Cyber Attack Investigation Network Volunteers
CAIN, Cyber Attack Investigation Network, is a group of online users who volunteer their time helping other online users that are cyberstalked, cyberbullied, internet trolled, sexually solicited, cyber harassed, exploited, deceived and defamed. In addition to helping online users, CAIN actively searches for those who meet criteria for iPredator. If the assailant(s) is an iPredator, they are tracked, reported, blocked and monitored until Google+ or the host social networking site deletes and bans their profile.
When the assailant is profiled as being high risk, CAIN members will investigate the assailant outside of Google+ or the host social networking site to assess if they are actively involved in cybercriminal and/or deviant behaviors requiring law enforcement intervention. CAIN also disseminates internet safety and cyber attack prevention information relevant to online users of all ages.
- CAIN: https://plus.google.com/+IpredatorCoCAIN/posts
- CAIN G+ Community: https://plus.google.com/communities/110682429552109677842
“Once CAIN identifies and compiles proof of the iPredator’s malevolent and nefarious online activities, they alert their followers, report them to Google+ and then block them. Like a pack of wolves working in unison, they track iPredators until Google+ suspends their profiles or the iPredator cancels their own account not being able to continue in their cyber abuse or online deception.”
For anyone new to learning about the Dark Side of Cyberspace, following just one of them will quickly educate you on how iPredators & iPredator Bridge online users conduct themselves in cyberspace. Not that I needed verification for my own theoretical postulates, but these young G+ users have proven that iPredators can be any age, race, gender, socio-economic status or sexual orientation.
Cyber Attack Investigation Network
- Provide a central hub for CAIN members to communicate with one another about identified and yet to be identified iPredators. In Google+, I have created a Google+ Page and Google+ Community to achieve this objective.
- The CAIN G+ Page & Community enables non-members to learn about internet safety and cyber attack prevention.
- The CAIN G+ Page & Community enables students, researchers and those interested in compiling data about the darkside of cyberspace access to real time online assailant information.
- Using the CAIN G+ Page & Community, CAIN members become one unified force working together to target and expose iPredators.
- The CAIN G+ Page enables online users to follow or join CAIN.
- The CAIN G+ Page & Community provides a forum for myself and other professionals to field requests from CAIN members when they are seeking a reference or recommendation for employment & college admissions.
- The CAIN G+ Page & Community provides CAIN members’ concrete evidence of their volunteer services if questioned by their parents, loved ones or interested parties seeking to verify their volunteer services.
- The CAIN G+ Page, G+ Community, associated professionals, businesses & myself all combine to communicate two very important message to CAIN members. These two messages being “Thank You” and “Cyberspace Greatly Appreciates You”.
CAIN, the Cyber Attack Investigation Network, officially was born October 30, 2014 with a handful of members. Membership is free and CAIN accepts any online user interested in helping to make Google+ and the internet a safer environment. Anyone can follow our Google+ page and request to join our private CAIN G+ Community.
CAIN MEMBER GUIDELINES
CAIN (Cyber Attack Investigation Network) is a volunteer group of online users who help other online users that are cyberstalked, cyberbullied, internet trolled, sexually solicited, cyber harassed, exploited and defamed. In addition to helping online users, CAIN actively searches for those who meet criteria for iPredator. If the assailant(s) is an iPredator, they are reported, blocked and monitored until G+ deletes and bans their profile. If the assailant is profiled as being high risk, iPredator Inc. will investigate the assailant outside of G+ to assess if they are actively involved in cybercriminal and/or deviant behaviors requiring law enforcement intervention. CAIN also disseminates internet safety and cyber attack prevention information relevant to online users of all ages.
- Please make sure the G+ User to be reported, blocked and tracked has breached the G+ User Content and Conduct Policy.
- If the G+ User has a fake profile, please make sure the profile is engaging in abusive behaviors.
- Please provide at least one bullet point as to the rationale for CAIN members to report and block the G+ User.
- Please respect other G+ User’s freedom of speech, opinions, religious preferences and interests. For example, a Satanist, Troll or Fake G+ User is not reported unless they breach the G+ User Content and Conduct Policy.
- Please do not request a G+ User be reported, blocked and tracked if you have a disagreement with that G+ User.
