troll triad-ipredator


Dr. Leonard Horowitz, Sherri Kane & Michael Vara


by Michael Nuccitelli, Psy.D.


Troll Triad was authored to inform online users about other online users who use internet defamation, libel and slander to control, manipulate and squelch others driven by needs for power and control or personal and financial gain. Troll Triad is not just about my trolls, Dr. Leonard Horowitz, Sherri Kane & Michael Vara; it is also an Information Age defamation, libel & slander group dynamic concept. As you will read, Troll Triad defines the roles members of a group portray to defame and slander their targets using Information and Communications Technology. Furthermore, the rationale for including Dr. Leonard Horowitz, Sherri Kane & Michael Vara is to compile an official record of evidence presenting their defamatory, slanderous and deceptive practices.

I provide here Exhibit-1, which compelled me to create this report. By clicking on the E-1 link and reading the first paragraph or two, you’ll understand why I’ve authored this investigative report. I recommend first reading here the definitions of Defamation, Slander & Libel authored by Cornell University Law School-Legal Information Institute [LII], the criteria for internet defamation & my internet defamation, libel & slander quick definition.

Exhibit-1 Link: Dr. Leonard Horowitz, Sherri Kane, Michael Vara E-1 File

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-150 × 137


Cornell University Law School-Legal Information Institute [LII]

“Defamation is a statement that injures a third party’s reputation. The tort of defamation includes both libel (written statements) and slander (spoken statements). To win a defamation case, a plaintiff must show four things: 1) a false statement purporting to be fact; 2) publication or communication of that statement to a third person; 3) fault; and 4) damages, or some harm caused to the person or entity who is the subject of the statement. Since the U.S. Supreme Court’s 1964 decision in New York Times v. Sullivan, defamation claims have been limited by First Amendment concerns. Thus, for instance, public officials and public figures (people who are famous) must show that statements were made with actual malice to recover in an action for defamation. Actual malice means that a statement was made with knowledge that it was false or with reckless disregard of whether or not it was false. In addition, a plaintiff must show actual malice by “clear and convincing” evidence rather than the usual burden of proof in a civil case, preponderance of the evidence. A private person suing about a matter of private concern need only show negligence, meaning that the defendant knew the statement was false, or would have known if she or he had exercised reasonable care. Defamation claims are also subject to a number of privileges. The types and limits of these privileges will vary from state to state. An absolute privilege is a complete defense to a defamation claim. For instance, statements made by witnesses during judicial proceedings are subject to absolute privilege. The reason is that those statements are subject to sanctions. An absolute privilege also protects statements made during legislative debates. A qualified privilege may also protect statements. For instance, a parent’s statement to her or his children warning them not to associate with certain kids is likely protected by a qualified privilege.”  Cornell University Law School-Legal Information Institute [LII]

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-712 × 712

Criteria for Internet Defamation

  • The statement(s) in question is a false statement, but intentionally or negligently presented and disseminated as a statement of fact.
  • The statement(s) in question is a false statement of fact that causes harm or designed to cause harm to the subject or the subject’s reputation.
  • The statement(s) in question is a false statement of fact causing harm to the subject or the subject’s reputation and was made without research to verify the truthfulness of the statement.
  • The statement(s) in question is a false statement of fact causing harm to the subject or the subject’s reputation, who is a public figure or celebrity, and the false statement of fact is maliciously published online to do harm or acted in a reckless manner.

Internet Defamation, Libel & Slander Quick Definition

Internet Defamation (aka, Online Defamation) is a felonious statement of fact using Information and Communications Technology (ICT) that is published or disseminated to a third party in a careless or intentional manner and causes injury or damage to the subject of the statement. Internet Libel and Slander are different types of Defamation. Libel is a written defamatory statement, and slander is an oral defamatory statement. As mentioned above, Troll Triad was authored to introduce my concept describing how groups of three or more online users assume archetypal roles in tasks when attempting to defame, slander and attack another online user’s reputation, online presence or business.

One would think being the author of the darkside of cyberspace construct, iPredator, and being regularly internet trolled and harassed as the founder of iPredator Inc., viewing his baloney would be no different from any other proverbial day at the office. For whatever reason, seeing Horowitz’s ludicrous 177-page manifesto that was addressed to the NYS Office of Professional Discipline and then learning Michael Vara was encouraging his internet radio listeners to read his nonsense on air is when the Nuccitelli blood began to boil.

After watching back-to-back documentaries of Sun Tzu’s “Art of War” on YouTube, I sat down in front of my computer and authored this paper. In this manuscript, the information presented about Dr. Leonard Horowitz, Sherri Kane & Michael Vara is not misleading, false or altered in any manner to support the paper’s objectives. I was sure not to portray them in a false or misleading light. There is no information that would be offensive or embarrassing to a reasonable person of ordinary sensibilities. Furthermore, as the author, I was cognizant at all times that the content contained herein would not be defamatory, copyright infringement or a breach of privacy.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-700 × 410

Troll Triad is a cyber psychopathology-profiling construct that introduces a three-pronged archetypal model defining groups of online users who engage in defamation of character, slander & libel. As stated above, Troll Triad is not just a facetious term describing three small minded online users who use Information and Communications Technology to defame, manipulate, curry favor and seek support from other like-minded online users.

Troll Triad is also a conceptual framework and template describing how future groups of successful iPredators will be partitioned into three archetypal segments. This troika includes the Cerebral, Provocateur and the Crier. When these three elements mix correctly, the Troll Triad becomes a masterpiece of human predation alchemy. Being a disciple of Carl Jung and Alfred Adler, I strongly subscribe to Jung’s theory of Archetypes and Adler’s theory of Social Interest. Using their constructs as guidelines, I believe Troll Triad is a concept relevant to the Information Age.

This paper also serves as a personal journal of record documenting the persistent Character Assassinations I’ve experienced by three online acquaintances named Leonard Horowitz, Sherri Kane & Michael Vara. I’ve never met any of them face-to-face, but Michael Vara is the one I was closest too having been a regular guest on his internet radio show from 2011-2014. Leonard Horowitz and Sherri Kane I hardly know having spoken to them on a couple occasions through Michael Vara. It wasn’t until Michael Vara and I parted ways in August 2014 is when the disinformation and defamation attacks began.

