Internet Safety News-iPredator Inc. Google Plus Pages

internet-safety-news-ipredator-inc.-google-plus-pages-new-york-1100 x 619

Internet Safety News

iPredator Inc. Google Plus Pages

Internet Safety News: NYS Internet Safety Company, iPredator, is dedicating this page to thank Google for providing online users a cornucopia of complimentary  products, tools, services and awesome search engine. To say thank you, and at the same time offer online users valuable information,  iPredator Inc. regularly posts free “no-strings-attached” internet safety, cyber attack prevention and iPredator factor themed information in their Google+ profiles, pages and communities. iPredator G+ links and topics, with definitions, are available below.

Although iPredator Inc. has a vast array of professional services and internet safety tools available to purchase, rarely will iPredator G+ page visitors see them being actively marketed within Google+ pages. If and when iPredator Inc. uploads information about our retail products and services, they will never include subversive sales tactics. The goal and mission of iPredator Inc. is to disseminate internet safety information to online users.

iPredator ensures that all internet safety news and information they post are relevant, safe and educational. Although they cannot 100% verify all the news they find and publish, they do take steps to cross reference the information presented to readers. iPredator ensures 100% of their own information and links have been verified and monitors the information included in external news sources. Central to iPredator G+ posts is making sure they are fair. iPredator G+ will upload external source news that are provocative, so as long as, the author includes both sides of the debated controversy.

iPredator Inc. founder and author, Michael Nuccitelli Psy.D., requires all information and news disseminated in their G+ pages, profiles and communities strictly follows his Information Age Education construct. The pillars of Information Age Education iPredator G+ links, posts and news must follow is that they have prevention education merit, humility (aka, fairness) and encourage family values and respect (aka, mutual respect). iPredator and it’s authors are always available to contact and will delete and/or remove the published information if the content posted does not meet the three pillars of Information Age Education.

Regarding criminal, forensic and “online reputation assassination” themed news, iPredator will not upload information, related to these three areas, unless they have been thoroughly cross referenced for validity. For example, just because someone is alleged or arrested on cyberstalking or cyber harassment charges, does not mean they actually engaged in those behaviors. iPredator works hard to make sure that innocent people’s online reputation is not destroyed by non-substantiated claims.

internet-safety-news-ipredator-inc.-google-plus-pages-new-york-1014 x 351


internet-safety-news-ipredator-inc.-google-plus-pages-new-york-400 x 400


Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses.

Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior. Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time. It is the remaining 1%, Dark Psychology parts from Adlerian theory and the Teleological Approach.

Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic.

Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not prove their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.

internet-safety-news-ipredator-inc.-google-plus-pages-new-york-400 x 400-image-2


iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI], an iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

internet-safety-news-ipredator-inc.-google-plus-pages-new-york-400 x 400-image-3


iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not driven by criminal, malevolent or deviant endeavors, iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies.

Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to confirm the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease.

Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.

iPredator Bridge is a symbolic representation of the approach, route and first crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung (1875-1961) and his construct of the Collective Unconscious.

internet-safety-news-ipredator-inc.-google-plus-pages-new-york-400 x 400-image-4


Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a method entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to make sure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.


internet-safety-news-ipredator-inc.-google-plus-pages-new-york-400 x 400-image-5


Cyberbullying: Cyberbullying is threatening or disparaging information directed at a target child delivered through information and communications technology (ICT.) Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. Dissimilar to classic bullying, cyber bullying includes a phenomenon called Cyberbullying by proxy.

Cyberbullying by proxy is when a cyber bully encourages or persuades other ICT users to engage in deprecating and harassing a target child. Cyberbullying by proxy is a dangerous form of cyber bullying because adults may become accomplices to the cyberbully and may not know they are dealing with a minor or child from their community.

Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of online bullying can become psychologically devastated and/or bullies themselves.


Cyber Harassment: Cyber harassment is the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, cyber harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in trying to control, dominate or manipulate their target.

Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber harassment differs from cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation becomes more vulnerable to corruption. Cyber harassment is the adult form of cyberbullying to a minor.


Cyberstalking: Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate, threaten or make unwanted advances towards a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target. To meet the criteria of Cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones via ICT.

