As a New York Cybercriminal Psychology & Internet Safety Company, Dr. Nuccitelli & his Information Security experts are skilled at assisting online users and their loved who are being targeted by online predators.
Mobile devices are an online predator's best friend. Mobile devices enable both the child and online predator to correspond outside of the view of parents and primary caregivers. Mobile device safety is one part of a parent's battle to protect their child.
The IPI-IP is a printable PDF cyber attack risk assessment designed for parents, educators and pediatric professionals to assess a child's vulnerabilities of being targeted by online predators.
iPredator is an Information Age dark side of human consciousness construct, which includes seven typologies and online sexual predations is one of them. With the "veil of anonymity" offered by cyberspace, insulating a child from being targeted is a daunting task.
ODDOR, Offline Distress Dictates Online Response, is an iPredator sub-tenet positing that a child's offline world has a direct effect upon their online behaviors. If a child is unhappy, angry and discouraged offline, their online world becomes the environment they use to find recognition.
New York, USA
PROTECT, PREVENT & PREVAIL OVER IPREDATORS!
50 Online Predator Prevention Tips
Online Sexual Predators: Having been a practicing psychologist and forensic examiner before changing his career path to the study and investigation of online assailants, this writer fully understands that most sexual predators are typically close in age to the child victim and usually family members, friends or intimate partners of their victims. Although this reality has been validated by prestigious researchers, the FBI estimates that any given time there are 750,000 online child predators trolling cyberspace for children.
Simply stated, Online Predators are sexual predators who use Information and Communications Technology (ICT) to locate, target and victimize minors. Common forums used by Online Predators to target children include chat rooms, instant messaging or social networking sites for the purpose of flirting with and meeting others for illicit sexual experiences. Online Predators often are motivated to manipulate or “groom” a minor with the ultimate goal of meeting and engaging in sexual activity, despite knowing they are engaging in illegal activities.
Internet Predator Prevention
In instances where meeting their victims to engage in sexual activities is not the primary objective, Online Predators also attempt to persuade children and teens to participate in some form of online sexual and/or sexually provocative activity motivated by sexual deviance or for financial gain engaging in the distribution and sale of child pornography.
As Information and Communications Technology (ICT) becomes more widespread, cyber attack prevention, education and protection are areas requiring immediate attention. The Information Age has many benefits to humanity, but it is vital to identify and prevent the malevolent and nefarious elements that exist in cyberspace and Information and Communications Technology.
The typologies of iPredator include: cyberbullying, cyber harassment, internet trolls, cyberstalking, cybercrime, online sexual predation and cyber terrorism. Within this construct, cyber harassment is the adult form of cyberbullying and used when the perpetrator is an adult. The definition and motivations of iPredator and 50 Online Predator Prevention Tips are provided below.
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.
Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
- A self-awareness of causing harm to others, directly or indirectly, using ICT.
- The usage of ICT to obtain, exchange and deliver harmful information.
- A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI], an iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
ICE Website Link: http://www.ice.gov/
Internet Safety for Kids
In addition to having IVI, the iPredator practices Cyberstealth using multiple covert strategies. In fact, the third criteria used to define an iPredator include a general understanding of Cyberstealth used to profile, identify, locate, stalk and engage a target. Also lying upon a continuum of expertise, iPredators are assessed as being advanced in their Cyberstealth practices as opposed to a haphazard approach of targeting a victim without attempting to hide their identity.
Often times, cyber bullies, ex-partners, ex-employees, angry or self-righteous online users, Internet trolls, organized groups with political, religious and moralistic causes,, and highly narcissistic online users do not attempt to hide their identities. Cyberstealth is a strategy reserved for iPredators who seek to hide their identities online.
Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategies by which iPredators devise tactics to establish and sustain complete anonymity while they troll and stalk an online target. In addition to a stratagem, Cyberstealth is a reality of Information and Communications Technology, that humanity often fails to fathom leading some online users to become high probability targets. Cyberstealth is a learned behavior that becomes more advanced with practice, trial and error and experimentation.