It was then that I learned about Michael Vara’s cohorts, Dr. Leonard Horowitz and Sherri Kane spearheading the project. It’s ironic that the product of their bizarre and preposterous attempts to defame my character led yo this concept being born. I guess in some odd way I should thank them for providing the fodder to help lay the foundation of the Troll Triad concept. In the manuscript that follows, I attempt to meet the following objectives:

  • Introduce brief definitions of the three Troll Triad typologies, which are the Cerebral, Provocateur and Crier Archetypes.
  • Present a bullet list of exhibits and evidence confirming Dr. Leonard Horowitz, Sherri Kane & Michael Vara are actively engaging in Copyfraud, Defamation, Slander and Online Deception.
  • Provide a list of iPredator definitions relevant to fully understanding the first two objectives and the central themes of iPredator Inc. internet safety initiatives

“Although federal, state, and local officials work diligently to combat iPredators, their endeavors are minimal at best given the size of the iPredator contingent. iPredators have the luxury of trolling for their victims at a leisurely pace without fear of identification, confrontation, and punishment.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-cerebral-800 × 355


Within the archetypal Information Age concept of Troll Triad, the Cerebral is the online user who serves as either the architect of the defamation and disinformation campaign, a front of legitimacy justifying the denigration and fraudulent crusade or a combination of the two. The Cerebral does not need to be adept at using Information and Communications Technology as their success is measured by how quickly others validate the group’s nefarious online activities from a cognitive standpoint. The Cerebral does not have to be formally educated with advanced academic degrees, so as long as they are charismatic and intriguing in online or offline public forums. The Cerebral is best described as the “brains of the online operation”.

Whether the Cerebral is 1 person or 1001 people, their goal is to rationalize successfully to others, using their intellectual prowess, validation why the Triad must defame and destroy their target. The Cerebral is least likely of the Triad to display fits of anger or rage in offline and online forums. It is in private and with other Triad members when they feel secure enough to release their internal feelings of rage and discontent.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-provocateur-800 × 326


Within the archetypal Information Age concept of Troll Triad, the Provocateur is the online user who serves as the agitator mobilizing other like-minded online users to engage in the Troll Triad’s denigration and fraudulent defamation campaigns. Using partial truths and unsubstantiated claims about their target, the Provocateur attempts to champion a sense of “us vs. them” to instill their perceptual distortion in the online users they are trying to motivate. The Provocateur serves four primary functions.

  • Motivate and mobilize as many like-minded online users as possible to become active participants in the defamation campaigns.
  • Create, disseminate and motivate like-minded online users by using details about their target to justify their campaigns.
  • Actively and persistently, exonerate and espouse accolades about the Cerebral to create a pseudo-moral justification for attacking their target(s).
  • Provoke and incite as many like-minded online users as possible by using partial truths, total fabrications and unsubstantiated claims ranging from mildly embellished to completely

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-crier-800 x 341


Within the archetypal Information Age concept of Troll Triad, the Crier is the online user who serves as messenger, event planner and the cloaked skeptic when communicating the Troll Triad’s rationale for launching and managing their denigration and fraudulent defamation campaigns. The Crier habitually disseminates felonious information, partial truths and “us vs. them” implanted morsels of disinformation to rationalize the Troll Triad’s malevolent online activities.

Within the Troll Triad, the Crier is least likely to be the most intelligent, provocative or charismatic as the Cerebral and Provocateur. Where the Crier is more adept and skilled than the other two is in their ability to spread the Triad’s message. Not only is the Crier the most effective messenger of the three typologies, but they also serve as the group’s cloaked skeptic. Although their objectives to disparage and defame a target are the same as the Cerebral and Provocateur, the Crier works to validate the Cerebral’s intellect and the Provocateur’s passion by presented alternative views and insights. When done effectively, the Crier not only further motivates like-minded online users, but also encourages online users who are not yet committed to join their defamation and disinformation campaigns.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 x 60

The Cerebral, Provocateur and Crier typologies in the Troll Triad are archetypes and segments of groups who are allied in a mission to defame, disparage and destroy their target’s online reputation and trust. The Troll Triad is an archetypal model that can describe three like-minded people or an entire nation bound by the same goal of harming others. In relationship to my trolls, Dr. Leonard Horowitz, Sherri Kane & Michael Vara, it does not take long to identify each of their positions quickly within the Troll Triad.

Dr. Leonard Horowitz is the Cerebral. Sherri Kane is the Provocateur and Michael Vara is the Crier. Working as a united front, these three people represent amateur rudimentary models of the Troll Triad. If they were truly adept at their Triad functions, I would not have been successful at securing 1/10 of the evidence and data verifying their disinformation and defamatory practices. From a macroscopic perspective, they are nothing more than angry adults who desperately want to be recognized.

However, they do have access and support from other like-minded online users who are willing to participate in their denigration and fraudulent cyber attack campaigns. You will not find any of their minions ever questioning their motivations for attacking others or espousing their ludicrous theories. As you will learn in the exhibits presented below, Horowitz, Kane & Vara are working as a system that closely follows the three Troll Triad archetypes.

“By virtue of the proverbial cloak of anonymity so conveniently provided by Information and Communications Technology, iPredators troll cyberspace with a distinct advantage in that they may represent themselves in any way they choose.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-600 × 600

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-793 × 83

Troll Triad Note: As of January 2015, and assuredly moving forward; Dr. Leonard Horowitz, Sherri Kane, Michael Vara and their blind faith supporters will continue to defame and slander others they fear may expose their deceptive practices and delusional ideologies. In relationship to myself and iPredator Inc., I’m confident they will continue to invent preposterous stories of covert campaigns I’m spearheading to shut down their websites, shows, social accounts and whistleblowing pursuits.

Unlike their typical targets who fear retribution and public backlash if they assert themselves, I revel at the chance. Although I’ve compiled an enormous database of evidence all pointing to them and their followers as being the source of these attacks, I’m ethically bound to say the information contained herein are allegations until a court of law makes the final determination. A recommendation to the Troll Triad, since I guarantee they will be reading this paper. Every professional who has scanned your information to date concluded your clueless when it comes to defamation laws, and our first amendment freedom of speech. Here are a couple links to get you started.

“As humanity becomes more dependent on Information and Communications Technology, we slowly isolate and disconnect from human contact on a real human and spiritual level.” Michael Nuccitelli, Psy.D. (2011)


dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 1034

EXHIBIT-1: E-1 is a screenshot of the first page from the 177-page complaint sent to the New York State Education Department; Office of Professional Discipline dated December 18, 2014. Signed by Dr. Leonard Horowitz (E-3) and cc’d to Sherri Kane and Michael Vara, the obvious purpose of this document is an attempt to defame my character and inhibit my ability to practice in New York State. Of all the exhibits compiled, E-1 is by far the most heinous of defamation and disinformation tactics launched by Dr. Leonard Horowitz, Sherri Kane & Michael Vara.

The document’s content is best described as bizarre and authored with a paranoid driven mind. E-1 provides evidence that Dr. Leonard Horowitz, Sherri Kane & Michael Vara are engaging in copyfraud, slander & gross disinformation practices. This document is also one of the three files deleted by Scribd on December 23, 2014 after Dr. Leonard Horowitz uploaded and published this nonsense in Scribd’s database. Provided here are links the WebMD Delusional Disorder page and my copy of the Horowitz Copyfraud File. Please note that the complaint copy is in my possession and you will not be directed to any of their sites to review or download.

