Michael Nuccitelli, Psy.D. | iPredator Inc. Media Kit

Michael Nuccitelli, Psy.D. & iPredator Inc.

Media Kit


Media & Guest Expert Information

[347] 871-2416

The iPredator Media Kit is available to all parties and can be downloaded, at no cost, by clicking on the printer icon at the top and base of this webpage. To speak with Dr. Nuccitelli, or another iPredator Team member, please call 347-871-2416 or via email at drnucc@ipredatorinc.com . Relevant information has been provided below and feel free to call or write if interested in scheduling a media, speaking or educational event. Given the nature of iPredator Inc.’s field of business, we do not readily publish our addresses in cyberspace. If hard copy mail or a physical address if necessary, please call to be given iPredator Inc.’s location(s).

Company: iPredator Inc.
Founder: Michael Nuccitelli, Psy.D.
Address: New York, U.S.A.
Ph: 347-871-2416
Business Email: drnucc@ipredatorinc.com
Website: www.iPredator.co
Michael Nuccitelli Psy.D.
NYS Licensed Psychologist
CEO, iPredator Inc.


iPredator & Dark Psychology Author

Michael Nuccitelli Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners (Identification # 103110.)

In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering the private & public sectors educational and advisory services regarding internet predators, cybercrime & digital forensic psychology. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their website, www.iPredator.co , offering site visitors an incredible amount of information, education and advisory services.      

Over the last 25+ years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations. Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist for 10 years and worked in the field of forensic psychology conducting evaluations and consultation for attorneys and court systems.

Dr. Nuccitelli has extensive career and academic experiences. His areas of expertise include forensic & criminal psychology, digital forensic psychology, psychiatric illness, addictions and developmental psychology. He is an avid follower of national & criminal news and enjoys educating the public by interacting with the media. Dr. Nuccitelli continues to investigate and expand the constructs he has designed, iPredator & Dark Psychology.


“Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available.”  Michael Nuccitelli Psy.D. C.F.C., iPredator Inc. (2013)

iPredator Inc. Website/Blogs Links


iPredator: A Brief Introduction

An Information Age Forensics Construct

by Michael Nuccitelli, Psy.D.

The Information Age is a societal paradigm and period of time beginning in the last quarter of the 20th century and presently thriving in the second decade of the 21st century. The Information Age is a stage in societal and technological development similar to the Industrial Revolution (1750-1942). The Information Age represents the evolution, emergence, consumption of and reliance upon Information and Communications Technology (ICT).

In a mere four decades, ICT and its importance to humanity have led many to surmise that the planet and its human inhabitants are amidst an Information Revolution. Mobile digital technology, telecommunications, social media and the abstract concept and artificial universe of cyberspace are just a few examples of humanities newest frontiers to obtain, exchange and disseminate information.

The planet is experiencing a shift from traditional industry, born and bred during the Industrial Revolution, to an economy based on the creative and rapid manipulation of information. Just as the Industrial Revolution greatly changed the lives of humanity, the Information Revolution is a societal shift rapidly changing humanity’s social, economic and psychological conditions of the times. The Information Revolution marks another major turning point in history, following the Industrial Revolution and changing every aspect of daily life unlike ever before.

Information and Communications Technology


Information and Communications Technology (ICT) is an umbrella term used to define any electronic or digital communication device or application used to obtain, exchange or disseminate information. ICT stresses the role of unified communications and the integration of telecommunications, which enable users to create, access, store, transmit and manipulate information. ICT consists of all forms of telecommunication, information technology, broadcast media, audio and video processing, transmission and network based control and monitoring functions. ICT has rapidly become one of the basic building blocks of modern society and will become increasingly important as the Information Age matures.

Many industrialized nations now regard understanding ICT and mastering the basic skills and concepts of ICT is vital and now considered part of the core of education, alongside reading, writing and arithmetic. The importance of ICT to humanity lies upon a continuum of relevance ranging from minimal impact to vital requirement regarding an ICT user’s day to day activities. For some, ICT and the Internet are nothing more than tools of convenience for conducting their responsibilities. For others, their social, scholastic, business and/or financial affairs disclosed in cyberspace via ICT are crucial to their self-esteem, self-worth, success and perceptual world.

ICT has changed the way humanity interacts, exchanges and accesses information. Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It is often hard to fathom that the Internet, used by two billion plus people globally, only celebrated its 20th birthday in 2011.

As ICT continues to expand at a feverish pace coupled with seemingly daily introductions of new technology, ever-increasing obstacles will challenge humanity. Already, ICT users have been confronted by the ever-increasing detriments of having incredible amounts of information, which can be obtained, exchanged and spread at incredible speed. Another challenge, that includes the dark side of humanity, is the usage of ICT and cyberspace to harm others inflicting psychological, physical and/or societal damage.

The construct iPredator, created by this writer, encapsulates these harmful typologies and is as follows along with brief definitions of iPredator typologies and this writer’s definition of his theoretical criminology construct termed, Dark Psychology.



iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI], an iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”  Michael Nuccitelli Psy.D. C.F.C., iPredator Inc. (2013)


Dark Psychology

Dark Psychology: Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses.

Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior. Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time. It is the remaining 1%, Dark Psychology parts from Adlerian theory and the Teleological Approach. Dark Psychology postulates there is a region within the human psyche that enables some people to commit atrocious acts without purpose. In this theory, it has been coined the Dark Singularity.

