Types of Cyberbullying Sought for 2015 Educational Article

Cyberbullying Tactics & Types of Cyberbullying Sought for 2015 PSA Educational Article-iPredator Image

Types of Cyberbullying

Sought for 2015 PSA Educational Article

Cyberbullying Tactics and Types of Cyberbullying Sought for 2015 PSA Educational Article. 38 2014 Tactics Pasted Below. Below I’ve pasted 38 Cyberbullying Tactics from 2014 and I’m now compiling iPredator’s Cyberbullying Tactics for 2015. Please scan the short definitions list below and comment to this post with new tactics not listed. My goal is to have the “2015 Cyberbullying Tactics” internet safety article available by Thanksgiving.

  • Exclusion: Exclusion is a cyberbullying tactic that is highly effective and directly targets a minor’s developmental need to feel accepted and part of a social construct.
  • Flaming: Flaming is a cyberbullying tactic defined as an online passionate argument that frequently includes profane or vulgar language.
  • Exposure: Exposure is a cyberbullying tactic that includes the public display, posting or forwarding of personal communication, images or video by the cyberbully personal to the target minor.
  • eIntimidation: This is a cyberbully tactic used to inspire fear in the target minor by communicating threats that may be direct or implied using email as the vehicle of communication.
  • Cyber Harassment: Harassment is sending hurtful messages to the target minor that is worded in a severe, persistent or pervasive manner causing the respondent undue concern.
  • Phishing: Phishing is a   that requires tricking, persuading or manipulating the target minor into revealing personal and/or financial information about themselves and/or their loved ones.
  • Impersonation: Impersonation or “imping” as a tactic in cyberbullying can only occur with the “veil of anonymity” offered by Information and Communications Technology.
  • Denigration: Used in both classic and cyberbullying, denigration is a term used to describe when cyberbullies send, post, or publish cruel rumors, gossip and untrue statements about a target minor to intentionally damage their reputation or friendships.
  • Mobile Device Image Sharing: Not only a tactic used in cyberbullying, but a form of information exchange that can be a criminal act if the images are pornographic or graphic enough depicting under aged minors.
  • Non-Consensual Image and Video Dissemination: The usage of images and video as a cyberbullying tactic has become a growing concern that many communities, law enforcement agencies, and schools are taking seriously.
  • Interactive Gaming Harassment: Interactive games on online gaming devices allow minors to communicate by chat and live Internet phone with others they are matched with online.
  • Pornography and Marketing List Insertion: A frustrating and embarrassing tactic committed by cyberbullies is signing the target minor up to numerous pornography and/or junk marketing e-mailing and instant messaging marketing lists.
  • Cyberstalking: Cyberstalking includes threats of harm, intimidation, and/or offensive comments sent through Information and Communications Technology channels.
  • Griefing: Griefing is a term used to describe when a cyberbully habitually and chronically causes frustration to the target minor and his/her peers by not following the rules of an interactive online video game and intentionally disrupting the immersion of another player in their gameplay.
  • Password Theft & Lockout: A cyberbully steals the target minor’s password and begins to chat with other people, pretending to be the target minor (a.k.a. Impersonation.)
  • Web Page Assassination: This is a tactic whereby the cyberbully creates websites that insult or endanger the target minor.
  • Voting & Polling Booth Degradation: Some websites offer online users the opportunity to create online polling/voting booths that are free of charge and easy to post.
  • Bash Boards: Bash Boards are online bulletin boards where minors post anything they choose and frequented by both the cyberbully and target minor’s peer groups and school acquaintances.
  • Trickery: Trickery is a tactic similar to phishing in that a cyberbully purposely tricks a target minor into divulging secrets, private information, and/or embarrassing information about themselves and then publishes that information online.
  • Happy Slapping: Happy Slapping is a relatively new type of cyberbullying that integrates the rapid growth of video online and classic bullying.
  • Text Wars and Text Attacks: Text Wars and Text Attacks are cyberbullying tactics when the cyberbully and a group of his/her accomplices’ gang up on the target minor by sending hundreds of emails or text messages.
  • Malicious Code Dissemination: Sending malicious code is a cyberbullying tactic whereby malicious information is sent intentionally to a target minor to damage or harm their ICT.
  • Warning Wars: Internet Service Providers (ISP) offers a way for consumers to report an online user who is posting inappropriate or abusive information.
  • Screen Name Mirroring: Screen Name Mirroring is a cyberbullying tactic used against a target minor by constructing a screen name or user name that is very similar to the target minor’s name.
  • Cyber Drama: Cyber Drama is a cyberbullying tactic that is a lot more common than extreme cases of cyberbullying. Cyber Drama tends to be gossip that was not supposed to be shared on a blog or a “flame war” that ends after a few messages.
  • Sexting: Sexting is the slang term for the use of a cell phone or other Information and Communications Technologies to distribute images or videos of a sexually explicit nature.
  • Pseudonym Stealth: A pseudonym is a nickname cyberbullies use when they are online as opposed to when offline. They do this to keep their real identity a secret from the target minor.
  • Instant Messaging Attacks: Instant Messaging is a type of communications service that enables online users to create a private chat room with another individual.
  • Cyberbullying by Proxy: Cyberbullying by Proxy is a tactic when a cyberbully encourages or persuades others to engage in deprecating and harassing a target minor.
  • Social Media Cyberbullying: Social Media Cyberbullying is a tactic used by which the cyberbully persuades the target minor to include them in their “friends” or “buddy” lists and then begins to contact the target minor’s friends, peers and loved ones disseminating disparaging information about the target minor.
  • Digital Piracy Inclusion: Digital or Internet Piracy is broadly defined as the illegal reproduction and distribution of copyrighted material on the internet using Information and Communications Technology.
  • Tragedy News Mirroring: Local/National Tragedy Mirroring is a cyberbullying tactic whereby a cyberbully threatens a target minor that he/she will allege that the target minor is planning and preparing to engage in a violent activity directed at the targeted minor’s school or community.
  • Slut Shaming: Slut Shaming is a cyberbullying tactic primarily targeting a female. A form of sexual cyberbullying, Slut Shaming occurs when a cyberbully records images or videos of the target minor that can easily be construed as sexually provocative.
  • Cyber Threats: Cyber Threats is a cyberbullying tactic whereby a cyberbully actively engaged in passive aggressive strategies of informing the target minor that he or she is in danger from unknown or felonious assailants.
  • Trolling: Trolling is the pediatric cyberbullying method of what has been termed, Internet Troll. Internet Trolls are often adults who disparage and harass unidentified online users, but the cyberbullying troll knows the identity of the target minor.
  • Sextortion: Sextortion is a cyberbullying tactic by which minors exploit other minors for sex and/or sexually themed activities in exchange for not disclosing embarrassing and humiliating information about the target minor.
  • Twitter Pooping: Twitter Pooping is a colloquial expression used to define the cyberbullying tactic of using Tweets to disparage and humiliate a target minor.
  • Micro-Visual Cyberbullying: Micro-Visual Cyberbullying is a communication channel that is a future cyberbullying tactic trend.