Link: WebMD Delusional Disorder Page

Link: Dr. Leonard Horowitz, Sherri Kane, Michael Vara E-1 File

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 527

EXHIBIT-2: E-2 is a screenshot of Dr. Leonard Horowitz’s letterhead he used to send his 177-page delusional file to the NYS Education Department & Office of Professional Discipline. E-2 is part of a broad evidentiary database verifying Dr. Leonard Horowitz intentionally initiated a formal complaint using copyfraud, defamation & felonious files for malevolent reasons. Given he cc’d (carbon copied) this document to Sherri Kane and Michael Vara, who are both actively disseminating this report online, all three are engaging in Copyfraud, Slander, False Light & Disinformation.

Link: Dr. Leonard Horowitz, Sherri Kane, Michael Vara E-1 File

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 548

EXHIBIT-3: E-3 is a screenshot of Dr. Leonard Horowitz’s signature verifying he is the author of my copyfraud, defamation & disinformation document sent to the NYS Education Department & Office of Professional Discipline.

Link: Dr. Leonard Horowitz, Sherri Kane, Michael Vara E-1 File

“Cyberstealth is a method and strategy by which a child, adult, group or nation uses Information and Communications Technology (ICT) to establish and sustain complete, partial or divisive anonymity while they troll, stalk and attack their target(s). To ensure success, cyberstealth employs online deception, social engineering and disinformation to distract and confuse their target(s). Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators (aka, online assailants) range from negligible to highly complex and multi-faceted.” Michael Nuccitelli, Psy.D. (2014)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-600 × 600

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 345

EXHIBIT-4: E-4 is a screenshot of the confirmation email from Scribd to myself verifying Dr. Leonard Horowitz, Sherri Kane and Michael Vara’s copyfraud, defamation and felonious files were deleted on December 23, 2014. Using the Scribd username of Legal Evidence, Horowitz uploaded three variations of their 177-page bizarre complaint, used different permalinks for each file, then made them all public and search engine crawlable. Thanks to Google Alerts, I received an email and found his data.

Given Scribd is very proactive when members breach their guideline, I wrote them and his bizarre documents were promptly deleted. In addition to removing Horowitz’s psychotic prose, Scribd will now track and monitor his accounts whether he has one or 101 usernames. Typical of cowards, you could not find his name anywhere attached to his Legal Evidence username without doing a little leg work. A little research was performed, and iPredator Inc. has confirmed Dr. Leonard Horowitz, Sherri Kane and Michael Vara were all aware of the files being uploaded and posted. Thanks to Scribd, they all now have to explain why those links are dead to their minions. Provided here is my secured copy of the Triad’s defamatory and copyfraud document that was uploaded three times in Scribd with different tags and permalinks.

Link: Dr. Leonard Horowitz, Sherri Kane, Michael Vara E-1 File

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 879

EXHIBIT-5: E-5 is an image of the Michael Nuccitelli, Psy.D. content that was authored and published by Dr. Leonard Horowitz and Sherri Kane on December 18, 2014. Their web page article is titled, “NSA Trained Domestic Terrorists Caught Covert Action” and available at Dr. Leonard Horowitz and Sherri Kane’s website, “War on we the People”. As of January 3, 2015, their page and the delusional article are live. For those interested in reading this content, if it is been deleted or removed provided here is a link to my secure copy of that page that was captured on December 31, 2014. When the link opens, use your image enlarge feature if the text is too small to read. As you are reading their nonsense, please don’t forget that Michael Vara of LNM Radio Network actively disseminates their information and encourages his listeners to read as well.

Link: War On Us the World Delusion Web page Image

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-832 × 625

EXHIBIT-6: E-6 is a collage image of screenshots I compiled from Dr. Leonard Horowitz and Sherri Kane’s website, www. Paul Sulla Censured dot com. Hidden among their pages of paranoid themed content, I was able to locate and secure the original copy of Horowitz file that was sent to the NYS Education Department. Although their “Paul Sulla Censured” domain is hosted by a hosting company in the Bahamas and privately registered, iPredator Inc. was still successful in confirming Dr. Leonard Horowitz and Sherri Kane as domain owners.

As I will not contribute to their website’s page ranking, by posting the link here to click on, interested parties can visit the link that is included at the base of the image. If you want to read more about their bizarre and often psychotic content, just copy and paste this term with quotes in Goggle and hit search “Paul Sulla Censured”. Welcome to the Schizophrenic world of the Troll Triad named, Dr. Leonard Horowitz, Sherri Kane & Michael Vara.

“Online deception is an art and science of effectively mixing truth, observation and accepted assumptions with felonious conclusions, illusions and lies. When combined with a veil of anonymity in cyberspace, the final preparation becomes a dish impossible to refuse by the growing population of information addicted gluttons called humanity.” Michael Nuccitelli, Psy.D. (2014)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 221

EXHIBIT-7: Collected from Dr. Leonard Horowitz and Sherri Kane’s copyfraud, defamation, & felonious master document, provided here is a screenshot of Michael Vara’s email, dated December 13, 2014, responding to YouTube after they deactivated his YouTube Channel. In his desperate attempt to restore his channel, Michael Vara engages in gross deception by alleging I am cyberstalking and cyber harassing him. His weak excuses would not be so laughable if he did not know the difference between the two or their definitions. Is it possible that being a guest on his show 15-20 times and having had 100-150 phone conversations over a 3-year period that he still not know what they mean?

You would think he would know the definitions given he now states that he is an internet safety expert with years of experience dating back to 1999. He presents this information in his G+ account and is available for helping others who’ve been targeted online. The part that bothers me about this email is how he implies I’m Anti-Semitic. I have to assume he is referring to Dr. Leonard Horowitz and Sherri Kane. The importance of publishing this small message and image here is because it is foreshadowing the Troll Triad’s future defamatory theme. I guarantee within 6-8 weeks of editing this page, the Troll Triad will respond to wild allegations ranging from me being a white supremacist to holding a high positioned officer in the Neo-Nazi movement.

“Now where is the picture of Dystopia more clearly depicted than through the literary genre of science fiction. Expressed in the works of prophetic writers such as Ray Bradbury, Aldous Huxley, and George Orwell, humanity becomes increasingly separate from one another led by technology.” Michael Nuccitelli, Psy.D. (2014)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 158

EXHIBIT-8: E-8 is a screenshot image of Michael Vara, on September 13, 2014, seeking help by posting on a classified website called, Express Topics. In his request, you’ll notice he sounds desperate in his endeavor to find anyone to download and store his August 28, 2014 show. The apparent urgency Michael Vara communicates is due to, as he writes, is because I am an iPredator psychopath, cyberstalker and attempting to shut down his website and show. If this is Michael Vara, it speaks to his weak character and hidden online activities. If it is not him and a supporter or listener is the culprit, it speaks to the type of audiences he attracts to his show and social accounts. The author of this message implies that a ridiculous internet radio show is so valuable that it needs to be secretly stored for protection.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 206

