Internet Safety Images by Michael Nuccitelli, Psy.D.

michael-nuccitelli-justice-logo

Internet Safety Images

by

Michael Nuccitelli, Psy.D.

You and I may not feel it, but we are all at the beginning of the Information Age. Like a double edged sword, the advantages and disadvantages of Information and Communications Technology are clear. If someone says to me again, “Dr. Nuccitelli, what do you want us to do, turn off the internet?”, I think I will throw my digital devices out the window. For the record, I love cyberspace and grateful for its many benefits. What I don’t understand is how little is being done to teach children and the rest of society about the dark side of cyberspace and the typologies of iPredator.

At times, it feels like society has buried its head in the sand in relationship to internet safety and cyber attack prevention. It is truly unfortunate that the vast majority of online users do not pay attention to information security and cyber attack prevention until they, their loved ones or wallet are cyber attacked. Not only do I think basic internet safety, Digital Citizenship and how to conduct oneself in cyberspace be taught in schools, but it should be a national priority. For now, the best we can do, for those of us who give a damn, is to encourage awareness.

To achieve this aim, pasted below are twenty images and quotes to help think about how to protect yourself, loved ones and business. All the images are free to download, share and edit for educational purposes. For most devices, simply right click on the image and click “save as” to download to your device. No personal information or email address is required to print out or save. I present you my novice graphic design skills and philosophical ramblings.

michael-nuccitelli-cyberbullying

Cyberbullying

“Classic bullying attacks a child’s physical attributes, minority status and vulnerabilities. Cyberbullying does the same, but uses information technology in a relentless manner to devastate a child.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-cyberstalker

Cyberstalker

“In order to become a cyberstalker, one must either feel rejected, angry, powerful or misunderstood.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-cyberspace

Cyberspace

“If you spend too much time in cyberspace without calm, you are bound to project your insecurities and skewed perceptions upon others.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-online-psychopaths

Online Psychopaths

“If an online user is quick to judge, shameless and defines him or herself as an expert before being honored as one; they are quite possibly a psychopath.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-dark-side-of-cyberspace

Dark Side of Cyberspace

“The dark side of cyberspace is the manifestation of, and theatre for, the dark side of human consciousness using information technology as the stage.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-cyber-attacks

Cyber Attacks

“For those who spend time, energy and resources cyber attacking others, they are either ideologically driven, cloaking their past or a combination of both.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-cybercriminal-minds

Cybercriminal Minds

“Cyberspace allows our darkest fantasies to be fueled by the likeminded. Once validated, they are one step closer to becoming reality.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-cyberbullied

Cyberbullied

The cyberbullied child is at a higher risk of harming themselves or others when primary caregivers are ignorant to the power information technology has upon their psyche.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-online-predators

Online Predators

“Online predators target children to fulfill deviant fantasies or for child pornography profit. What they fail to realize is that in cyberspace, law enforcement and proactive citizens are waiting to deliver justice.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-veil-of-anonymity

Veil of Anonymity

“Given the veil of anonymity is easily worn in cyberspace, accountability evaporates for the online assailant (aka, iPredator).”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-information

Information

“Soon, information will become the most lethal & feared weapon. More valuable than diamonds and intoxicating like morphine.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-predatory-trolls

Predatory Trolls

“If not dealt with, the predatory type of internet troll will lead judicial systems of all nations to make online defamation a criminal act.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-cybercrime

Cybercrime

“The Internet of Things (aka, IoT) is just around the corner with cybercrime and privacy being the two greatest digital hurdles for machine-to-machine communications.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-online-harassment

Online Harassment

“Online harassment is peppered with victim blaming for the target and self-satisfaction for the assailant.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-dark-psychology

Dark Psychology

“Although I thought my Dark Psychology construct involved criminal, deviant and cybercriminal minds, I must now accept that cyberspace has become an extension of human consciousness and a realm for all dark fantasies.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-cyber-terrorism

Cyber Terrorism

“When information becomes the most lethal & feared weapon, cyber terrorism will be a priority for all nations.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-cyberstalking

Cyberstalking

“Different than online surveillance and monitoring, cyberstalking is fear personified for online users, their loved ones and lifestyle.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-cyberstealth

Cyberstealth

“Cyberstealth is not just one of three criteria used to determine if an online user is an iPredator. It is the digital application of Sun Tzu’s “Art of War” reference to deception.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-information-age-wellness

Information Age Wellness

“Mind, body and spirit use to be the triad for the holistic and wellness approach. Now? Information technology is the proverbial new kid on the block.”

