Internet Safety Super Hero for Children
Cyber Tyger (aka, Cybr Tygrrr!) is a young white tiger superhero who protects young kids online (K-6). Cyber Tyger helps protect kids from cyberbullies and the dangers of cyberspace. When he was born, the doctors used digital technology to help his mother’s birth, which gave him super cyber powers. Cyber Tyger and his adversaries, including his archenemy Troll Man, were originally conceived in 2011 to educate young kids about internet safety and cyber attack prevention.
At present, Troll Man & Cyber Tyger remains as concepts with everything but final character designs. Once graphic designs of Cyber Tyger, Troll Man and other related characters have been created, they will be ready for online and offline publication. iPredator Inc. plans on offering these characters, at no cost, to elementary schools, parents and primary caregivers. Whereas Cyber Tyger’s hero, McGruff the crime dog says, “Take a Bite Out of Crime“, Cyber Tyger’s motto is “Take a Megabyte Out of Cybercrime”.
Until iPredator Inc. creates his own website, information about Cyber Tyger can be accessed here at this page, https://www.ipredator.co/cyber-tyger/, or his own domain that redirects to this page as well. www.CyberTyger.org Feel free to read or download, at no cost, a brief history of Cyber Tyger below and visit his board to download images at iPredator Inc.’s Pinterest account. https://www.pinterest.com/ipredator/cyber-tyger/
Cyber Tyger History
Character: Cyber Tyger (aka CYBR TYGRRR‼!) is a white Bengal Tiger superhero who is both a cybercrime fighter and a partner to McGruff, the crime dog. Cyber Tyger helps McGruff to stop cyberbullying, cyberstalking, cybercrime, online child predators and all the dangers lurking in cyberspace aimed at hurting kids.
History: Cyber Tyger was born 20 years ago around the same time as the internet was launched. When he was in his mother’s womb, the doctors at the Bronx Zoo used digital technology, computers and internet machines to help Cyber Tyger’s mother give birth to Cyber Tyger without being harmed. Without the doctors knowledge of information technology and computers at that time being so new, they did not realize the cyber circuitry they used to help Cyber Tyger’s mother had an amazing effect on her newborn son. Cyber Tyger was born a healthy tiger cub and everyone celebrated.
As Cyber Tyger grew, he began to show amazing abilities quite different than his tiger friends. Cyber Tyger was not only really strong and smart, but he knew how to use a smartphone and everything available in cyberspace. People from miles around would come to Cyber Tyger’s home at the Bronx Zoo to watch him use his smartphone and the computer. In fact, Cyber Tyger was so smart that he made a pair of shades that could access the entire cyber universe in a touch of a button on the side of his sunglasses.
With these shades, Cyber Tyger could travel anywhere in cyberspace and everywhere on Facebook, MySpace, MyYearbook and every known online video game. At the touch of a button on the side of his Cyber Shades, he could quickly enter the digital universe to fight bad and mean online kids and adults.
Cyber Tyger also invented the most powerful smartphone ever made. In fact, in 2012 when he made his smartphone, it was the first device in the world to have the memory storage of 1 Zettabyte. Anyone who knows memory and storage of computers knows, as of 2009, the entire Internet was estimated to contain close to 500 exabytes, which is only a half zettabyte. Cyber Tyger had a whole Zettabyte stored in his small smartphone. What that phone could do was absolutely amazing. Cyber Tyger called his cybercrime fighting smartphone the Mobi-Z.
Of particular concern to Cyber Tyger were all the bad and mean online users he heard and read about online. Cyber Tyger could not understand why other kids and some adults would go online to hurt and make fun of other kids. The more he studied the bad kids and adults, the more he wanted to help the innocent kids they were hurting. Armed with his Cyber Shades and Mobi-Z, Cyber Tyger made it his life’s goal to stop cyber bullies, cyber stalkers, cyber criminals, online kid predators and anyone else who would try to use the internet to hurt kids and their parents online.
One day, Cyber Tyger answered a text message from a 6th grade girl from Hyde Park, New York who was being bullied by other girls both during recess at the Haviland Middle School and online at night when she visited her favorite chat room. Cyber Tyger went to her school and spoke to the best teacher there and her name was Ms. N.
Ms. N. told Cyber Tyger that many of the students picked on other students online, using text message, Tweets and emails to send mean and hateful messages. Ms. N also said some students used their cell phones to take embarrassing pictures of other students, posted them online, would tell all the other students and then make fun of the student’s embarrassing pictures during lunch period. After investigating the case, Cyber Tyger quickly determined this was a case of both bullying and cyber bullying.
Ms. N asked Cyber Tyger if he knew McGruff, who was in the schoolyard searching for evidence. Cyber Tyger was surprised, shocked and honored to meet the famous McGruff. Ms. N chuckled and brought him to meet McGruff. Cyber Tyger was so nervous and excited at the same time. When they met, McGruff was very friendly and Cyber Tyger was nervous with his long tiger tail shaking. Ms. N informed McGruff of all Cyber Tyger’s abilities, his Mobi-Z, Cyber Shades and fight against bad and mean kids and adults online.
McGruff was so impressed with Cyber Tyger, he asked him if he would consider joining his fight against crime. McGruff went on to say that, he could use help fighting the new crime of cyber bullying, cyber stalking, cybercrime, cyber harassment and adults who stalk kids online. Cyber Tyger was so excited, he said “Yes”, before McGruff finished his sentence.