EXHIBIT-9: Collected from Dr. Leonard Horowitz and Sherri Kane’s copyfraud, defamation, & felonious master document, provided here is a screenshot of Michael Vara’s email. Dated December 12, 2014, Michael Vara is responding to YouTube after they deactivated his YouTube Channel. Michael Vara engages in gross disinformation again by stating, I am a “Racist Cyberstalker” because he supports Jewish reporters. Precisely as illustrated in Exhibit-7, Michael Vara again is forecasting the theme that he, Dr. Leonard Horowitz and Sherri Kane will be using in the near future.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-700 × 308

EXHIBIT-10: Collected from Dr. Leonard Horowitz and Sherri Kane’s copyfraud, defamation, & felonious civil lawsuit, provided here is a screenshot image captured from Dr. Leonard Horowitz and Sherri Kane’s (CIV. NO. 14 00413 JMS/RLP) civil action, which they have been pushing in the courts for years. Not knowing Dr. Leonard Horowitz or Sherri Kane, other than my brief interactions with them through Michael Vara, I canot connect the dots to see how I’m part of a civil action involving people I know nothing about. From my research, I can only surmise that Dr. Leonard Horowitz and Sherri Kane are being deceptive by including me in their bizarre lawsuit to bolster their divisive agendas with the Hawaiian Courts.

Link: December 2014 Troll Triad Civil Action

“Although I view the World Wide Web, Telecommunications, Digital Technology and Mobile Device Technology as highly beneficial tools and areas helpful to society, I do recognize tools have many different purposes. When chosen for nefarious reasons, Information and Communications Technology are tools that become lethal weapons.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-762 × 926

EXHIBIT-11: E-11 is a screenshot image of Dr. Leonard Horowitz and Sherri Kane’s (CIV. NO. 14 00413 JMS/RLP) court suit combined with my EXHIBIT-10 screenshot image. Again, this image verifies Dr. Leonard Horowitz; Sherri Kane and Michael Vara have falsely included me in their preposterous and bizarre lawsuit. Please note that the Troll Triad is fully aware of their deceptive practices and at the time of my authoring this paper, I guarantee they think I am doing nothing to address their nonsense. Let us see what the near future brings as to my apathy in relationship to their defamatory and deceptive practices. Provided, here again, is a link to my secure copy of their December 2014 waste of taxpayer money legal documents.

Link: December 2014 Troll Triad Civil Action

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-535 × 341

EXHIBIT-12: E-12 is a screenshot image of Michael Vara’s Google Plus profile education section, captured on December 25, 2014, and still live at the time of this writing on December 31, 2014. As you can see, Michael Vara falsely claims he is an internet safety professional who has spoken to thousands of people and has studied online behavior since 1999. I laugh at myself every time I read his felonious statements because I quickly recall past LNM shows I was a guest educating his listeners on the dark side of cyberspace and pervasive online deception. I distinctly remember Michael Vara frequently commenting on how growing numbers of online users weave incredible tales about themselves and their careers. As you can read in the above image, it seems Michael Vara is a professional at online deception.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-750 × 548

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-535 × 256

EXHIBIT-13: E-13 is a screenshot image of Michael Vara’s felonious Facebook profile, Lyne Stafford. Michael Vara has always denied being the profile owner of Lyne Stafford and that she was owned and operated by yours truly. A previously secured screenshot verifies Michael Vara telling a Facebook friend he will prove I am the owner of Lyne Stafford. Apparently, Michael Vara has presented no proof to date after 2+ months. It also should be noted; showing Michael Vara is Lyne Stafford is that Lyne Stafford posted the Michael Vara owned www dot Michael Nuccitelli dot info domain on her Facebook wall. As of January 3, 2015, click on the link and see where it brings you at the LNM Radio Network website.

Link:  (404 Page)

Update 1-31-15: As of 1-31-15, Michael Vara’s Nuccitelli domain, not only no longer points to his LNM Radio Network website Radio Guest Troll page, but he has either hidden or removed this page: present, his link comes back as a 404 page. This domain is not mine and is owned by Michael Vara. The domain points to the LNM Radio Network Radio Guest Troll Tactics page, which he alleges I stole my pediatric internet safety sharacter, Troll Man from.  As you can see in the lower right-hand corner of my image, the red arrow points to an overlay image from October 1, 2014 verifying Lyne Stafford publicly posted his Michael Nuccitelli domain. In the image 13B above, here is the evidence Michael Vara lying once again.

“The “veil of invisibility” Information and Communications Technology and cyberspace offers humanity has numerous benefits, but the detriments can far outweigh the assistances for the vulnerable, unaware or ignorant online user.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 549

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 250

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-600 × 450

EXHIBIT-14: E-14 is a screenshot collage image verifying Michael Vara’s active dissemination and sharing of Dr. Leonard Horowitz and Sherri Kane’s copyfraud, defamation and felonious bizarre files. Within 24 hours of Horowitz finishing his bogus report, you can plainly see Michael Vara shared the links at a feverish pace. Screenshot images, 14B & 14C, are additional screenshots of Michael Vara’s sharing frenzy. I thought about publishing other exhibits of him sharing the news, but I figured six examples prove my point. Having been a close associate to Michael Vara for over three years, there is no doubt that he is fully aware of disseminating felonious information that is bizarre, unlawful and extremely defamatory.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-722 × 464

EXHIBIT-15: E-15 is a screenshot image, collected from Dr. Leonard Horowitz and Sherri Kane’s copyfraud, defamation, & nefarious files of a Michael Vara email to the website development and hosting company, Wix. Dated October 1, 2014, Michael Vara is responding to Wix in an attempt to restore his LNM website after they shut it down for multiple breaches of their community guidelines. In the short email, Michael Vara again engages in disinformation by stating I am a white supremacist attempting to steal his information off the internet.

As you can see, he also adds that I am in league with other cohorts in which he has had to secure legal representation. If you’ve read some of the other exhibits above, I think you’ll agree a pattern has been established proving how often and outlandish Michael Vara uses deception and defamatory information about others to cloak and minimize his nefarious intentions. Posted on this list and throughout this article, please know I’ve only presented a small sample of evidence illustrating Dr. Leonard Horowitz, Sherri Kane and Michael Vara’s nefarious and bizarre behaviors.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 573

Hidden LNM Public Dear Disciplinary Link

EXHIBIT-16: E-16 is a screenshot image of Michael Vara’s new web page at his LNM Radio Network website he calls, “Dear Disciplinary Board.” As you can see in my image captured on December 29, 2014, this web page provides a direct link to open, review and download Dr. Leonard Horowitz and Sherri Kane’s delusion themed document targeting me and addressed to the NYS Education Department & Office of Discipline. The other two links above the red arrow are an audio phone conversation with Lee Bracker and myself and his documentary he produced presenting the Troll Triad and their deceptive practices. If you enjoy documentaries, provided here is a link to Lee Bracker’s hour long investigative report about the Troll Triad. It is very well done and Mr. Bracker is quite talented at investigative reporting and video production.

