A New iPredator Cyberbullying Tactic
As this writer has a Google Alert for cyberbullying among many other criminal, forensic, & cybercriminal terms, an alert link led to a great blog called “Bell Tolling.” The author’s post titled “Cyberbullying: “Shaming,” Suffering, and Social ill” was awesome & brutally poignant.
“Cyberbullying is largely understudied and unfortunately growing faster than our understanding can compete with to construct viable and effective interventions, laws, and policies. Yet still, the social, emotional, verbal, and psychological abuses that comprise cyberbullying are unconscionable.” Taylor Whitten Blog: Bell Tolling (2013)
The author’s post led to the NPR coverage of a new tactic being used in cyberbullying. It is called “Slut Shaming” and this writer has updated his 2013 Cyberbullying Tactics list to include this tactic of focused humiliation.
For those interested in hearing the coverage, be sure to listen to the 8 minute recorded audio. This is just 1 small example how mobile digital technology (images & video) is changing all typologies of iPredator attack strategies. And of course, children of the Information Age will continue to lead the pack devising innovative ways to psychologically devastate their peers.
33. Slut Shaming: A cyberbullying tactic best described as the social media equivalent of a “Scarlet Letter.” Slut Shaming is the tactic of posting and/or making public sexually graphic and provocative images or videos of young women online. This cyberbullying tactic is solely focused on humiliating the target female child via social networking sites.
Provided here is the 2013 tactics list link to Dark Psychology. To print or save in PDF, simply go to the base of the article and click on the green print/pdf button. If you do visit the tactics article, please Google +1 & share with other parents & educators.
2014 Cyberbullying Tactics Link
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.
Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
- A self-awareness of causing harm to others, directly or indirectly, using ICT.
- The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
- A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
Michael Nuccitelli, Psy.D.
Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.
In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at firstname.lastname@example.org.
- LinkedIn Page: iPredator
- LinkedIn: Michael Nuccitelli, Psy.D.
- Twitter: #iPredator
- Facebook Page: The iPredator
- Facebook: Michael Nuccitelli
- Pinterest: iPredator
- Tumblr: iPredator