Examples of psychological threats involves disparagement, humiliation, dis-information dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalkers demands. The Internet is a global medium regardless of frontiers, and this creates new possibilities for the growing class of online. Given the Internet is inexpensive and easy to access, distance between cyberstalkers and their targets are no longer a confounding factor. Cyberstalking is both a strategy to target other ICT users and a psychiatric pathology. When internet is a tactic, the assailant does not need to be motivated by psychiatric illness.

internet-safety-news-ipredator-inc.-google-plus-pages-new-york-664 x 435


Online Predation: The typology of iPredator categorized as Online Predators have a variety of terms used to describe the same patterns and motivations for their abuse. Online Sexual Predators are defined as adult online users who seek to exploit vulnerable children or adolescents for sexual and other abusive purposes. Online Predators are sexual predators who use Information and Communications Technology and the Internet to locate, target and victimize minors. Common forums used by Internet  Predators to target children include chat rooms, instant messaging or social networking sites for the purpose of flirting with and meeting others for illicit sexual experiences.

Online Child Predators are motivated to manipulate or “groom” a minor with the goal of meeting and engaging in sexual activity, despite knowing they are engaging in illegal activities. In instances where meeting their victims is not the primary goal, Online Predators also attempt to persuade children and adolescents to take part in some form of online sexual and/or sexually provocative activity motivated by financial gain engaging in the distribution and sale of child pornography.


Cybercrime: Cybercrime is crimes and criminal activity committed on the Internet using Information and Communications Technology as the tools to target victims. All forms of cybercrime involve both Information and Communications Technology and a targeted victim(s). Cybercrime is segmented into two distinct categories involving the focus of the cyber criminal activities. These activities are focalized on the technology of ICT to meet the cyber criminal’s aims for personal and financial gain or targeted at the person using the Information and Communications Technology. When the person is the main target of cybercrime, ICT is the tool. These are the crimes, which have existed for centuries in offline societies.

Scams, Identity Theft and Internet Fraud have existed long before information technology, but in non-digital form. Cyber criminals use technological tools that increase their potential pool of victims and make them difficult to identify and apprehend. Cybercrime targets people, property or governments using Information and Communications Technology.


Cyber Terrorism: Cyber Terrorism is defined as the use of Information and Communications Technology (ICT) by iPredators, organized groups and/or terrorist groups to advance their agenda motivated by religious, political and/or philosophical ideologies. Examples of cyber terrorism include 1. The use of ICT to organize and execute attacks against networks, and Information and Communications Technology (ICT) infrastructures. 2. The exchanging of information or making threats electronically. 3. The act of hacking into computer systems. 4. Introducing viruses and malware to vulnerable networks. 5.Defacement of websites and blogs. 6. Denial-of-service attacks 7. Terrorist threats made via electronic communication.

When strategic cyber attacks are motivated for financial gain, these attacks are defined as cybercrime. Cyber terrorism is any premeditated, politically, religious or philosophically motivated attack against information, computer systems, computer programs and data, which results in violence against non-combatant targets by sub-national groups or clandestine agents. A cyber terrorist attack is designed to cause physical violence or extreme financial harm to the targeted victims or community.

According to the U.S. Commission of Critical Infrastructure Protection, cyber terrorist targets include the banking industry, military installations, power plants, air traffic control centers and water systems. The F.B.I. define cyber terrorism as “The premeditated, politically motivated attack against information, computer systems, computer programs and data which result in violence against non-combatant targets by sub-national groups or clandestine agents.”


Internet Troll: An Internet Troll is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to purposely and actively provoke, defame, anger, tease, flame, or incite other online users. More often than not, the Internet Troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet Trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions. When the Internet Troll’s inflammatory statements and actions do not include a direct or implied physical threat to the target(s), their behavior is categorizes as cyber harassment. If the Troll’s verbal assaults include direct or implied physical threats to their target(s), their actions are then defined as cyberstalking.

The motivations for an Internet Troll’s provocative, and often times, bizarre behaviors are many. Despite the variations in modus operandi, the majority of Trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice.

Although there is no evidence or clinical research validating the psychology of the Internet Troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors. Those who have begun to investigate the etiology of the Troll suggest that the anonymity of the internet contributes to what has been called, disinhibition effect. It has been postulated that internet anonymity leads some to behave in asocial ways coupled with a lack of guilt or remorse for the harm they cause not being in the target’s physical presence or even knowing their identity.


internet-safety-news-ipredator-inc.-google-plus-pages-new-york-800 x 522


Mobile Device Technology: The Mobile Device Technology factor is a collective term representing the portable genre of Information and Communications Technology (ICT) that describes the various types of mobile devices used by children, adults and businesses. Examples include cellular phones, smart phones and tablets. The Mobile Device Technology factor also relates to a child, adult or business’s knowledge and application of mobile device safety. The term, Mobile Device, is a generic term used to refer to a variety of devices that allow people to access data and information from where ever they are.