Link: Mark of the Frequency Beasts

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 626

EXHIBIT-17:  E-17 is a screenshot image thanking YouTube for deleting Michael Vara’s August 28 & August 29, 2014 LNM Radio Shows. These two shows were the flashpoints that triggered my adversarial relationship with Michael Vara, his listeners, and associates. It was during these two shows where Michael Vara read my private emails, disclosed private information about myself and habitually spewed lies live on air. If interested in learning more about how the Troll Triad came to target iPredator Inc. and myself, provided here are links to sequential web pages and blog posts I authored presenting their preposterous accusations and disinformation tactics.



dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-604 × 326

EXHIBIT-18: E-18 is a screenshot image from a Facebook comment on October 1, 2014 made by Michael Vara. As you can see, he writes I have connections with the Israeli government. Knowing Wix is an Israel-based company, Michael Vara somehow holds me responsible for having his website shut down. I have no way of knowing why Wix  shut down his site. I can only assume that he refused to remove hate speech themed content and copywritten materials authored by me and Wix had enough of his habitual breaches of their terms of service and guidelines.

Michael Vara moved his website to the same internet domain company, Corp., as Dr. Leonard Horowitz and Sherri Kane did with their websites. What is typical bloviating by Michael Vara; he disparaged Wix on numerous occasions both on air and throughout his social networking sites. From scanning through my database, I stopped counting at seventeen where he either wrote or verbalized on air how he longs to sever all ties with Wix. As we now settle into 2015, Michael Vara has not only not kept his word again, but he actually changed his crippled site Wix gave back to him and now uses it for what he calls his Wall of Shame and Troll Man site. Provided here are the links if interested in viewing the nonsense he’s created.

LNM Hidden Wall of Shame Link!wall-of-shame-/cao2

LNM Wix Redacted Troll Man Page!troll-man-lnm/c1zkm

LNM Wix Website Homepage Link

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 765

EXHIBIT-19: E-19 is a screenshot image of two screenshot exhibits combined, EXHIBIT-9 & EXHIBIT-18, posted and disseminated by Michael Vara within an eight week period from October-December, 2014. The hypocrisy illustrated in these two images is amazin. Michael Vara vacillates between falsely alleging I’m a white supremacist to saying I work for the Israeli government. This image alone illustrates how he changes his patterns of deception and disinformation frequently. What’s most intriguing is that none of his listeners, associates or loved ones ever confront him about his habitual patterns of lies and derogatory statements. One does not have to be a forensic psychologist, investigative journalist or private detective to piece together quickly his pathological patterns of lying.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 546

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 638

EXHIBIT-20: E-20 is a screenshot image of my formal Internet Troll definition from the iPredator website I authored back in 2013. This same definition I’ve used in multiple posts, pages, social networking site posts and emails to online users and students seeking information on Internet Trolls. The second image, EXHIBIT 20-B, is a screenshot captured from December 30, 2014 of Michael Vara’s hidden Wix website he alleges his Wall of Shame and Troll Man blog. The content highlighted in yellow are the only words authored by Michael Vara. This is just one example of many exhibits compiled illustrating Michael Vara, Dr. Leonard Horowitz and Sherri Kane engages in gross copyfraud and plagiarism. As of January 5, 2015, it is live and available for review by visiting his hidden page.

Link: LNM Radio Guest Troll Tactics

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 602

EXHIBIT-21: E-21 is a simple image I created to verify that Cyber Tyger and Troll Man are owned by iPredator Inc. and I. Both of my pediatric internet safety characters are formally copy written with the United States Copyright Office in Washington D.C. The term is called Copyfraud and Michael Vara, along with help from Dr. Leonard Horowitz and Sherri Kane, have launched a campaign stating Michael Vara is the owner of Troll Man. The amount of time, effort and frustration the Troll Triad created for me was extensive, to say the least.

However, their deceptive tactics only fooled their minions and blind faith followers. If you plan on creating a product, service or concept new to humanity, I strongly recommend you first read the Digital Millennium Copyright Act of 1998 and the DMCA US Copyright Office Summary before announcing it online. I’ve pasted below both of these documents to read and download. Lastly, for my gratification, I’ve also once again pasted the copyright ID’s for my pediatric internet safety characters, Cyber Tyger, and Troll Man. When they are ready to be released, they will be public domain and free to use by anyone seeking to introduce young children to internet safety. I created these two characters to be free educational tools, and they will remain that way.

“Society has now become ripe for the birth and growth of a new human predator advanced in all things Internet. This assailant’s name is iPredator.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-700 × 700


iPredator: A person, group or nation who, directly or indirectly, engages in the exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. Deviant fantasies drive iPredators desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide,

iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable. Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“The repercussions of the unrestricted latitude of iPredators will be catastrophic for not only the individual, but for society, and potentially, the world over. Therefore, before it is too late, we must re-examine the phenomenon of social networking via technology.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-700 × 579


iPredator Bridge: iPredator Bridge is a variant of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology [ICT] to harm others motivated by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not initially driven by criminal, malevolent or deviant endeavors, iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies.

Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this realm and either proceed in their maladaptive trajectory or cease. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace are incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors. iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung [1875-1961] and his construct of the Collective Unconscious.

“In all cases, iPredators exhibit minimal disquiet for their victim’s psychological welfare by injecting fear, embarrassment, and distress into their lives.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-700 × 618


Dark Psychology: Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses.

Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior. Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time. It is the remaining 1%, Dark Psychology parts from Adlerian theory and Teleology. Dark Psychology encompasses all that makes us who we are in relationship with our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death; there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic.

Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even harder to define.

“Society must become educated in the Dark Psychology of Information and Communications Technology and learn to respect the mighty potential for harm that lurks beneath its surface.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-714 × 506


Cyberstalking: Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate, threaten or make unwanted advances towards a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant [aka, iPredator] and typology of psychopathological ICT user. Cyberstalking tactics include false accusations, threats of physical harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target. To meet the criteria of cyberstalking, the information and tactics used must involve a direct, indirect or implied physical and psychological threat to the target.

An example of physical threat involves bodily harm to the target or their loved ones via ICT. Examples of psychological risks include habitual disparagement, humiliation and disinformation dissemination to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands. Cyberspace is an abstract global medium, regardless of frontiers, creating new possibilities for this growing class of online assailant. The internet is inexpensive, easy to access, and geographic distance between cyberstalkers and their targets are no longer a confounding factor. Cyberstalking is both a strategy to target online users and a psychiatric pathology.

“iPredators can secretly cyberstalk their prey by tracking the target’s path from an undetectable, safe distance. Not only can iPredators become anyone they choose to be, they can also become anyone their victim may subconsciously desire them to be.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 507


Cyber Harassment: Cyber Harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, cyber harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target.

Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber harassment differs from cyberstalking in that it does not involve a credible or implied physical threat. Harassment does not include constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation become more vulnerable to corruption. Cyber harassment is the adult form of cyberbullying to a minor.

