Cyber Attack Investigation Network Volunteers
CAIN, Cyber Attack Investigation Network, is a group of online users who volunteer their time helping other online users that are cyberstalked, cyberbullied, internet trolled, sexually solicited, cyber harassed, exploited, deceived and defamed. In addition to helping online users, CAIN actively searches for those who meet criteria for iPredator. If the assailant(s) is an internet troll or other iPredator type, they are tracked, reported, blocked and monitored until Google+ or the host social networking site deletes and bans their profile.
When the assailant is profiled as being high risk, CAIN members will investigate the assailant outside of the host social networking site to assess if they are actively involved in cybercriminal and/or deviant behaviors requiring law enforcement intervention. CAIN also disseminates internet safety and cyber attack prevention information relevant to online users of all ages.
“Once CAIN identifies and compiles proof of the iPredator’s malevolent and nefarious online activities, they alert their followers, report and then block them. Like a pack of wolves working in unison, they track iPredators until the platform suspends their profiles or the iPredator cancels their own account not being able to continue in their cyber abuse or online deception.”
For anyone new to learning about the Dark Side of Cyberspace, following just one of them will quickly educate you on how iPredators & iPredator Bridge online users conduct themselves in cyberspace. Not that I needed verification for my own theoretical postulates, but these young online users users have proven that iPredators can be any age, race, gender, socio-economic status or sexual orientation.
CAIN, the Cyber Attack Investigation Network, officially was born October 30, 2014 with a handful of members. Membership is free and CAIN accepts any online user interested in helping to make Google+ and the internet a safer environment. Given that Google+ will be shutting down April 2019, CAIN will be spending more time in other social media platforms.
CAIN MEMBER GUIDELINES
CAIN (Cyber Attack Investigation Network) is a volunteer group of online users who help other online users that are cyberstalked, cyberbullied, internet trolled, sexually solicited, cyber harassed, exploited and defamed. In addition to helping online users, CAIN actively searches for those who meet criteria for iPredator. If the assailant(s) is an iPredator, they are reported, blocked and monitored until the platform deletes and bans their profile. If the assailant is profiled as being high risk, iPredator Inc. will investigate the assailant outside of the platform to assess if they are actively involved in cybercriminal and/or deviant behaviors requiring law enforcement intervention. CAIN also disseminates internet safety and cyber attack prevention information relevant to online users of all ages.
- If the online user has a fake profile, please make sure the profile is engaging in abusive behaviors.
- Please provide at least one bullet point as to the rationale for CAIN members to report and block the online user.
- Please respect other online users’s freedom of speech, opinions, religious preferences and interests. For example, a Satanist, Troll or Fake online user is not reported unless they breach the platforms Content and Conduct Policy.
- Please do not request an online user to be reported, blocked and tracked if you have a disagreement with that online user.
- Please do not request an online user be reported, blocked and tracked if they have a fake profile, but are not breaching the platform’s Content and Conduct Policy.
- Please do not request an online user be reported, blocked and tracked if they post images or videos that are not graphic, obscene or perverse.
- Please provide a clickable online user profile URL when requesting they be reported, blocked and reported.
- Online users can only be reported, blocked and tracked from the CAIN social platform community or group
- When reporting an online user, please provide a reason so other CAIN members know what to choose when reporting an online users.
- Please do not engage in online deception, impersonation or entrapment unless approved by CAIN’s owner, Michael Nuccitelli, Psy.D.
- As a CAIN volunteer, please make an effort to report, block and support other CAIN member’s posts.
Online Deception [aka, Disinformation, Cyberstealth]: Unlike classic deception used by traditional criminals and deviants, Disinformation [aka, Online Deception, Cyberstealth] completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Disinformation and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims.
Disinformation includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. Disinformation does not require an ICT user to engage in nefarious, deviant or malevolent activities. Although all forms of deception are problematic, Disinformation can be as subtle of what many call a “white lie.”
Another difference is when iPredators use Cyberstealth to hide their identity from victims. In general, iPredators use Cyberstealth when their actions involve illegal activities and hiding their identity is paramount to reduce being identified, apprehended and prosecuted. ICT users who evaluate their odds of being identified, develop tactics and strategies to minimize identification are motivated by criminal, deviant & harmful causes are iPredators using Cyberstealth.
Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted.
The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment. Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in.
In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.
“Darkside of Cyberspace is a metaphor and conceptual framework defining a virtual environmental realm that includes all criminal, deviant, deceptive, harmful and malevolent activities in the abstract universe of cyberspace. Whereas iPredator is a criminal, deviant and disturbed typology construct, Darkside of Cyberspace also includes legal and illegal online activities, as well as, destructive and self-destructive online behaviors.” Michael Nuccitelli, Psy.D. (2013)
Michael Nuccitelli, Psy.D.
Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving online perpetrators, cyber-attack targets, and the dark side of cyberspace. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.
In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to start a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at email@example.com.
- LinkedIn Page: iPredator
- LinkedIn: Michael Nuccitelli, Psy.D.
- Twitter: #iPredator
- Facebook Page: The iPredator
- Facebook: Michael Nuccitelli
- Pinterest: iPredator
- Tumblr: iPredator