Michael Nuccitelli, Psy.D.

michael-nuccitelli-troll-triad

Troll Triad

Troll Triad was originally written to protect myself from character assassination by three adult online users. The Cerebral, Provocateur and Crier archetypes may in fact apply to task functions in all gangstalking and internet troll groups.”

Michael Nuccitelli, Psy.D.

dr.-internet-safety-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

iPredator Information Age Education Concept Page Updated

ipredator-information-age-education-dr.-internet-safety-michael-nuccitelli-psy.d.-image

iPredator

Information Age Education Concept Updated

Information Age Education (IAE) is an internet safety and cyber attack prevention concept I authored last year to encourage educators, parents and all online users to consider adapting when they use Information and Communications Technology. With the growth of cyberbullying, cyberstalking, online sexual predation and other darkside of cyberspace assailants, IAE introduces a three-pronged educational solution for consideration.

Recently updated and provided below is the search result and link to our iPredator Information Age Education (IAE) page. At the base of the IAE webpage, click on the blue fingerprint image to download the PDF article. I’ve also uploaded new Information Age Education images to download at no cost or having to provide an email address. To download images, click on the image, right click and hit “save as” to save to your desktop or a file folder. If this is your first time Dr. Internet Safety, below is a brief description of Dr. Internet Safety, iPredator, iPredator Inc. and myself, Michael Nuccitelli, Psy.D.

  • Information Age Education-Cyber Attack Prevention
  • Visit iPredator’s Information Age Education page to download, at no cost, Dr. Nuccitelli’s family values, prevention education & humility concept article.
  • https://www.ipredator.co/information-age-education/

Information Age Education (IAE): Information Age Education (IAE) is a cyber attack prevention paradigm offering a resolution to reducing the negative consequences of living in the Information Age. Information and Communications Technology presents positive and negative influences upon humanity, in which the negative aspects grow at a feverish pace. Cyberbullying, cyberstalking and online sexual predation are just a few of these destructive forces. IAE prioritizes prevention education, non-denominational family values, and humility as solutions to connecting the disconnected, educating the ignorant, and conquering the corrupt. IAE is an educational concept, not just for children of the Information Age, but all online users.

ipredator-information-age-education-dr.-internet-safety-michael-nuccitelli-psy.d.-image

DR. INTERNET SAFETY

Dr. Internet Safety: Dr. Internet Safety (aka, Doc iSafety) is an abstract pediatric internet safety character that educates tweens, teens and adult caregivers about cyberbullying, cyber harassment and cyberstalking prevention, online sexual predator identification, cyber security, the dark side of cyberspace, internet addiction and developmentally appropriate iPredator concepts. Dr. Internet Safety is Developmental Psychology and adolescent maturation savvy in relationship to Information Age tweens and teens.

Dr. Internet Safety accepts and communicates to children supporting their perceptual distortion of viewing themselves as being more technology, social media and cyber safety skilled than their adult counterparts. From a societal standpoint, Dr. Internet Safety seeks to make all K-12 educational systems include internet safety classes compulsory for all American school districts. Furthermore, Dr. Internet Safety has graduate level experience in iPredator profiling, online deception, internet addiction and iPredator Inc.’s Information Age Education concept of humility, prevention education and non-denominational family values as being vital to children of the Information Age. To help Dr. Internet Safety teach young children about internet safety, he relies upon the help from iPredator Inc.’s internet safety characters, Cyber Tyger and Troll Man. Created for young children, K-5, Dr. Internet Safety knows Cyber Tyger vs. Troll Man is an exceptional educational tool.

“Unlike traditional human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to the data available.” Michael Nuccitelli, Psy.D. (2011)

ipredator-information-age-education-dr.-internet-safety-michael-nuccitelli-psy.d.-image

IPREDATOR

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

ipredator-information-age-education-dr.-internet-safety-michael-nuccitelli-psy.d.-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

ipredator-information-age-education-dr.-internet-safety-michael-nuccitelli-psy.d.-image

Types of Cyberbullying Sought for 2015 Educational Article

Cyberbullying Tactics & Types of Cyberbullying Sought for 2015 PSA Educational Article-iPredator Image

Types of Cyberbullying

Sought for 2015 PSA Educational Article

Cyberbullying Tactics and Types of Cyberbullying Sought for 2015 PSA Educational Article. 38 2014 Tactics Pasted Below. Below I’ve pasted 38 Cyberbullying Tactics from 2014 and I’m now compiling iPredator’s Cyberbullying Tactics for 2015. Please scan the short definitions list below and comment to this post with new tactics not listed. My goal is to have the “2015 Cyberbullying Tactics” internet safety article available by Thanksgiving.