Here are 50 topics relevant to understanding the profiles of. Based on your child’s age and developmentally maturity, these 50 points can also be used as independent discussions. Whether you are a parent or educator, these topics are vital in your endeavor to educate a child on cyber security. Although checking off all fifty items with an affirmative response significantly lowers a child’s probability of being targeted, nothing comes close to proactive parenting.
Online Predator Prevention Tips List
- An adult or the child, if developmentally appropriate, recognizes Internet sex crimes involving adults and minors more often involve mobile devices as opposed to home based stationary devices.
- An adult or primary caregiver uses developmentally appropriate prevention strategies to educate the child about romance and sex.
- An adult or the child, if developmentally appropriate, recognizes how to recognize if the child has sexual orientation concerns or patterns of offline and online risk taking.
- An adult or the child, if developmentally appropriate, recognizes the characteristics of Internet-initiated sex crimes.
- An adult or the child, if developmentally appropriate, recognizes the stereotype of the online predator using trickery and violence to assault minors is largely inaccurate.
- An adult or the child, if developmentally appropriate, recognizes most Internet sex crimes involve young adult men who sexually solicit minors.
- An adult or the child, if developmentally appropriate, recognizes the majority of Internet sex crimes include victims aware they are conversing with adults.
- An adult or the child, if developmentally appropriate, recognizes online predators rarely deceive their victims about their sexual interests and endeavor to secure their consent.
- An adult or the child, if developmentally appropriate, recognizes most minors who meet an online predator goes to such meetings expecting to engage in sexual activity.
- The child is aware online predators primarily deceive minors using promises of love and romance, but their intentions are primarily sexual.
- An adult or the child, if developmentally appropriate, recognizes most online predators are charged with statutory rape involving non-forcible sexual activity with their victims.
- An adult or the child, if developmentally appropriate, recognizes age-of-consent law violations are the most common sex crimes against minors in general.
- An adult or the child, if developmentally appropriate, recognizes the majority of sex crimes against minors are never reported to law enforcement.
- An adult or the child, if developmentally appropriate, recognizes that Internet sex crimes involve adult offenders who are 10 or more years older than their underage targets.
- An adult or the child, if developmentally appropriate, recognizes they are experiencing or soon to experience adolescent sexual development with growing sexual curiosity.
- An adult or primary caregiver understands most early adolescent minors are already aware of, thinking about and beginning to experiment with sex.
- An adult or primary caregiver is aware most minors have had romantic partners and absorbed by romantic concerns.
- The child is or will be educated on how Internet initiated sex crimes often involve greater self-disclosure and intensity than face-to-face relationships among peers.
- Relevant to a child’s online activity, an adult or primary caregiver is aware minors often struggle with emotional control during their early to mid-teens.
- An adult or primary caregiver is aware the child and all minors are vulnerable to seduction by online predators due to immaturity, inexperience and the impulsiveness of exploring normal sexual urges.
- An adult or the child, if developmentally appropriate, recognizes minors who send personal information to online strangers are more likely to receive aggressive sexual solicitations.
- An adult or the child, if developmentally appropriate, recognizes online predators groom minors by establishing trust and confidence first.
- The child knows never to disclose their personal information at anonymous video chat sites even if together with close friends.
- The child is aware chat rooms are one of the prime arenas online predators seek out child victims.
- The child is aware many chat rooms engage in explicit sexual talk, sexual innuendo and profanity.
- The child is aware many chat rooms that engage in the explicit sexual talk are frequented byonline predators.
- An adult or primary caregiver is aware evidence suggesting minors and teens who regularly visit chat rooms are more likely to have problems with sadness, loneliness or depression.
- An adult or primary caregiver is aware clinical evidence suggests minors and teens who regularly visit chat rooms have more problems with their parents and engage in risky behavior.
- An adult or primary caregiver is aware clinical evidence suggests minors lacking in social skills interact with others in chat rooms to compensate for difficulties they have forming offline relationships.
- An adult or primary caregiver is aware clinical evidence suggests younger teens are not developmentally prepared to avoid or respond to the explicit sexual invitations they are likely to encounter in many chat rooms.