Not only was Cyber Tyger happy, but Ms. N. collected all the teachers, all the students, called the Poughkeepsie Journal newspaper and held a pep rally. In front of the whole school and the newspaper, Ms. N. Told everyone there that McGruff and Cyber Tyger were the new Crime & Cybercrime Team aimed at helping kids throughout the world. Everyone clapped and yelled “Cyber Tyger Plus McGruff Equals Cyber Cool!!!”
McGruff stepped up to the microphone and simply said, “Thank you Haviland Middle School and Ms. N., Take A Bite Out Of Crime.” After he was done, Cyber Tyger stepped up to the microphone and yelled with joy, “Haviland Middle School Rocks and Ms. N. Is Way Cool!!!, Take A MegaByte Out Of CyberCrime!!!”
Appearance: Cyber Tyger is a white Bengal Tiger, but tall & slender (Bigger than “The Pink Panther”, but not as wide as “Tony The Tiger.”) He is always dressed as a combination of the two Matrix character’s Morpheus and NEO. He usually looks like NEO, but has the sunglasses of Morpheus and the long leather coat Morpheus wears.
Cyber Tyger’s Mentor & Best Friend
McGruff’s Website: http://en.wikipedia.org/wiki/McGruff_the_Crime_Dog
Ideas: Cyber Tyger is a white Bengal Tiger, thin and tall like NEO from the Matrix. But, when he activates his Z-Mobi or Cyber Shades taking him into cyberspace, he changes and morphs colors from white with black stripes to black with really cool neon cyber blue stripes.
Cyber Tyger gives out his Cyberbully Proof Badges and wrist bands to kids who both fight against cyberbullies and help other kids who are being cyberbullied. Once they agree to fight cyber bullying, they get their cool wristbands or badges and then they become part of Cyber Tyger’s team called, The Cyber Justice League.
Take A MegaByte Out Of CyberCrime!
Arch Enemy to Cyber Tyger & Internet Safety Savvy Kids
Troll Man is a pediatric internet troll super villain who is an enemy of Cyber Tyger and online scoundrel to children and all online users throughout the world and cyberspace. As a Cyborg with many digital powers, Troll Man travels throughout cyberspace bullying, cheating, lying and stealing from anyone who he target. Once an online user accidently or purposely opens one of his sent iTroll email attachments, the online user cannot escape his devious plans and threats. What makes Troll Man so dangerous is when he uses his shape shifting powers to lie to kids and their parents online.
In cyberspace, Troll Man can turn himself into almost perfect replicas of his target’s online friends, loved ones and teachers. He can also shape shift into different digital devices and software programs. Although he is stuck in cyberspace and can never leave as Cyber Tyger can, Troll Man wants to rule the earth. To make sure he stays locked online, Cyber Tyger & his cyber savvy army of kids work hard to prevent his escape. By protecting and teaching other online users about cyberbullying, cybercrime, cyberstalking, internet trolling, cyber harassment, internet addiction and online deception, the Cyber Justice League keeps Troll Man trapped online.
Dark Psychology, iPredator, iPredator Bridge, Cyberstealth & Information Age Forensics
Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses.
Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior. Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time. It is the remaining 1%, Dark Psychology parts from Adlerian theory and the Teleological Approach. Dark Psychology postulates there is a region within the human psyche that enables some people to commit atrocious acts without purpose. In this theory, it has been coined the Dark Singularity.
Dark Psychology posits that all humans have a reservoir of malevolent intent towards others ranging from minimally obtrusive and fleeting thoughts to pure psychopathic deviant behaviors without any cohesive rationality. This is called the Dark Continuum. Mitigating factors acting as accelerators and/or attractants to approaching the Dark Singularity, and where a person’s heinous actions fall on the Dark Continuum, is what Dark Psychology calls Dark Factor.
Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic. Dark Psychology introduces a third philosophical construct that views these behaviors different from religious dogmas and contemporary social science theories.
Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.
iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
(A Cyberbully’s Fingerprint Cyber Tyger Found In Cyberspace)
A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.
Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli Psy.D. C.F.C., iPredator Inc. (2013)
iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not driven by criminal, malevolent or deviant endeavors, iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies.
Similar to the iPredator, they are motivated by personal convictions, greed, power and control. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.
Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.
Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception.
Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.
Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.
Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.
Information Age Forensics
Information Age Forensics: Information Age Forensics (IAF) is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, deviants and violently disturbed, iPredators, who use Information and Communications Technology (ICT) in the commission of their criminal, deviant and harmful activities are criminal classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.
Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to humanity for centuries to follow.
iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, nefarious and malevolent online activities.
“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. (2013)
iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. To contact Dr. Nuccitelli to inquire about training, national iPredator consultants, educational services, consultation, iPredator Protected, telephonic internet addiction screenings or their social media safety exams, please email him at email@example.com or via phone at 347-871-2416. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files. The vertical “Assessments” tab in the sidebar of your browser or mobile device drops down to reveal 26 additional pages leading to iPredator’s battery of cyber attack risk assessments.
- Google + Profile | Michael Nuccitelli, Psy.D.
- Google + Page | iPredator
- Google + Page | iPredator Inc.
- Facebook | Michael Nuccitelli, Psy.D.
- Facebook | The iPredator
- Twitter | @TheiPredator
- Linked In | iPredator Inc.
- Pinterest | iPredator Inc.
“Although the benefits of Information and Communications Technology far outweigh the detriments for society, humanity has been seduced by the illusory notion that more technology translates into a better quality of life.” Michael Nuccitelli, Psy.D. (2014)
“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” Michael Nuccitelli Psy.D., (2012)
- Copyright © 2014. iPredator Inc., All Rights Reserved.
- Troll Man: U.S. Copyright #1-1796196711
- Cyber Tyger: U.S. Copyright #1-1825203061