“The arena iPredators cyberstalk their targets are cyberspace with physical contact often a secondary objective. The question remains, how many online users will have to be victimized before humanity globally practices cyber caution?” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-800 × 500-2


Cyberbullying: Cyberbullying is defined as threatening or disparaging information directed at a target child delivered through information and communications technology (ICT.) Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. Dissimilar to traditional bullying, cyber bullying includes a phenomenon called Cyberbullying by proxy. Cyberbullying by proxy is when a cyber bully encourages or persuades other ICT users to engage in deprecating and harassing a target child.

Cyberbullying by proxy is a dangerous form of cyber bullying because adults may become accomplices to the cyberbully and may not know they are dealing with a minor or child from their community. Cyberbullies are usually motivated by the need for peer acceptance and power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent type of cyberbully feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of online bullying can become psychologically devastated or bullies themselves.

“iPredator is the antithesis to the positive environment created by virtual reality and hinders society’s exploration of cyberspace.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-700 × 700


Offline Distress Dictates Online Response (ODDOR.): A child is particularly prone to engage in high-risk behaviors online if he/she is feeling discouraged, angry or distressed. Do not move on to the next step until you are confident your child is feeling encouraged, stable or being monitored by a professional or trusted loved one. Of the many articles and studies, we have researched; a child’s psychological status highly correlates with their online behaviors. If there are ongoing conflicts at home, recent traumatic events or any other anxiety or distressing incidents in the home, it is imperative to monitor your child’s online usage.

Just as important as your child’s home environment is your child’s school environment. Given you cannot be with your child when they are at school, it is important to maintain regular contacts with school officials regarding your child’s attitudes and behaviors on school grounds. Although academics in school are a priority, your child’s demeanor with teachers and fellow students speaks to their psychological and emotional welfare. Research has directly linked a child’s school and home environments to their online activities.

“Malevolent in intent, iPredators rely on their capacity to deceive others using Information and Communications Technology in an abstract electronic universe.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-700 × 700


iPredator Victim Intuition: iPredator Victim Intuition (IVI) is reserved for seasoned iPredators. IVI is the aptitude to sense a target’s online vulnerabilities, weaknesses and technological limitations increasing their success with minimal ramifications. iPredators, through practice and learning, develop an understanding or skill of being able to experience an intuition to know what ICT user will be a successful target. Although there are other factors an iPredator uses in their repertoire of exhibiting IVI, it is highly recommended to learn the about IVI to reduce an online user’s chance of becoming an iPredator target.

An iPredator’s IVI acumen is based on practice, trial and error, understanding of human behavior and knowledge of Internet safety practices and ICT. Just as a locksmith has expertise at unlocking locks, an iPredator has expertise choosing a target they have concluded will not cause them to be identified, apprehended or punished. An iPredator’s IVI falls on a continuum of dexterity whereby some iPredators are advanced in their IVI skills, and other iPredators are novices. Whether the iPredator is advanced or novice in their IVI acumen, the fact that they engage in developing an IVI makes them a potentially dangerous ICT user.

“Within the next three decades, iPredator acts of theft, violence, abuse, cyber warfare, and cyber terrorism will grow into a global plague if not quashed and thwarted.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-721 × 685


Online Reputation: Online Reputation (aka, Digital Reputation) is a term used to describe the status of an ICT user or business that is disseminated online and available to peers, superiors, loved ones and consumers. This information can be positive or negative and vital to the health, success and reputation of an ICT user or a business. Online Reputation is created and sustained by peers, school or work associates, loved ones, acquaintances, consumers, competitors, adversaries, online strangers and Internet assailants. Given the widespread growth and expansion of ICT, a positive online reputation is vital to people, communities, and business in order to thrive, survive and the attainment of personal endeavors.

Online Reputation and the growing risks confronting ICT users and businesses have become increasingly endemic due to the escalating use and significance of the Internet as a communication platform. With the ascent of social media, the formation of Online Reputation is an increasingly common process, and the practices of Online Reputation Management have become crucial for both individuals and corporate entities. An ICT user or business’s Online Reputation are directly correlated to their Online Footprint. Like Online Footprint, an ICT user’s Online Reputation is directly related to the quantity, quality, accuracy and extent of personal information they posted or share online available and used by other ICT users.

“Whereas cyberspace & virtual reality is both positive and artificial, iPredators are negative and very real.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-714 × 539


Digital Footprint: Digital Footprint is a term used to describe the trail, traces or “footprints” that children, adults and businesses leave in cyberspace from their online activities using ICT. This is information that is obtained, exchanged or disseminated between ICT users. An ICT user’s Digital Footprint is created by social media information, forum registrations, e-mails, attachments, videos, digital images and other forms of communication via ICT that leave traces of personal and/or corporate information about someone and/or a business available to others online. An ICT user or business’s Online Reputation are directly correlated to their Digital Footprint.

An ICT user or business’s Online Reputation is created by the culmination of their Digital Footprints over time. Like Online Reputation, an ICT user’s Digital Footprint can be positive or negative and vital to the health, success and reputation of an ICT user or a business. Personal information disclosed or shared online all contribute to an online user’s Digital Footprint in the age of social media. Like Digital Footprint, an ICT user’s Online Reputation is directly correlated to the quantity, quality, accuracy and extent of personal information they posted or share online available and used by other ICT users. It is for these reasons that a child, adult or business must be diligent in monitoring their Digital Footprint.

“Darkside of Cyberspace is a metaphor and concept defining a virtual environmental realm that includes all criminal, deviant, deceptive, harmful and malevolent activities in the abstract universe of cyberspace. Whereas iPredator is a criminal, deviant and disturbed typology construct, Darkside of Cyberspace also includes habitual online deception, legal and illegal online activities, as well as, destructive and self-destructive online behaviors.” Michael Nuccitelli (2013)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-537 × 427


Online Deception [aka, Disinformation, Cyberstealth]: Unlike classic deception used by traditional criminals and deviants, Disinformation [aka, Online Deception, Cyberstealth] relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Disinformation and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications for targeted victims.

Disinformation includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of the crime, defiance or harm against others. Disinformation does not require an ICT user to engage in nefarious, deviant or malevolent activities. Although all forms of deception are problematic, Disinformation can be as subtle of what many call a “white lie.” Another difference is when iPredators use Cyberstealth to hide their identity from victims. In general, iPredators use Cyberstealth when their actions involve illegal activities and hiding their identity is paramount to reduce being identified, apprehended and prosecuted. ICT users, who evaluate their odds of being identified, develop tactics and strategies to minimize identification are motivated by criminal, deviant & harmful causes are iPredators using Cyberstealth.

“Although disguised, Little Red Riding Hood could see her stalker whereas we cannot thanks to an iPredator’s Cyberstealth and the inherent anonymity provided by Information and Communications Technology.” Michael Nuccitelli, Psy.D. (2011)



Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, personalities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension, and punishment. Unlike classic deception used by traditional criminals and deviants, online deception ultimately relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications for targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of the crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting, an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills, and behavioral patterns are used to identify who they are.