- An adult or the child, if developmentally appropriate, recognizes most online predators meet their child victims in chat rooms.
- An adult or primary caregiver is aware minors and teens with histories of sexual, physical and emotional abuse are more vulnerable to online predator grooming.
- An adult or primary caregiver recognizes a child and teen online users with histories of offline sexual or physical abuse are far more likely to receive online aggressive sexual solicitations.
- An adult or primary caregiver recognizes emotionally abused minors and teens are more at risk for online sexual victimization and exploitation.
- An adult or primary caregiver recognizes research suggests some minors and teens are more vulnerable to online sexual solicitations because they are looking for attention and affection.
- An adult or primary caregiver recognizes childhood trauma is associated with adolescent risk behavior, risky sexual behavior and online risk behavior.
- An adult or primary caregiver recognizes prior childhood abuse may trigger risky offline and online sexual behavior that directly invites online predator advances.
- An adult or primary caregiver recognizes social interaction problems and depression have been suggested to increase a child’s vulnerability to online predator sexual abuse.
- An adult or the child, if developmentally appropriate, recognizes the only online activity riskier than posting online personal information for minors and teens is conversing online with strangers about sex.
- An adult or the child, if developmentally appropriate, recognizes online predators have not changed their tactics of stalking minors online because of the advent of social networking sites.
- An adult or the child, if developmentally appropriate, recognizes online predators often stalk and abduct teens based on information they have posted on their social networking profiles.
- An adult or the child, if developmentally appropriate, recognizes online predators rarely stalk and abduct teens at social networking profiles, unless they conclude the child is susceptible to their grooming and seduction tactics.
- An adult or the child, if developmentally appropriate, recognizes minors and teens who have blogs and post personal information for public display are at a higher risk of being targeted by an online predator.
- An adult or the child, if developmentally appropriate, recognizes minors and teens are more likely to receive online sexual solicitations via instant messages or in chat rooms than through social networking sites.
- An adult or the child, if developmentally appropriate, recognizes a minor’s level of vulnerability to the online sexual solicitation is influenced most by online interactions with online strangers.
- An adult or primary caregiver recognizes minors who interact with online strangers and engage in other risky online behaviors are significantly more likely to receive aggressive sexual solicitations.
- An adult or primary caregiver recognizes teen females constitute a higher proportion ofonline predator victims than teen males, but gay male teens are at a much higher rate of online victimization.
- An adult or the child, if developmentally appropriate, recognizes the fundamental differences between a Pedophile and Child Molester.
- An adult or the child, if developmentally appropriate, recognizes sexual solicitations are defined as requests to engage in sexual activities or sexual talk, or to give personal sexual information.
- An adult or the child, if developmentally appropriate, recognizes posting images, videos or another personal information on social networking sites is dangerous.
Michael Nuccitelli, Psy.D.
Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from Adler University in Chicago, Illinois. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services related to cyberstalking, cyberbullying, internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched this internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety. These sites offer online users an incredible amount of information, education and advisory services. Since 1985, Dr. Nuccitelli has worked in behavioral healthcare in a variety of capacities with various clinical populations.
iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations. Their areas of expertise include cyberbullying, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to their professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.
Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. If you have questions, feel free to call iPredator Inc. anytime at (347) 871-2416 in New York or by sending correspondence using this website’s contact page by clicking on this link: Contact Us Dr. Nuccitelli or an iPredator Inc. associate return all contacts within 24 hours.
- Google Plus: iPredator
- Google Plus: Michael Nuccitelli, Psy.D.
- Linked In: iPredator
- Twitter: TheiPredator
- YouTube: iPredator Team
- Facebook: The iPredator
- Pinterest: iPredator Inc.
“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)
- IPREDATOR INC.
- CEO: Michael Nuccitelli, Psy.D.
- NYS Licensed Psychologist
- New York, USA
- Ph:(347) 871-2416
- Blog I:Dark Psychology
- Blog II: Internet Safety