  • Exclusion: Exclusion is a cyberbullying tactic that is highly effective and directly targets a minor’s developmental need to feel accepted and part of a social construct.
  • Flaming: Flaming is a cyberbullying tactic defined as an online passionate argument that frequently includes profane or vulgar language.
  • Exposure: Exposure is a cyberbullying tactic that includes the public display, posting or forwarding of personal communication, images or video by the cyberbully personal to the target minor.
  • eIntimidation: This is a cyberbully tactic used to inspire fear in the target minor by communicating threats that may be direct or implied using email as the vehicle of communication.
  • Cyber Harassment: Harassment is sending hurtful messages to the target minor that is worded in a severe, persistent or pervasive manner causing the respondent undue concern.
  • Phishing: Phishing is a   that requires tricking, persuading or manipulating the target minor into revealing personal and/or financial information about themselves and/or their loved ones.
  • Impersonation: Impersonation or “imping” as a tactic in cyberbullying can only occur with the “veil of anonymity” offered by Information and Communications Technology.
  • Denigration: Used in both classic and cyberbullying, denigration is a term used to describe when cyberbullies send, post, or publish cruel rumors, gossip and untrue statements about a target minor to intentionally damage their reputation or friendships.
  • Mobile Device Image Sharing: Not only a tactic used in cyberbullying, but a form of information exchange that can be a criminal act if the images are pornographic or graphic enough depicting under aged minors.
  • Non-Consensual Image and Video Dissemination: The usage of images and video as a cyberbullying tactic has become a growing concern that many communities, law enforcement agencies, and schools are taking seriously.
  • Interactive Gaming Harassment: Interactive games on online gaming devices allow minors to communicate by chat and live Internet phone with others they are matched with online.
  • Pornography and Marketing List Insertion: A frustrating and embarrassing tactic committed by cyberbullies is signing the target minor up to numerous pornography and/or junk marketing e-mailing and instant messaging marketing lists.
  • Cyberstalking: Cyberstalking includes threats of harm, intimidation, and/or offensive comments sent through Information and Communications Technology channels.
  • Griefing: Griefing is a term used to describe when a cyberbully habitually and chronically causes frustration to the target minor and his/her peers by not following the rules of an interactive online video game and intentionally disrupting the immersion of another player in their gameplay.
  • Password Theft & Lockout: A cyberbully steals the target minor’s password and begins to chat with other people, pretending to be the target minor (a.k.a. Impersonation.)
  • Web Page Assassination: This is a tactic whereby the cyberbully creates websites that insult or endanger the target minor.
  • Voting & Polling Booth Degradation: Some websites offer online users the opportunity to create online polling/voting booths that are free of charge and easy to post.
  • Bash Boards: Bash Boards are online bulletin boards where minors post anything they choose and frequented by both the cyberbully and target minor’s peer groups and school acquaintances.
  • Trickery: Trickery is a tactic similar to phishing in that a cyberbully purposely tricks a target minor into divulging secrets, private information, and/or embarrassing information about themselves and then publishes that information online.
  • Happy Slapping: Happy Slapping is a relatively new type of cyberbullying that integrates the rapid growth of video online and classic bullying.
  • Text Wars and Text Attacks: Text Wars and Text Attacks are cyberbullying tactics when the cyberbully and a group of his/her accomplices’ gang up on the target minor by sending hundreds of emails or text messages.
  • Malicious Code Dissemination: Sending malicious code is a cyberbullying tactic whereby malicious information is sent intentionally to a target minor to damage or harm their ICT.
  • Warning Wars: Internet Service Providers (ISP) offers a way for consumers to report an online user who is posting inappropriate or abusive information.
  • Screen Name Mirroring: Screen Name Mirroring is a cyberbullying tactic used against a target minor by constructing a screen name or user name that is very similar to the target minor’s name.
  • Cyber Drama: Cyber Drama is a cyberbullying tactic that is a lot more common than extreme cases of cyberbullying. Cyber Drama tends to be gossip that was not supposed to be shared on a blog or a “flame war” that ends after a few messages.
  • Sexting: Sexting is the slang term for the use of a cell phone or other Information and Communications Technologies to distribute images or videos of a sexually explicit nature.
  • Pseudonym Stealth: A pseudonym is a nickname cyberbullies use when they are online as opposed to when offline. They do this to keep their real identity a secret from the target minor.
  • Instant Messaging Attacks: Instant Messaging is a type of communications service that enables online users to create a private chat room with another individual.
  • Cyberbullying by Proxy: Cyberbullying by Proxy is a tactic when a cyberbully encourages or persuades others to engage in deprecating and harassing a target minor.
  • Social Media Cyberbullying: Social Media Cyberbullying is a tactic used by which the cyberbully persuades the target minor to include them in their “friends” or “buddy” lists and then begins to contact the target minor’s friends, peers and loved ones disseminating disparaging information about the target minor.
  • Digital Piracy Inclusion: Digital or Internet Piracy is broadly defined as the illegal reproduction and distribution of copyrighted material on the internet using Information and Communications Technology.
  • Tragedy News Mirroring: Local/National Tragedy Mirroring is a cyberbullying tactic whereby a cyberbully threatens a target minor that he/she will allege that the target minor is planning and preparing to engage in a violent activity directed at the targeted minor’s school or community.
  • Slut Shaming: Slut Shaming is a cyberbullying tactic primarily targeting a female. A form of sexual cyberbullying, Slut Shaming occurs when a cyberbully records images or videos of the target minor that can easily be construed as sexually provocative.
  • Cyber Threats: Cyber Threats is a cyberbullying tactic whereby a cyberbully actively engaged in passive aggressive strategies of informing the target minor that he or she is in danger from unknown or felonious assailants.
  • Trolling: Trolling is the pediatric cyberbullying method of what has been termed, Internet Troll. Internet Trolls are often adults who disparage and harass unidentified online users, but the cyberbullying troll knows the identity of the target minor.
  • Sextortion: Sextortion is a cyberbullying tactic by which minors exploit other minors for sex and/or sexually themed activities in exchange for not disclosing embarrassing and humiliating information about the target minor.
  • Twitter Pooping: Twitter Pooping is a colloquial expression used to define the cyberbullying tactic of using Tweets to disparage and humiliate a target minor.
  • Micro-Visual Cyberbullying: Micro-Visual Cyberbullying is a communication channel that is a future cyberbullying tactic trend.

