Cyberbullying, Cyberstalking, Cyber Harassment & iPredator

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Cyberbullying, Cyberstalking, Cyber Harassment & iPredator-A Brief Introduction” is an article authored by Michael Nuccitelli, Psy.D., NYS licensed psychologist, forensic psychology consultant and author of the new Information Age Forensics construct, iPredator. In addition to providing the reader present definitions of Cyberbullying, Cyberstalking & Cyber Harassment, Dr. Nuccitelli also provides definitions of his two constructs, iPredator and Dark Psychology. Lastly, Dr. Nuccitelli introduces the definition of a new construct he is working on with iPredator associates to address the area of Online Victimization Dynamics. Their working definition term at present is called Information Age Wellness.

     Cyberbullying, Cyberstalking, Cyber Harassment

&

iPredator

A Brief Introduction

by Michael Nuccitelli, Psy.D.

The Information Age is a societal paradigm and period of time beginning in the last quarter of the 20th century and presently thriving in the second decade of the 21st century. The Information Age is a stage in societal and technological development similar to the Industrial Revolution (1750-1942). The Information Age represents the evolution, emergence, consumption of and reliance upon Information and Communications Technology (ICT). In a mere four decades, ICT and its importance to humanity have led many to surmise that the planet and its human inhabitants are amidst an Information Revolution. Mobile digital technology, telecommunications, social media and the abstract concept and artificial universe of cyberspace are just a few examples of humanities newest frontiers to obtain, exchange and disseminate information.

The planet is experiencing a shift from traditional industry, born and bred during the Industrial Revolution, to an economy based on the creative and rapid manipulation of information. Just as the Industrial Revolution greatly changed the lives of humanity, the Information Revolution is a societal shift rapidly changing humanity’s social, economic and psychological conditions of the times. The Information Revolution marks another major turning point in history, following the Industrial Revolution and changing every aspect of daily life unlike ever before.

Information and Communications Technology = ICT

Information and Communications Technology (ICT) is an umbrella term used to define any electronic or digital communication device or application used to obtain, exchange or disseminate information. ICT stresses the role of unified communications and the integration of telecommunications, which enable users to create, access, store, transmit and manipulate information. ICT consists of all forms of telecommunication, information technology, broadcast media, audio and video processing, transmission and network based control and monitoring functions. ICT has rapidly become one of the basic building blocks of modern society and will become increasingly important as the Information Age matures.

Many industrialized nations now regard understanding ICT and mastering the basic skills and concepts of ICT is vital and now considered part of the core of education, alongside reading, writing and arithmetic. The importance of ICT to humanity lies upon a continuum of relevance ranging from minimal impact to vital requirement regarding an ICT user’s day to day activities. For some, ICT and the Internet are nothing more than tools of convenience for conducting their responsibilities. For others, their social, scholastic, business and/or financial affairs disclosed in cyberspace via ICT are crucial to their self-esteem, self-worth, success and perceptual world.

ICT has changed the way humanity interacts, exchanges and accesses information. Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It is often hard to fathom that the Internet, used by two billion plus people globally, only celebrated its 20th birthday in 2011.

As ICT continues to expand at a feverish pace coupled with seemingly daily introductions of new technology, ever-increasing obstacles will challenge humanity. Already, ICT users have been confronted by the ever-increasing detriments of having incredible amounts of information, which can be obtained, exchanged and spread at incredible speed. Another challenge, that includes the dark side of humanity, is the usage of ICT and cyberspace to harm others inflicting psychological, physical and/or societal damage.

The construct iPredator, created by this writer, encapsulates these harmful typologies and is as follows along with brief definitions of iPredator typologies and this writer’s definition of his theoretical criminology construct termed, Dark Psychology.

IPREDATOR DEFINITION

iPredator: iPredator is a person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Offline Distress Dictates Online Response

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli Psy.D., iPredator Inc. (2013)  www.iPredator.co

IPREDATOR TYPOLOGIES

CYBERBULLYING

Cyberbullying: Cyberbullying is defined as threatening or disparaging information directed at a target child delivered through information and communications technology (ICT.) Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. Dissimilar to classic bullying, cyber bullying includes a phenomenon called Cyberbullying by proxy. Cyberbullying by proxy is when a cyber bully encourages or persuades other ICT users to engage in deprecating and harassing a target child. Cyberbullying by proxy is a dangerous form of cyber bullying because adults may become accomplices to the cyberbully and may not know they are dealing with a minor or child from their community.

Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of online bullying can become psychologically devastated and/or bullies themselves.

CYBER HARASSMENT

Cyber Harassment: Cyber harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, cyber harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target.

Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber harassment differs from cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation becomes more vulnerable to corruption. As anonymity via the Internet becomes more feasible, cyber harassment continues to flourish. Cyber harassment is the adult form of cyberbullying to a minor.

Cyberstalking and Cyber Harassment Laws by State Link 

CYBERSTALKING

Cyberstalking: Cyberstalking is defined as the use of Information and Communications Technology (ICT) to stalk, control, manipulate, threaten or make unwanted advances towards a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target. To meet the criteria of Cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones via ICT.

Examples of psychological threats involves disparagement, humiliation, dis-information dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands. The Internet is a global medium regardless of frontiers, and this creates new possibilities for the growing class of online. Given the Internet is inexpensive and easy to access, distance between cyberstalkers and their targets are no longer a confounding factor. Cyberstalking is both a strategy to target other ICT users and a psychiatric pathology. When internet is a tactic, the assailant does not need to be motivated by psychiatric illness.

ONLINE SEXUAL PREDATION

Online Predation: The typology of iPredator that is categorized as Online Predators have a variety of different terms used to describe the same patterns and motivations for their abuse. Online Sexual Predators are defined as adult online users who seek to exploit vulnerable children or adolescents for sexual and other abusive purposes. Online Predators are sexual predators who use Information and Communications Technology and the Internet to locate, target and victimize minors. Common forums used by Internet Predators to target children include chat rooms, instant messaging or social networking sites for the purpose of flirting with and meeting others for illicit sexual experiences.

Online Child Predators are motivated to manipulate or “groom” a minor with the ultimate goal of meeting and engaging in sexual activity, despite knowing they are engaging in illegal activities. In instances where meeting their victims is not the primary objective, Online Predators also attempt to persuade children and adolescents to participate in some form of online sexual and/or sexually provocative activity motivated by financial gain engaging in the distribution and sale of child pornography.

CYBERCRIME

Cybercrime: Cybercrime is defined as crimes and criminal activity committed on the Internet using Information and Communications Technology as the tools to target victims. All forms of cybercrime involve both Information and Communications Technology and a targeted victim(s). Cybercrime is segmented into two distinct categories involving the focus of the cyber criminal activities. These activities are focalized on the technology of ICT to achieve the cyber criminal’s aims for personal and financial gain or targeted at the person using the Information and Communications Technology. When the individual is the main target of cybercrime, ICT is the tool rather than the target. These are the crimes, which have existed for centuries in offline societies.

ScamsIdentity Theft and Internet Fraud have existed long before the development of information technology, but in non-digital form. Cyber criminals utilize technological tools that increase their potential pool of victims and make them difficult to identify and apprehend. Cybercrime targets people, property or governments using Information and Communications Technology.

CYBER TERRORISM

Cyber Terrorism: Cyber Terrorism is defined as the use of Information and Communications Technology (ICT) by iPredators, organized groups and/or terrorist groups to advance their agenda motivated by religious, political and/or philosophical ideologies. Examples of cyber terrorism include 1. The use of ICT to organize and execute attacks against networks, and Information and Communications Technology (ICT) infrastructures. 2. The exchanging of information or making threats electronically. 3. The act of hacking into computer systems. 4. Introducing viruses and malware to vulnerable networks. 5.Defacement of websites and blogs. 6. Denial-of-service attacks 7. Terrorist threats made via electronic communication.

When strategic cyber attacks are motivated for financial gain, these attacks are defined as cybercrime. Cyber terrorism is any premeditated, politically, religious or philosophically motivated attack against information, computer systems, computer programs and data, which results in violence against non-combatant targets by sub-national groups or clandestine agents. A cyber terrorist attack is designed to cause physical violence or extreme financial harm to the targeted victims or community.

According to the U.S. Commission of Critical Infrastructure Protection, cyber terrorist targets include the banking industry, military installations, power plants, air traffic control centers and water systems. The F.B.I. define cyber terrorism as “The premeditated, politically motivated attack against information, computer systems, computer programs and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.”

INFORMATION AGE FORENSICS

iPredator is a global concept that includes children, adults and organized groups who, directly or indirectly, use ICT to harm or exploit others. The goal of the United States and all industrialized nations is to stop the growth of iPredators by educating its citizens on their tactics and strategies. From a profiling and investigation standpoint, assessment of an iPredator’s Cyberstealth tactics and Digital Footprint can assist authorities in their profiling, identification and apprehension. Just as classic criminal profiles have signatures used to apprehend them, iPredators have digital signatures as well.