dr.-internet-safety-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

CAIN – Cyber Attack Investigation Network Volunteers

https://drinternetsafety.com/cain-cyber-attack-investigation/

CAIN

Volunteer Cyber Attack Investigation Network Started

Note: G+ closed April 2019 and CAIN will relocate to other social platforms

CAIN, a volunteer cyber attack investigation network, has been started by iPredator Inc. in Google+. Below is a brief overview about CAIN and the link to the full article is available at the end published at iPredator’s internet safety website.   

CAIN, Cyber Attack Investigation Network, is a group of online users who volunteer their time helping other online users that are cyberstalked, cyberbullied, internet trolled, sexually solicited, cyber harassed, exploited, deceived and defamed. In addition to helping online users, CAIN actively searches for those who meet criteria for iPredator. If the assailant(s) is an iPredator, they are tracked, reported, blocked and monitored until Google+ or the host social networking site deletes and bans their profile.

When the assailant is profiled as being high risk, CAIN members will investigate the assailant outside of Google+ or the host social networking site to assess if they are actively involved in cybercriminal and/or deviant behaviors requiring law enforcement intervention. CAIN also disseminates internet safety and cyber attack prevention information relevant to online users of all ages.

a-cain-cyber-attack-investigation-network-internet-safety-ipredator-social-media-safety-image

CAIN: https://plus.google.com/+IpredatorCoCAIN/posts 

CAIN G+ Community: https://plus.google.com/u/0/communities/107895202001874547216

I created the concept of CAIN, Cyber Attack Investigation Network, in late 2012 to be an adjunct to the iPredator Team. Both were created to help financially strapped & pediatric online users who are abused, exploited and harmed online. Having a plethora of other projects and helping iPredator targets, I was prevented from having the time to focus on launching these groups as planned. iPredator Team and CAIN were scheduled for some time in the near future. iPredator Team description is as follows:

It was not until I met Ms. Tina Connelly (+Tina Connelly) in Google+ that my schedule for CAIN was moved up to October 2014. Interacting with Ms. Connelly in Google+, I was slowly introduced to the online behaviors of the most incredible group of Google+ members who worked in small groups to hunt and identify iPredators.

