New York Internet Safety Firm
Seeks Seed Funding
New York State licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli, has completed his Internet safety and Tech. Predator awareness website. After 4 years of extensive research, iPredator Inc. and Dr. Nuccitelli announces their seed funding investment opportunity for corporate entities and investors. Feel free to download iPredator Inc.’s executive summary at the base of this page along with full business plan and seed funding proposal.
Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT.) Malevolent in intent, they rely on their capacity to deceive and harm others using ICT in an abstract electronic universe. New York State licensed psychologist and certified forensic consultant, Dr. Michael Nuccitelli, has completed his Internet safety and Tech. Predator awareness website. After 4 years of extensive research and growing recognition of his technological predator construct, Dr. Nuccitelli and iPredator Inc. announces their Internet safety seed funding investment opportunity for corporate entities and investors.
Educators, parents, businesses and all citizens must treat iPredators as a societal toxic phenomenon. To thwart this growing epidemic, it is paramount the United States and global community immediately start an awareness and educational campaign. This campaign must be for preventing children, adults and commerce from being targeted and victimized by ICT. To start this vital first step, iPredator Inc. is offering a seed funding investment opportunity to corporate entities and investors.
As stated by Dr. Nuccitelli, “I’ve spent 4 long and obsessed years developing iPredator and all my products, services and national awareness building strategies. Whether the seed funding comes from a corporate entity, investor, for profit or not for profit organization, the mission is to plant a seed of fear in the minds of criminals, deviants, abusers & terrorists who use ICT to victimize others.” Central to iPredator Inc.’s strategy, is Dr. Nuccitelli’s three constructs with brief definitions as follows:
IPREDATOR, IPREDATOR BRIDGE & CYBERSTEALTH
“The repercussions of the unrestricted latitude of iPredators will be catastrophic for not only the person, but for society, and potentially, the world over. Therefore, before it is too late, we must re-examine the phenomenon of “social networking” via technology.” Michael Nuccitelli Psy.D., (2012)
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.
Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator, internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
- A self-awareness of causing harm to others, directly or indirectly, using ICT.
- The usage of ICT to obtain, exchange and deliver harmful information.
- A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI], an iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
Cyberstealth Equals Cyberspace Deception
Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
“Society is being lulled into a false sense of trust and reliance on technology, taking information and “connection” to others in cyberspace at face value. Like the child in the fairy tale, Little Red Riding Hood, innocently wandering through the forest, we erroneously believe that the “Wolf” is whoever he appears or claims to be. Just as Little Red Riding Hood, we’re in danger of falling prey to iPredator.” Michael Nuccitelli Psy.D., (2012)
iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to confirm the harm they cause. Also different from iPredator are their drives for attacking others.
For those defined in iPredator Bridge, their motivations are cloaked by moral turpitude, self-righteousness and pseudo-justified convictions. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease.
Within this new region, and presently without explanation, many people enter cyberspace and access ICT with their instinctual drive for self-preservation remaining dormant. Conversely, other people either quickly or gradually, conclude that ICT and cyberspace offers an environment that allows the pursuit of maladaptive and psychopathological goals undeterred by punishment. It is within this process that the ICT user or groups of ICT users transcend into the world of iPredator. Once an iPredator, the various typologies begin their search for those they believe as vulnerable, easily accosted and not likely to mobilize the required forces leading to their apprehension and punishment.
The iPredator Bridge is a symbolic representation of the approach, route and first crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung (1875-1961) and his construct of the Collective Unconscious.
Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a method entrenched in Information Age Deception or also called cyber deception. Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted.
The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to make sure their identities remain concealed reducing their probability of identification, apprehension and punishment.
Unlike classic deception used by traditional criminals and deviants, Information Age Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age Deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.
Seed Funding Supports Internet Safety for Kids Campaign
As the Internet naturally offers all ICT users anonymity if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.
iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others in the abstract electronic universe known as cyberspace.
As ICT, social media, virtual reality and the Information Age rapidly expands becoming integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. In 2013, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within cyberspace, which ICT users and their loved ones must be vigilant about.
Technological advancements have changed the way humanity interacts, exchanges and accesses information. Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It is often difficult to imagine that the Internet used by more than two billion people globally celebrated its 20th birthday in 2011. Clearly, the Information Age has spread to all corners of the planet.