The importance of ICT and the Internet to humankind is different to everyone and as unique as a fingerprint. For some, ICT and the Internet are nothing more than tools of convenience for conducting mundane tasks. For others, their social, scholastic, business and/or financial affairs disclosed online are crucial to their life functioning, self-esteem, self-worth, success and perceptual world.

As ICT, social media, virtual reality and the Information Age rapidly expands becoming integral to humanities daily activities, understanding the basic tenets of these new dimensions are preponderant. In 2011, the Internet celebrated its 20th birthday. In 2013, most of humanity continues to fail in understanding the golden rule of all new territory exploration. What always comes with opportunity and new frontiers are elements unknown and potentially dangerous. It is these unknown and dangerous elements, lurking within cyberspace, which ICT users and their loved ones must be vigilant about.

“Prior to the Information Age, physiological health was a priori to survival and self-preservation. Now, and ad infinitum, psychological health is equally, if not more, important.” Michael Nuccitelli Psy.D., iPredator Inc. (2013)

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Cyber Attack Construct Recognized – Michael Nuccitelli, Psy.D.

Cyber Attack Construct Recognized

Michael Nuccitelli, Psy.D.

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Cyber attack prevention is addressed by Delia Stafford, president of the Haberman Educational Foundation, who interviews the author of a new Information Age forensics construct called iPredator. Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic psychology consultant and author of iPredator recognized by the American College of Forensic Examiners Institute, law enforcement agencies, information security professionals and a growing number of educational professionals. 

It does not require a plethora of statistics, articles or research to confirm that Information Age humanity is becoming enveloped by information technology. The Information Age represents the evolution, emergence, consumption of and reliance upon Information and Communications Technology (ICT). In a mere four decades, the importance of ICT has led many to surmise that the planet and its human inhabitants are amidst an Information Revolution. Mobile device technology, telecommunications, social media and cyberspace are just a few examples of humanities newest forms of communication.

Welcome to the Information Age

The Information Revolution marks another major turning point in history, following the Industrial Revolution and changing every aspect of daily life unlike ever before. Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It is often hard to fathom that the Internet, used by two billion plus people globally and rapidly growing, celebrated its 20th birthday in 2011.

As information technology continues to expand at a feverish pace, coupled with seemingly daily introductions of new technology, ever-increasing obstacles challenge students, educators and all humanity. Another challenge, that includes the dark side of humanity, is the usage of ICT and cyberspace to harm others inflicting psychological, physical and/or societal damage. Terms such as cyberbullying, cyberstalking, cybercrime and online sexual predation are arenas causing harm to children, parents and all online users.

Education News Interview

To enlighten Education News readers, Delia Stafford, president of the Haberman Educational Foundation, offers her transcribed interview with the author of a new Information Age forensics construct called iPredator. Michael Nuccitelli Psy.D. is a NYS licensed psychologist, forensic psychology consultant and author of iPredator. Recognized by the American College of Forensic Examiners Institute, law enforcement agencies, information security professionals and a growing number of educational professionals, Dr. Nuccitelli and iPredator Inc.’s mission is to slow the rapidly growing rates of online victimization and theft.

  • Delia: Good Morning Dr. Nuccitelli and Thank You for helping to enlighten the readers of Education News. Could you tell me about your construct and what the definition of iPredator is?
  • Dr. Nuccitelli: Certainly Delia and here for Education News readers is my recently updated definition of iPredator. It is as follows:

What is iPredator?

iPredator: iPredator is a person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator Tenet: ODDOR (Offline Distress Dictates Online Response)

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Dark Side of Cyberspace

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber attack with minimal ramifications.

iPredator Transcribed Interview

  • Delia: So doctor, what are the greatest concerns for educators as we start the school year and approach 2014?
  • Dr. Nuccitelli: That’s a big question and I wish I could simply answer “Anything Tech-Centric.” The unfortunate reality is that cyberbullying, cyber harassment, cyberstalking, cybercrime and online sexual predation are areas causing harm to children, parents, educators and all online users. Throw in “sexting” and the new concerns about internet addiction and now we have a country dealing with the sharp end of the proverbial “double-edged sword”. Not to sound alarmist and I hope I’m wrong, but “student on student abuse” and “student on teacher abuse” are dynamics not in the too distant future for your Education News readers. Not just teachers and educational systems, but all institutions and professionals deemed, authority by minors, must be prepared.

Internet Safety is Vital

  • Delia:  Do you have any final comments helpful to Education News readers?
  • Dr. Nuccitelli: lol…I could be a consultant to Education News, conducting cyber attack prevention webinars for their readers, regularly authoring articles/blog posts and actively advising school officials and that still would not reduce a student, teacher or educational system’s probability of being targeted by iPredators. Educators and educational systems, like all Americans, must wake up to the reality of three issues I have concluded are a priori.