Dark Psychology posits that all humans have a reservoir of malevolent intent towards others ranging from minimally obtrusive and fleeting thoughts to pure psychopathic deviant behaviors without any cohesive rationality. This is called the Dark Continuum. Mitigating factors acting as accelerators and/or attractants to approaching the Dark Singularity, and where a person’s heinous actions fall on the Dark Continuum, is what Dark Psychology calls Dark Factor.

Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, all faiths and all humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called evil and others have defined as criminal, deviant or psychopathic. Dark Psychology introduces a third philosophical construct that views these behaviors different from religious dogmas and contemporary social science theories.

Dark Psychology assumes there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.

“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.”  Michael Nuccitelli Psy.D., (2012)


iPredator Typologies

Cyberbullying: Cyberbullying is defined as threatening or disparaging information directed at a target child delivered through information and communications technology (ICT.) Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. Dissimilar to classic bullying, cyber bullying includes a phenomenon called Cyberbullying by proxy.

Cyberbullying by proxy is when a cyber bully encourages or persuades other ICT users to engage in deprecating and harassing a target child. Cyberbullying by proxy is a dangerous form of cyber bullying because adults may become accomplices to the cyberbully and may not know they are dealing with a minor or child from their community.

Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of online bullying can become psychologically devastated and/or bullies themselves.

Cyber Harassment: Cyber harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, cyber harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target.

Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber harassment differs from cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation becomes more vulnerable to corruption. As anonymity via the Internet becomes more feasible, cyber harassment continues to flourish. Cyber harassment is the adult form of cyberbullying to a minor.

Cyberstalking: Cyberstalking is defined as the use of Information and Communications Technology (ICT) to stalk, control, manipulate, threaten or make unwanted advances towards a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.

To meet the criteria of Cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones via ICT.

Examples of psychological threats involves disparagement, humiliation, dis-information dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands. The Internet is a global medium regardless of frontiers, and this creates new possibilities for the growing class of online. Given the Internet is inexpensive and easy to access, distance between cyberstalkers and their targets are no longer a confounding factor. Cyberstalking is both a strategy to target other ICT users and a psychiatric pathology. When internet is a tactic, the assailant does not need to be motivated by psychiatric illness.


Online Predation: The typology of iPredator that is categorized as Online Predators have a variety of different terms used to describe the same patterns and motivations for their abuse. Online Sexual Predators are defined as adult online users who seek to exploit vulnerable children or adolescents for sexual and other abusive purposes. Online Predators are sexual predators who use Information and Communications Technology and the Internet to locate, target and victimize minors. Common forums used by Internet  Predators to target children include chat rooms, instant messaging or social networking sites for the purpose of flirting with and meeting others for illicit sexual experiences.

Online Child Predators are motivated to manipulate or “groom” a minor with the ultimate goal of meeting and engaging in sexual activity, despite knowing they are engaging in illegal activities. In instances where meeting their victims is not the primary objective, Online Predators also attempt to persuade children and adolescents to participate in some form of online sexual and/or sexually provocative activity motivated by financial gain engaging in the distribution and sale of child pornography.

Cybercrime: Cybercrime is defined as crimes and criminal activity committed on the Internet using Information and Communications Technology as the tools to target victims. All forms of cybercrime involve both Information and Communications Technology and a targeted victim(s). Cybercrime is segmented into two distinct categories involving the focus of the cyber criminal activities. These activities are focalized on the technology of ICT to achieve the cyber criminal’s aims for personal and financial gain or targeted at the person using the Information and Communications Technology. When the individual is the main target of cybercrime, ICT is the tool rather than the target. These are the crimes, which have existed for centuries in offline societies.

ScamsIdentity Theft and Internet Fraud have existed long before the development of information technology, but in non-digital form. Cyber criminals utilize technological tools that increase their potential pool of victims and make them difficult to identify and apprehend. Cybercrime targets people, property or governments using Information and Communications Technology.

Cyber Terrorism: Cyber Terrorism is defined as the use of Information and Communications Technology (ICT) by iPredators, organized groups and/or terrorist groups to advance their agenda motivated by religious, political and/or philosophical ideologies. Examples of cyber terrorism include 1. The use of ICT to organize and execute attacks against networks, and Information and Communications Technology (ICT) infrastructures. 2. The exchanging of information or making threats electronically. 3. The act of hacking into computer systems. 4. Introducing viruses and malware to vulnerable networks. 5.Defacement of websites and blogs. 6. Denial-of-service attacks 7. Terrorist threats made via electronic communication.

When strategic cyber attacks are motivated for financial gain, these attacks are defined as cybercrime. Cyber terrorism is any premeditated, politically, religious or philosophically motivated attack against information, computer systems, computer programs and data, which results in violence against non-combatant targets by sub-national groups or clandestine agents. A cyber terrorist attack is designed to cause physical violence or extreme financial harm to the targeted victims or community.

According to the U.S. Commission of Critical Infrastructure Protection, cyber terrorist targets include the banking industry, military installations, power plants, air traffic control centers and water systems. The F.B.I. define cyber terrorism as “The premeditated, politically motivated attack against information, computer systems, computer programs and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.”


iPredator Inc.

iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations. Their areas of expertise include cyberbullying, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to their professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at mailto: info@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)


Olga Vera, Ph.D. & Michael Nuccitelli, Psy.D. CPA Training (November, 2016)




Author: Michael Nuccitelli, Psy.D.
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+

iPredator Inc. is a New York based Internet Safety Company founded to provide products and services addressing cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation and online deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
New York
Phone: 347-871-2416

Pin It on Pinterest

Share This