ONLINE DECEPTION REVIEW
CYBERSTEALTH & DISINFORMATION
Disinformation [aka, Online Deception, Cyberstealth]: Unlike classic deception used by traditional criminals and deviants, Disinformation [aka, Online Deception, Cyberstealth] completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Disinformation and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Disinformation includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. Disinformation does not require an ICT user to engage in nefarious, deviant or malevolent activities. Although all forms of deception are problematic, Disinformation can be as subtle of what many call a “white lie.”
Another difference is when iPredators use Cyberstealth to hide their identity from victims. In general, iPredators use Cyberstealth when their actions involve illegal activities and hiding their identity is paramount to reduce being identified, apprehended and prosecuted. ICT users who evaluate their odds of being identified, develop tactics and strategies to minimize identification are motivated by criminal, deviant & harmful causes are iPredators using Cyberstealth.
Online Deception Warning Signs Checklist (IBWSC): Based on the iPredator Bridge construct, the Online Deception Warning Signs Checklist is a 50 item checklist designed to investigate if a loved one, colleague or peer is participating in or close to participating in harmful online and/or ICT activities towards others. Multiple affirmative responses to IBWSC statements suggests the person being queried exhibits patterned and/or observable behavioral patterns indicating they may be engaged in online deceptive activities. The IBWSC focuses on confirmed behavioral observations and not upon personal convictions and/or philosophical reasons for harming others online or using ICT.
Based on iPredator Bridge construct, the IBWSC assumes there are both people engaged in nefarious and malevolent activities and those engaged in harming others driven by distorted beliefs they are doing so for righteous and/or morally supported reasons. The common thread identical in both segments is the victims they target suffer from their attacks. The IBWSC has not been validated by clinical research, a governing body or academic institution. It has been compiled and published to be a point of reference to educate and assist anyone who is concerned that they, their children, business or community are in the presence of an iPredator or someone in transit to becoming an iPredator.
Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called online deception. Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.
Unlike classic deception used by traditional criminals and deviants, Online Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age Deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.
“Whether used to influence the masses or in cyberspace to persuade others into divulging confidential or sensitive information, social engineering requires psychological manipulation to control a person, group or nation. In the Information Age, children can be just as effective at social engineering as adults and cause driven groups.” Michael Nuccitelli, Psy.D. (2014)
Michael Nuccitelli, Psy.D.
Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.
In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at firstname.lastname@example.org.
- LinkedIn Page: iPredator
- LinkedIn: Michael Nuccitelli, Psy.D.
- Twitter: #iPredator
- Facebook Page: The iPredator
- Facebook: Michael Nuccitelli
- Pinterest: iPredator
- Tumblr: iPredator