- Please do not request a G+ User be reported, blocked and tracked if they have a fake profile, but are not breaching Google Plus’s User Content and Conduct Policy.
- Please do not request a G+ User be reported, blocked and tracked if they post images or videos that are not graphic, obscene or perverse.
- Please provide a clickable G+ User profile URL when requesting they be reported, blocked and reported.
- G+ Users can only be reported, blocked and tracked from the CAIN G+ Community.
- When reporting a G+ User, please provide a reason so other CAIN members know what to choose when reporting a G+ User.
- Please do not engage in online deception, impersonation or entrapment unless approved by CAIN’s owner, Michael Nuccitelli, Psy.D.
- As a CAIN member, please make an effort to report, block and +1 other CAIN member’s posts.
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.
Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
- A self-awareness of causing harm to others, directly or indirectly, using ICT.
- The usage of ICT to obtain, exchange and deliver harmful information.
- A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
“The art and science of effectively mixing truth, observation and generally accepted assumptions with felonious conclusions, illusions and lies. When combined with the veil of anonymity in cyberspace, the final preparation becomes a dish impossible to refuse by the growing population of information addicted gluttons called humanity.” Michael Nuccitelli, Psy.D. (2014)
Online Deception [aka, Disinformation, Cyberstealth]: Unlike classic deception used by traditional criminals and deviants, Disinformation [aka, Online Deception, Cyberstealth] completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Disinformation and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims.
Disinformation includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. Disinformation does not require an ICT user to engage in nefarious, deviant or malevolent activities. Although all forms of deception are problematic, Disinformation can be as subtle of what many call a “white lie.”
Another difference is when iPredators use Cyberstealth to hide their identity from victims. In general, iPredators use Cyberstealth when their actions involve illegal activities and hiding their identity is paramount to reduce being identified, apprehended and prosecuted. ICT users who evaluate their odds of being identified, develop tactics and strategies to minimize identification are motivated by criminal, deviant & harmful causes are iPredators using Cyberstealth.
CAIN Hunts Predatory Trolls & Online Predators
Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted.
The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment. Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in.
In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.
“Darkside of Cyberspace is a metaphor and conceptual framework defining a virtual environmental realm that includes all criminal, deviant, deceptive, harmful and malevolent activities in the abstract universe of cyberspace. Whereas iPredator is a criminal, deviant and disturbed typology construct, Darkside of Cyberspace also includes legal and illegal online activities, as well as, destructive and self-destructive online behaviors.” Michael Nuccitelli, Psy.D. (2013)
Michael Nuccitelli, Psy.D.
Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from Adler University in Chicago, Illinois. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services related to cyberstalking, cyberbullying, internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched this internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety. These sites offer online users an incredible amount of information, education and advisory services. Since 1985, Dr. Nuccitelli has worked in behavioral healthcare in a variety of capacities with various clinical populations.
iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations. Their areas of expertise include cyberbullying, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to their professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.
Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media.
If you have questions, feel free to call iPredator Inc. anytime at (347) 871-2416 in New York or by sending correspondence using this website’s contact page by clicking on this link: Contact Us Dr. Nuccitelli or an iPredator Inc. associate return all contacts within 24 hours.
- Google Plus: iPredator
- Google Plus: Michael Nuccitelli, Psy.D.
- Linked In: iPredator
- Twitter: TheiPredator
- YouTube: iPredator Team
- Facebook: The iPredator
- Pinterest: iPredator Inc.
“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)
- IPREDATOR INC.
- CEO: Michael Nuccitelli, Psy.D.
- NYS Licensed Psychologist
- New York, USA
- Ph:(347) 871-2416
- Blog I:Dark Psychology
- Blog II: Internet Safety
“Comfort the Victims, Educate the Ignorant & Conquer the Corrupt!”
- CAIN: https://plus.google.com/+IpredatorCoCAIN/posts
- CAIN G+ Community: https://plus.google.com/communities/110682429552109677842
#CAIN #CyberAttackInvestigationNetwork #iPredator #InternetSafety #Cyberbullying #Cyberstalking #MichaelNuccitelli #SocialMediaSafety #OnlineSexualPredation #DarkPsychology #DrInternetSafety #iPredatorInc #InternetTrolls
CAIN Pinterest Board