“The art of deception is an engrained instinctual trait in all living organisms for purposes of survival, procreation, protection, and nourishment. Unfortunately, humanity takes this art and makes it a dangerous and lethal weapon. Coupled with the “veil of anonymity” cyberspace offers, online deception is unmatched in its potential to devastate a person, group or nation.” Michael Nuccitelli, Psy.D. (2011)

Cyber Tyger and Troll Man teach children (K-5) about internet safety & cyber attack prevention. Cyber Tyger and Troll Man are public domain characters initially conceptualized by Michael Nuccitelli, Psy.D. in 2011 designed to introduce internet safety concepts to young children. Cyber Tyger is a “Pediatric Internet Safety Superhero” and Troll Man is a “Pediatric Internet Troll Super Villain”. Cyber Tyger travels cyberspace and mobile devices to help kids and Troll Man seeks to troll kids. Cyber Tyger and Troll Man are based on Dr. Nuccitelli’s Information Age Education & iPredator concepts.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-637 × 74

Cyber Tyger: Cyber Tyger (aka, Cybr Tygrrrrrr!) is a young white tiger superhero who protects young kids online (K-6). Cyber Tyger helps protect children from cyberbullies and the dangers of cyberspace. When he was born, the doctors used digital technology to help his mother’s birth, which gave him super cyber powers. Cyber Tyger and his adversaries, including his archenemy Troll Man, were originally conceived in 2011 to educate young kids about internet safety and cyber attack prevention.

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-528 × 74

Troll Man: Troll Man is a pediatric internet troll villain, internet safety character, online scoundrel and enemy of the internet safety superhero, Cyber Tyger, for children (K-6). Cyber Tyger and his adversaries, including Troll Man’s profile, were originally conceived in 2011 as a means to educate young children about internet safety and cyber attack prevention. As a Cyborg with digital powers, Troll Man travels through cyberspace cheating, lying and stealing from online users. Once a child opens his iTroll email attachments, they cannot escape unless helped by Cyber Tyger.

  • Copyright © 2014. iPredator Inc., All Rights Reserved.
  • Troll Man: U.S. Copyright #1-1796196711
  • Cyber Tyger: U.S. Copyright #1-1825203061

“By virtue of the proverbial “cloak of anonymity” so conveniently provided by Information and Communications Technology, iPredators troll cyberspace having the luxury and distinct advantage in that they may represent themselves in any way they choose.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-700 × 700


Dr. Internet Safety: Dr. Internet Safety (aka, Doc iSafety) is an abstract pediatric internet safety character that educates tweens, teens and adult caregivers on cyberbullying, cyber harassment and cyberstalking prevention, online sexual predator identification, cyber security, the dark side of cyberspace and developmentally appropriate iPredator concepts. Dr. Internet Safety is Developmental Psychology and adolescent maturation savvy in relationship to Information Age tweens and teens. Dr. Internet Safety accepts and communicates to children supporting their perceptual distortion of viewing themselves as being more technology, social media and cyber safety skilled than their adult counterparts.

From a sociological standpoint, Dr. Internet Safety seeks to make all K-12 educational systems include internet safety classes compulsory for all American school districts. Lastly, Dr. Internet Safety has graduate level experience in iPredator profiling, cyber deception and the Information Age Education triad of Humility, Prevention Education, and non-denominational Family Values.

“Unlike traditional human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to the data available.” Michael Nuccitelli, Psy.D. (2011)


Personal Information: The Personal Information factor is a term used to describe the quantity and frequency of personal information an ICT user or business shares with other ICT users and available to known and unknown ICT users to view and prospect. Examples of personal information include their home and school address, full names, name of school, employer, age, gender, financial information, images, videos and online activities (i.e. passwords, usernames and profiles). The Personal Information factor relates to the ICT user or business’s knowledge and understanding of the risks created when they post and share their contact or personal information about their age, gender, daily routines, sexual predilections and online preferences and/or activities.

With an abundance of favorite social networking websites like Facebook, Google+, Twitter, and Linkedin, it has become easy for iPredators to target children and adults to amass their personal information. Images and videos posted publicly online can leave a trail easily traceable by iPredators. The Personal Information factor is the most important aspect of Internet safety cautioned to all ICT users. iPredators heavily rely on access and acquisition of their potential targets personal information. Given their advanced ICT prowess and ability to manipulate vulnerable ICT users, many iPredators do not have to rely on social networking sites to obtain the necessary personal information to locate, identify and target their victims.

“Although the benefits of Information and Communications Technology far outweigh the detriments for society, humanity has been seduced by the illusory notion that more technology translates into a better quality of life.” Michael Nuccitelli, Psy.D. (2014)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-800 × 577

Social Media Safety: Social Media Safety is a term used to describe the safety measures, online technologies and practices an Information and Communications Technology (ICT) user accesses to share their opinions, insights, experiences and perspectives related to their personal, career and/or scholastic activities at social networking websites. Social Media Safety refers to the ICT user’s online safety knowledge and understanding, in relationship to, their energy, time and importance they place on their social media profiles and networking endeavors, perceived online image and their interactions with other ICT users using social networking websites. Social Media is defined as forms of electronic communication through which users create online communities to share information, ideas, personal messages, and other content.

More specifically, Social Media refers to the use of web-based and mobile technologies to turn communication into an interactive dialog. Within this realm, the areas investigated include the themes and quantity of personal and sensitive information an ICT user allows other ICT users to view related to themselves, their loved ones or their employers or academic institutions. A growing number of ICT users place an incredible amount of time, effort and thought into their social networking site profiles and endeavors. Social Media has become a driving force in many ICT users’ lives and a frequented arena for cyberbullying, cyber harassment, and cyberstalking.

“Although the majority of child sexual assaults take place offline by friends, family members and young adults close in age to the target child, there still are thousands of online sexual iPredators confirmed by the FBI online trolling for discouraged, easily manipulated children.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-new-york-700 × 700

Mobile Device Safety: Mobile Device Technology and Smartphones is quickly becoming the tool of choice for accessing and interacting in cyberspace. The trend projections of mobile device usage are astounding in which children will be a large mobile user demographic. With this inevitability, children will be left to defend themselves interacting with cyberspace for increasing periods without adult supervision. Making matters worse, online sexual predators, cyber criminals and iPredators who target children are gleefully preparing for this shift in pediatric mobile device usage.

It is crucial for all parents and adults to take an active role in ensuring the mobile device(s) given to children are purchased with the most advanced security and parental controls available. This writers cannot emphasize enough how important it is to, not just verify the child’s mobile device is secure, but regularly monitored and habitually checked to make sure the child’s device has not been compromised.