Triad of Information Age Issues

  • I. We live in the Information Age.
  • II. Children, their parents and all online users are rapidly becoming enveloped by information technology.
  • III. Mobile device technology, social media and the “Dark Side of Cyberspace” are here to stay. Stopping the rapid growth of online victimization starts with the understanding that it is no longer categorized, in our minds, as a social issue in the distant future. It is here now and educators must learn about the pitfalls. Not just for their students, but for themselves, their colleagues and loved ones as well.
  • Delia: Thank you Dr. Nuccitelli and I’m sure your information will motivate teachers and school systems to contact iPredator Inc. If Education News readers want to visit your internet safety website or contact you for consultation or student/teacher training, could you provide your contact information? 
  • Dr. Nuccitelli: Of course Delia and please give my thanks to the folks at Education News. All the information at www.iPredator.co (no “m” after .co) is cost free, does not require having to sign up using personal information or an email address. If there is information of interest, simply go to the base of any web page and click on the green pdf/print button. For educators and school systems interested in comprehensive diagnostic and educational tools, I’ve authored 26 Internet Safety checklists and inventories, (IISC and IPI Collection) that can be purchased in both full and abridged versions (IISC-ABR Collection). And although some may view me as being old fashioned, anyone can call me directly, here in New York, at 347-871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Thank You Haberman Educational Foundation and Education Views

Note: Thank you Education Views, Education Views Editor-In-Chief, Jimmy Kilpatrick, the Haberman Educational Foundation and Haberman CEO & President, Delia Stafford. Thank you for introducing the cyber attack construct, iPredator, to the Nation’s top teachers and school officials. May the 2013-2014 school year be a cyber safe one for students, educators and all academic professionals.

Recent iPredator National Press Releases

I. Cyberbullying, Online Sexual Predator & Information Age Forensics Construct, iPredator, Updated and Released

Poughkeepsie, New York (PRWEB) June 30, 2013

The cyberbullying, online sexual predator and cyber forensic psychological construct, iPredator, has been updated and released, at no cost, for review, download and dissemination. NYS licensed psychologist, forensic psychology consultant, founder of iPredator Inc. and author of the theoretical criminology construct, iPredator, has updated his theorem for public discourse.

http://www.prweb.com/releases/ipredator/digital-forensics/prweb10887282.htm

III. Internet Safety Website Officially Launched by iPredator Inc.

Hudson Valley, New York (PRWEB) April 29, 2013

New York based internet safety and Information Age Forensics Company, iPredator Inc., has launched their cyber attack prevention website. iPredator Inc. founder, Michael Nuccitelli Psy.D., C.F.C., authored and compiled the majority of the vast information available at no cost to all online users.

http://www.prweb.com/releases/internet-safety/ipredator/prweb10679227.htm

dr.-internet-safety-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Cyberstalking, iPredator & Dark Side of Cyberspace Internet Radio Interview

Cyberstalking, iPredator

&

The Dark Side of Cyberspace Interview

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Cyberstalking Educational Internet

Radio Show Announcement

Cyberstalking, Cyberbullying, Cyber Harassment, Internet Trolls & iPredator

Cyberstalking, iPredator and the Dark Side of Cyberspace is discussed on Saturday, August 10, 2013 from 6-8pm EST, 3-5pm PST. NYS licensed psychologist and forensic psychology consultant, Michael Nuccitelli Psy.D. will be guest on the internet radio show, Truth Frequency Radio, with hosts Chris and Sheree Geo. As author of the new Information Age Forensic construct, iPredator, Dr. Nuccitelli is quickly becoming a national expert on the major groups of online users who use cyberspace to engage in nefarious and malevolent activities. Topics discussed during the show include Cyberbullying, Cyberstalking, Cybercrime, Cyber Harassment, Cyber Terrorism, Online Sexual Predation, Internet Addiction, Online Deception and Information Age Forensics.

Michael Nuccitelli Psy.D. is a New York State licensed psychologist, forensic psychology consultant and author of the new Information Age Forensics construct, iPredator. iPredator is recognized by the world’s largest forensics education organization, American College of Forensic Examiners Institute and a growing number of law enforcement, information security, legal and educational institutions. As author of iPredator, Dr. Nuccitelli is an Information Age Forensics and Cyber Attack Prevention educator, profiler & consultant. Provided for the reader below is Dr. Nuccitelli’s formal definitions of iPredator, Cyberstalking, Cyber Harassment, Cyberbullying and Internet Troll.