The most astonishing fact I learned is that they are primarily high school and college aged online users. Ranging from fourteen years old to early twenties, they spend their time searching Google+ for cyberstalkers, cyberbullies, internet trolls, online sexual predator, cyber harassers and online users who use social networking sites to exploit, deceive and defame others. Instead of spending time socializing and networking, like the vast majority of online users who use Google+, they predominantly focus on hunting iPredators.

www.iPredatorInc.com-michael nuccitelli-ipredator-internet safety-cyber safety-yellow text image

a-cain-cyber-attack-investigation-network-internet-safety-ipredator-social-media-safety-image

Once they identify and compile proof of the iPredator’s malevolent and nefarious online activities, they alert their followers, report them to Google+ and then block them. Like a pack of wolves working in unison, they track iPredators until Google+ suspends their profiles or the iPredator cancels their own account not being able to continue in their cyber abuse or online deception.

For anyone who reads this article, I strongly suggest you create a Google+ profile. I cannot recommend enough setting up a profile allowing you to watch the hunters become the hunted. The best metaphor I can use to explain their talents is that of a wolf pack on the hunt for their next meal. Tenacious, coordinated, relentless and innovative best describes their online investigation tactics. In the realm of humility, I have yet to see one of them brag or target online users fueled by retribution or envy. They do not ask to be paid, recognized or thanked by Google for the valuable service they provide Google+ members and all online users. It is time for them to be recognized and this why I have accelerated CAIN’s introduction.

a-cain-cyber-attack-investigation-network-internet-safety-ipredator-social-media-safety-image

CAIN

CAIN, the Cyber Attack Investigation Network, officially was born October 30, 2014 with a handful of members. Our goal is to increase one thousand fold by the same time next year, October 30, 2015. Membership is free and CAIN accepts any online user interested in helping to make Google+ and the internet a safer environment. Anyone can follow our Google+ page and request to join our private CAIN G+ Community.

a-cain-cyber-attack-investigation-network-internet-safety-ipredator-social-media-safety-image

2015 CAIN MEMBER GUIDELINES

CAIN (Cyber Attack Investigation Network) is a volunteer group of online users who help other online users that are cyberstalked, cyberbullied, internet trolled, sexually solicited, cyber harassed, exploited and defamed. In addition to helping online users, CAIN actively searches for those who meet criteria for iPredator. If the assailant(s) is an iPredator, they are reported, blocked and monitored until G+ deletes and bans their profile. If the assailant is profiled as being high risk, iPredator Inc. will investigate the assailant outside of G+ to assess if they are actively involved in cybercriminal and/or deviant behaviors requiring law enforcement intervention. CAIN also disseminates internet safety and cyber attack prevention information relevant to online users of all ages.

  • Please make sure the G+ User to be reported, blocked and tracked has breached the G+ User Content and Conduct Policy.

Link: https://www.google.com/intl/en-US/+/policy/content.html

  • If the G+ User has a fake profile, please make sure the profile is engaging in abusive behaviors.
  • Please provide at least one bullet point as to the rationale for CAIN members to report and block the G+ User.
  • Please respect other G+ User’s freedom of speech, opinions, religious preferences and interests. For example, a Satanist, Troll or Fake G+ User is not reported unless they breach the G+ User Content and Conduct Policy.
  • Please do not request a G+ User be reported, blocked and tracked if you have a disagreement with that G+ User.
  • Please do not request a G+ User be reported, blocked and tracked if they have a fake profile, but are not breaching Google Plus’s User Content and Conduct Policy.
  • Please do not request a G+ User be reported, blocked and tracked if they post images or videos that are not graphic, obscene or perverse.
  • Please provide a clickable G+ User profile URL when requesting they be reported, blocked and reported.
  • G+ Users can only be reported, blocked and tracked from the CAIN G+ Community.
  • When reporting a G+ User, please provide a reason so other CAIN members know what to choose when reporting a G+ User.
  • Please do not engage in online deception, impersonation or entrapment unless approved by CAIN’s owner, Michael Nuccitelli, Psy.D.
  • As a CAIN member, please make an effort to report, block and +1 other CAIN member’s posts.

Note: CAIN is owned by iPredator Inc. and NYS licensed psychologist Michael Nuccitelli, Psy.D. CAIN is a volunteer group of online users, who disseminate internet safety themed information and report other online users who breach the social networking site’s Content and Conduct Policy & Terms of Use. Dr. Nuccitelli can be reached by calling 347-871-2416, by email him at drnucc@ipredatorinc.com  or using iPredator’s internet safety website’s Contact Us form uploaded in the “Links” section of the CAIN Community. If you’re here at our site, feel free to write us by clicking this Contact Us hyperlink.

a-cain-cyber-attack-investigation-network-internet-safety-ipredator-social-media-safety-image

dr.-internet-safety-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

 

Pin It on Pinterest