“Information and Communications Technology can paralyze our innate evolved instinct for “survival of the species” and cause us to lose sight of being skeptical and wary of people we meet online.” Michael Nuccitelli, Psy.D. (2011)

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-new-york-300 × 390

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D: Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the criminal/deviant side of cyberspace.

In June 2013, Dr. Nuccitelli and iPredator Inc. launched their website, iPredator, offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations. Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist for ten years and worked in the field of forensic psychology conducting evaluations and consultation with attorneys and court systems. Dr. Nuccitelli has an extensive career and academic experiences. His areas of expertise include forensic & criminal psychology, cybercriminal psychology, psychiatric illness, addictions and developmental psychology. He is an avid follower of national & criminal news and enjoys educating the public by interacting with the media. Dr. Nuccitelli continues to investigate and expand his construct he has designed called iPredator.

“As part of the human condition, we tend to embellish our attributes, both offline & online wanting to present ourselves as more prosperous, attractive and worldly. The purpose of decorating our attributes is not to abuse or victimize the recipient, but to increase our perceived worth. In the Information and within cyberspace, this innate trait has blossomed into a garden of lies.” Michael Nuccitelli, Psy.D. (2011)


iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft, and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance, and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)


  1. 10 Things You Should Know About Libel-SeqLegal
  2. 100 Internet Safety Tips-iPredator Inc.
  3. 5PV Model-iPredator Inc.
  4. About iPredator Inc.-iPredator Website
  5. Amendments to the Constitution of the United States
  6. Character Assassination and the Internet-YouTube
  7. Character Assassination-Facebook Group
  8. Continuing Education-iPredator Inc.
  9. CopyFraud Definition-Wikipedia
  10. CopyFraud-TechDirt
  11. Cornell University Law School-Legal Information Institute-Defamation
  12. Cyber Attack Risk Assessments-iPredator Inc.
  13. Cyber Harassment-iPredator Inc.
  14. Cyber Tyger and Troll Man-iPredator Inc.
  15. Cyber Tyger-Dr. Internet Safety Blog
  16. Cyberbullying Examples 2015
  17. Cyberbullying Facts 2015-Dr. Internet Safety
  18. Cybercriminal Minds-Dark Psychology
  19. Cybercriminal Minds-iPredator Inc.
  20. Cyberstalking Facts-iPredator Inc.
  21. Cyberstealth-iPredator Inc.
  22. Dark Psychology Blog Post-Dark Psychology
  23. Dark Psychology Cybercriminal Blog-iPredator Inc.
  24. Dark Psychology-Darkside of Human Consciousness
  25. Dark Psychology-Online Deception
  26. Dark Psychology-Troll
  27. Darkside of Cyberspace-iPredator Inc.
  28. Defamation in Good Faith-A.G. Harman (2012)
  29. Defamation Law: The Basics-FindLaw
  30. Defamation Law-Guide to Libel and Slander
  31. Defamation Made Simple-Nolo
  32. Defamation of Character or Free Speech-AllLaw
  33. Defamation Privileges and Defenses-Digital Media Law
  34. Defamation Privileges and Defenses-DMLP
  35. Defamation vs. False Light: What is the Difference-FindLaw
  36. Defamation, Libel and Slander Law-Expert Law
  37. Defenses of Defamation-National Paralegal College
  38. Dr. Internet Safety Blog-iPredator Inc.
  39. False Defenses in Defamation-Christopher H. Whelan, Esq.
  40. False Light-Digital Media Law Project
  41. False Light-National Paralegal College
  42. Getting it right, but in a “false light”-RCFP
  43. Hawaii Defamation Laws-Kelly Warner
  44. How to Prove a Defamation of Character Claim-Law Dictionary
  45. How to Sue for Defamation of Character-wikiHow
  46. Idaho Defamation Laws-Kelly Warner
  47. Information Age Education-iPredator Inc.
  48. Information Age Forensics-iPredator Inc.
  49. Internet Addiction Screening-iPredator Inc.
  50. Internet Addiction-Dr. Internet Safety
  51. Internet Deception-iPredator Inc.
  52. Internet Defamation, Libel & Slander-Traverse Legal
  53. Internet Safety Dynamics-iPredator Inc.
  54. Internet Safety Tools-Dr. Internet Safety
  55. iPredator Bridge-iPredator
  56. iPredator Inc.-Professional Services
  57. iPredator Internet Safety Website-iPredator Inc.
  58. iPredator-Information Age Darkside of Human Consciousness
  59. Is Cyber Bullying Defamation of Character?-NoBullying
  60. Legal Guide for Bloggers-EFF
  61. Libel vs. Slander-Different Types of Defamation-Nolo
  62. Michael Nuccitelli, Psy.D.-iPredator Inc.
  63. New York Defamation Laws-Digital Media Law Project
  64. Online Deception-Dr. Internet Safety
  65. Online Psychopathy-Dark Psychology
  66. Online Psychopathy-Dark Psychology
  67. Online Reputation-iPredator Inc.
  68. Privileges and Defenses in Defamation Cases-Nolo
  69. Section 230 of Title 47 of the United States Code (47 USC § 230)
  70. Social Media and Online Defamation-Nolo
  71. Social Media Safety Exams-iPredator Inc.
  72. Social Media Sites-iPredator Inc.
  73. South Carolina Defamation Laws-Kelly Warner Law
  74. The Constitution of the United States-PDF
  75. Tips for the Defamed on the Internet-ZVULONY & CO
  76. Troll Man-Dark Psychology Blog
  77. Troll Man-Dr. Internet Safety
  78. What Are the Different Types of Defamation?-WiseGeek
  79. What is Criminal Defamation-WiseGeek
  80. What is Cyberbullying-iPredator Website
  81. What is Internet Slander-WiseGeek
  82. What is Online Defamation, aka, Cyber Libel-InfoSec Institute
  83. What is Slander and Libel-Education Portal
  84. What is Slander-WiseGeek


dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-ipredator-new-york-684 × 259


download-ipredator-internet-safety-themed-pdf-paper-button-250 x 84

iPredator Inc.,, does not represent or endorse the accuracy or reliability of any information, content or advertisements contained on, distributed through, or linked, downloaded or accessed from any of the services contained on this web page or website, nor the quality of any products, information’s or any other material displayed, purchased, or obtained by you as a result of an advertisement or any other information’s or offer in or in connection with the services herein. You hereby acknowledge that any reliance upon any materials shall be at your sole risk. iPredator Inc.,, reserves the right, in its sole discretion and without any obligation, to make improvements to, or correct any error or omissions in any portion of the service or the materials.

Author: Michael Nuccitelli, Psy.D.


Published by iPredator Inc.

Find us on Google+

Publisher: iPredator

Find us on Google+

iPredator Inc. is a New York based Internet Safety Company founded to provide products and services addressing cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online predation and online deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
New York
Phone: 347-871-2416

dr.leonard-horowitz-sherri-kane-horokane-lnm-radio-network-leonard-g.-horowitz-troll-triad-1200 x 480

Pin It on Pinterest

Share This