“As society becomes more technologically advanced, the importance of Information and Communications Technology (ICT) becomes vital in the daily living of humanity. Despite the multitude of benefits, the dangers lurking in cyberspace are real, growing and need to be stopped. It may take me 30-40 years, but iPredator Inc. will diligently persist until one day online sexual predators, cyberstalkers and all iPredators experience fear before they proceed with their nefarious, deviant & malevolent plans.” Michael Nuccitelli Psy.D., C.F.C., iPredator Inc. (2013)
Seed Funding Will Launch National Internet Safety Campaign
From a services perspective, Dr. Nuccitelli has developed an innovative advisory based cyber-attack prevention membership service called, iPredator Protected. Similar in structure to car owners who are AAA members offered by the Automobile Association of America, the iPredator Protection membership service gives consumers immediate access to experts trained in identification, intervention, apprehension and prosecution of iPredators.
iPredator Inc. also offers a variety of educational, training and speaking engagement services that can be performed in person or via web conferencing sites. Lastly, iPredator Inc. can assist law enforcement, court systems and other public safety arenas investigation and iPredator profiling services.
Dr. Nuccitelli, his partners and affiliated advocates are ready to launch a plan that will trigger a desperately needed paradigm shift in the way humanity interacts with ICT. As stated by Dr. Nuccitelli, “It is 2013 and society has thrived within the Information Age for over three decades. Is it going to take another three decades before people open their eyes to the victimization of children and vulnerable adults in cyberspace?”
MICHAEL NUCCITELLI, PSY.D.
Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from Adler University in Chicago, Illinois. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services related to cyberstalking, cyberbullying, internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched this internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety. These sites offer online users an incredible amount of information, education and advisory services. Since 1985, Dr. Nuccitelli has worked in behavioral healthcare in a variety of capacities with various clinical populations.
iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations. Their areas of expertise include cyberbullying, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to their professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.
Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. If you have questions, feel free to call iPredator Inc. anytime in New York at (347) 871-2416 or by sending correspondence using this website’s contact page by clicking here: Contact Us Dr. Nuccitelli or an iPredator Inc. associate return all contacts within 24 hours.
- Google Plus: iPredator
- Google Plus: Michael Nuccitelli, Psy.D.
- Linked In: iPredator
- Twitter: TheiPredator
- YouTube: iPredator Team
- Facebook: The iPredator
- Pinterest: iPredator Inc.
“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)
- IPREDATOR INC.
- CEO: Michael Nuccitelli, Psy.D.
- NYS Licensed Psychologist
- New York, USA
- Ph:(347) 871-2416
- Blog I:Dark Psychology
- Blog II: Internet Safety
iPredator Internet Safety Tools
- Adult Internet Safety Checklist [AISC]
- Business Internet Safety Checklist [BISC]
- Cyberbully Abuser Checklist [CBAC]
- Cyberbully Target Checklist [CBTC]
- Cybercrime Protection Checklist [CCPC]
- Cyberstalking Prevention Checklist [CSPC]
- Digital Reputation Protection Checklist [DRPC]
- Educator Internet Safety Checklist [EISC]
- Internet Safety Checklist-Psychology [ISCP]
- Online Predator Prevention Checklist [OPPC]
- Parent Cyber Safety Checklist [PCSC]
- Pediatric Internet Safety Checklist [PISC]
- Teen Internet Safety Checklist [TISC]
- Cyberstalker Identification Interview [CSII]
- iPredator Probability Inventory-330 [IPI-330]
- iPredator Probability Inventory-Adult [IPI-A]
- iPredator Probability Inventory-Business [IPI-B]
- iPredator Probability Inventory-Cyberbully [IPI-CB]
- iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]
- iPredator Probability Inventory-Cybercrime [IPI-C]
- iPredator Probability Inventory-Cyberstalking [IPI-CS]
- iPredator Probability Inventory-Educator [IPI-E]
- iPredator Probability Inventory-Internet Predator [IPI-IP]
- iPredator Probability Inventory-Pediatric [IPI-P]
- iPredator Probability Inventory-Psychologist [IPI-PSY]
- iPredator Probability Inventory-Teen [IPI-T]