  82. “iPrevention=iPreservation. This simple equation represents a basic formula for all cyber protection and online safety initiatives by online users supporting humanity’s constitutional survival instincts.” .
  83. “Although cyberspace is clearly an abstract electronic universe that really does not exist, humanity both perceives and experiences the digital world as a genuine place having vital importance.” .
  84. “In addition to the time spent and information shared while in cyberspace, advanced online safety skills also includes awareness of how offline behavior and lifestyle can modify online behavior. Far too many adults and parents of children fail to be cognizant that offline circumstances and psychological stressors dictate and govern online behaviors.” .
  85. “In my entire file of research and hours of investigation that I have engaged in to formulate the construct of iPredator, the one theme emphasized throughout its entire philosophical framework is Offline Distress Dictates Online Response (ODDOR).” .
  86. “In response to Offline Distress Dictates Online Response (ODDOR,) both a child and adult’s response to their offline environment is directly correlated to how they behave online. When home, school, work, finances or other offline factors are causing significant distress, research has proven online users of all ages are more apt to be less vigilant in Internet safety tactics and more likely to engage in higher risk online behaviors.” .
  87. “Online users that have been highly stressed offline are profiles the iPredator seeks to target.” .
  88. “iPreservation is defined as an innate reservoir of fuel or drive for lowering our probability of becoming a victim at the hands of an iPredator. This concept is an active “state of awareness” consistently observed by online users recognizing cyberspace is always an abstract concept and not a real dimension of space or reality.” .
  89. “The innate need for survival should become pronounced in all of us in the digital world given that iPredators are protected by Cyberstealth, guided by conquest and domination and growing in numbers as Information and Communications Technology evolves and spreads.” .
  90. “iPreservation is also defined as an instinctual motivation to institute a set of behavioral goals in order to lower the probability of becoming a victim of an iPredator. iPreservation is both a state of being and a diligent practice.” .
  91. “If someone is consciously aware that iPredators spend a considerable amount of time and energy trolling for vulnerable targets, that online user experiences a sense and/or need to preserve their safety.” .
  92. “The motivation for iPreservation is not based on fear of iPredator, but rather, in the awareness they exist.”
  93. “The ideal target for an iPredator does not take the necessary steps required to reduce their probability of becoming a mark. They tend to practice denial, view themselves as too technologically advanced or outside the purview of iPredator.” .
  94. “iPredator’s antisocial pursuits are fueled by their distorted perceptions of self- preservation, narcissism and needs to dominate and control.” .
  95. “For many of these miscreants, iPredators believe they must victimize others in order to thrive, sometimes to survive, to feel socially accepted and often for a sense of accomplishment, right or vindication.” .
  96. “Their motivations to harm others are not always restrained by guilt or remorse, because they perceive their actions towards a victim is deserved and the person should have expected it given their attitude, actions or ignorance.” .
  97. “Perceiving their actions in this way, iPredators justify the purpose of their malevolent and nefarious behaviors allowing them to harm others without feeling remorse.” .
  98. “Given that the concept of iPredator includes all people, who attempt to taunt, victimize or abuse others using Information and Communications Technology, the easiest way to define the cornucopia of assailants and their core constructs are defined as lacking in the Adlerian concept called Social Interest.
  99. “iPredators stalk their quarry for deviant sexual needs, distorted sociopathic endeavors, criminal intentions, immature developmental needs to be accepted or psychological/psychiatric issues.”
  100. “iPredator Victim Intuition [IVI] is an online assailant’s aptitude and skill to assess a potential target’s vulnerabilities, weaknesses and technological limitations in relationship to the probability of being identified, apprehended and punished.”.


Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving online perpetrators, cyber-attack targets, and the dark side of cyberspace. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to start a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.


iPredator Inc. is a New York based Internet Safety Company founded to provide products and services addressing cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation and online deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
New York
Phone: 347-871-2416

Pin It on Pinterest

Share This