Cyber Harassment and Cyberstalking Laws by State

(click link to visit site)

Cyber Harassment

Cyber Harassment: Cyber harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, cyber harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target.

Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber harassment differs from cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include a constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation becomes more vulnerable to corruption. As anonymity via the Internet becomes more feasible, cyber harassment continues to flourish. Cyber harassment is the adult form of cyberbullying to a minor.

Cyberstalking

Cyberstalking: Cyberstalking is defined as the use of Information and Communications Technology (ICT) to stalk, control, manipulate, threaten or make unwanted advances towards a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target. To meet the criteria of cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target, their environment or loved ones. An example of physical threat involves bodily harm to the target or their loved ones via ICT.

Examples of psychological threats involve disparagement, humiliation, disinformation dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyberstalker’s demands. The Internet is a global medium regardless of frontiers, and this creates new possibilities for the growing class of cyberstalkers. Given the Internet is inexpensive and easy to access, distance between cyberstalkers and their targets are no longer a confounding factor. Cyberstalking is both a strategy to target other ICT users and a psychopathology. When Cyberstalking is a tactic, the assailant does not need to be psychiatrically motivated.

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

Cyberbullying

Cyberbullying: Cyberbullying is defined as threatening or disparaging information directed at a target child delivered through Information and Communications Technology (ICT.) Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, embarrass, deprecate & defame a targeted child. Dissimilar to classic bullying, cyberbullying includes a phenomenon called Cyberbullying by proxy. Cyberbullying by proxy is when a cyberbully encourages or persuades other ICT users to engage in deprecating and harassing a target child. Cyberbullying by proxy is a dangerous form of cyberbullying because adults may become accomplices to the cyberbully and may not know they are dealing with a minor or child from their community.

Cyberbullies are usually motivated by a need for peer acceptance and/or power and control. A small percentage of cyberbullies engage in these maladaptive behaviors out of ignorance of the distress they cause a target child. The most malevolent form of cyberbully, feels minimal remorse for the harm they are inflicting upon the target child. It has been speculated that children view the real world and the online or virtual world as part of a seamless continuum. Unable to differentiate reality from virtual reality, victims of cyberbullying can become psychologically devastated and/or cyberbullies themselves.

Internet Troll

Internet Troll: An Internet Troll is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to purposely and actively provoke, defame, anger, tease, flame, or incite other online users. More often than not, the Internet Troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet Trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions. When the Internet Troll’s inflammatory statements and actions do not include a direct or implied physical threat to the target(s), their behavior is categorizes as cyber harassment. If the Troll’s verbal assaults include direct or implied physical threats to their target(s), their actions are then defined as cyberstalking.

The motivations for an Internet Troll’s provocative, and often times, bizarre behaviors are numerous. Despite the variations in modus operandi, the vast majority of Trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice. Although there is no hard evidence or clinical research validating the psychology of the Internet Troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors. Those who have begun to investigate the etiology of the Troll suggest that the anonymity of the internet contributes to what has been called, disinhibition effect. It has been postulated that internet anonymity leads some to behave in asocial ways coupled with a lack of guilt or remorse for the harm they cause not being in the target’s physical presence or even knowing their identity. Provided here is an excellent short video titled, “Psychology of the Internet Troll” created by AcademicEarth.org as follows: http://academicearth.org/electives/psychology-internet-troll/

Dark Psychology

Dark Psychology: Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior. Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time.

It is the remaining 1%, Dark Psychology parts from Adlerian theory and Teleology. Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic. Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.

“Dark Psychology is both a human consciousness construct and study of the human condition as it relates to the psychological nature of people to prey upon others motivated by psychopathic, deviant or psychopathological criminal drives that lack purpose and general assumptions of instinctual drives, evolutionary biology and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology explores criminal, deviant and cybercriminal minds.” Michael Nuccitelli, Psy.D. [2006]

iPredator Condensed Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

  • Title: iPredator and the Dark Side of Cyberspace
  • Show: Truth Frequency Radio with Chris and Sheree Geo
  • Date: Saturday, August 10, 2013, 6-8pm EST, 3-5pm PST
  • Guest: Michael Nuccitelli, Psy.D., iPredator Inc.
  • Live Link: http://truthfrequencyradio.com/includes/popoutplayer.php
  • Show Archive Link: http://truthfrequencyradio.com/category/truthfrequency/
  • Call-Ins Welcome: 213-233-3998

dr.-internet-safety-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.-new-york-internet-safety

dr.-internet-safety-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Pin It on Pinterest