This includes cell phones, smartphones and various other portable devices. The Mobile Device Technology factor also examines the child, adult or business’s understanding of how they interact with their mobile devices and how iPredators use mobile device technology to target and locate their victims.

However, mobility has far-reaching effects on the enterprise in areas such as security risk, use policies, manageability and governance. Given the rapid growth and inevitable broad expansion of mobile device technology, this area will become increasingly more relevant about all ICT users practicing cautious and proactive mobile device safety. With the fast pace nature of human civilization, mobile device technology will become mandatory requirements for anyone seeking to connect with their loved ones, colleagues, peers and community resources.


Personal Information: The Personal Information factor is a term used to describe the quantity and frequency of personal information an Information and Communications Technology (ICT) user or business shares with other ICT users and available to known and unknown ICT users to view and prospect. Examples of personal information include their home/work/school address, full names, name of school/employer, age, gender, financial information, images, videos and online activities (i.e. passwords, usernames, profiles) The Personal Information factor relates to the ICT user or business’s knowledge and understanding of the risks created when they post and/or share their contact or personal information about their age, gender, daily routines, sexual predilections and online preferences and/or activities.

With an abundance of popular social networking websites, it has become easy for iPredators to target children and adults to amass their personal information. Images and videos posted publicly online can leave a trail easily traceable by iPredators. The Personal Information factor is the most important aspect of Internet safety cautioned to all ICT users. iPredators heavily rely on access and acquisition of their potential targets personal information. Given their advanced ICT prowess and ability to manipulate vulnerable ICT users, many iPredators do not have to rely on social networking sites to obtain the necessary personal information to locate, identify and target their victims.

internet-safety-news-ipredator-inc.-google-plus-pages-new-york-1052 x 680


Social Media: The Social Media factor is used to describe the online technologies and practices an Information and Communications Technology (ICT) user accesses to share their opinions, insights, experiences and perspectives related to their personal, career and/or scholastic activities at social networking websites. Social Media is a form of electronic communication through which users create online communities to share information, ideas, personal messages and other content. The Social Media factor relates to the ICT user’s knowledge and understanding of their energy, time and importance they place on their social media profiles and networking endeavors, perceived online reputation and their interactions with other ICT users using social networking websites.

More specifically, Social Media refers to the use of web-based and mobile technologies to turn communication into an interactive dialogue. Within this factor, the areas investigated include the themes and quantity of personal and sensitive information an ICT user allows other ICT users to view related to themselves, their loved ones or their employers or academic institutions. A growing number of ICT users place an incredible amount of time, effort and thought into their social networking site profiles and endeavors. Social Media has become a driving force in many ICT users’ lives and a frequented arena for cyber bullying, cyber harassment and cyber stalking.


Digital Citizenship: Digital Citizenship is the proper norms of behavior with regard to Information and Communications Technology (ICT) usage. Digital Citizenship addresses the multiple levels of responsibility encouraged for all ICT users when interacting with the devices & applications of ICT and cyberspace. The rules of Digital Citizenship include online etiquette, private information protection, online safety measures, dealing with cyber bullying and harassment, digital rights & responsibilities and cyber security. Digital Citizenship endeavors to advocate, model and teach others safe, legal, and ethical use of ICT including respect for copyright, intellectual property and the right documentation of sources. Educators of Digital Citizenship understand regional and global societal responsibilities in an evolving and rapidly expanding digital culture.

Although Digital Citizenship involves multiple facets, a primary goal is the practice of ICT etiquette and responsible social interactions. ICT etiquette is the electronic standards of conduct and behaviors when interacting with others and respect for the information one posts and disseminates about other ICT users. It is assumed the more adept an ICT user is practicing Digital Citizenship, the less likely he/she is at being targeted by an iPredator. As described in the iPredator Protection factor used to create the theory of iPredator, Digital Citizenship is recognized as an iPredator Protection approach.

internet-safety-news-ipredator-inc.-google-plus-pages-new-york-500 x 375-image


iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations. Their areas of expertise include cyberbullying, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to their professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. If you have questions, feel free to call iPredator Inc. anytime in New York at (347) 871-2416 or by sending correspondence using this website’s contact page by clicking here: Contact Us Dr. Nuccitelli or an iPredator Inc. associate return all contacts within 24 hours.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)


Author: Michael Nuccitelli, Psy.D.
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

iPredator Inc. is a New York based Internet Safety Company founded to provide products and services addressing cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation and online deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
New York
Phone: 347-871-2416

Pin It on Pinterest

Share This