dr.-internet-safety-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Slut Shaming – A New iPredator Cyberbullying Tactic

cyberbullying-cyberbullying-tactic-michael-nuccitelli-ipredator-bullying-internet safety image

Slut Shaming

A New iPredator Cyberbullying Tactic

As this writer has a Google Alert for cyberbullying among many other criminal, forensic, & cybercriminal terms, an alert link led to a great blog called “Bell Tolling.” The author’s post titled “Cyberbullying: “Shaming,” Suffering, and Social ill” was awesome & brutally poignant.

Cyberbullying is largely understudied and unfortunately growing faster than our understanding can compete with to construct viable and effective interventions, laws, and policies. Yet still, the social, emotional, verbal, and psychological abuses that comprise cyberbullying are unconscionable. Taylor Whitten Blog: Bell Tolling (2013)

The author’s post led to the NPR coverage of a new tactic being used in cyberbullying. It is called “Slut Shaming” and this writer has updated his 2013 Cyberbullying Tactics list to include this tactic of focused humiliation.

For those interested in hearing the coverage, be sure to listen to the 8 minute recorded audio. This is just 1 small example how mobile digital technology (images & video) is changing all typologies of iPredator attack strategies. And of course, children of the Information Age will continue to lead the pack devising innovative ways to psychologically devastate their peers.

NPR Link: http://www.npr.org/2013/01/07/168812354/online-shaming-a-new-level-of-cyberbullying-for-girls

33. Slut Shaming: A cyberbullying tactic best described as the social media equivalent of a “Scarlet Letter.” Slut Shaming is the tactic of posting and/or making public sexually graphic and provocative images or videos of young women online. This cyberbullying tactic is solely focused on humiliating the target female child via social networking sites.

Provided here is the 2013 tactics list link to Dark Psychology. To print or save in PDF, simply go to the base of the article and click on the green print/pdf button. If you do visit the tactics article, please Google +1 & share with other parents & educators.

2014 Cyberbullying Tactics Link

https://www.ipredator.co/cyberbullying-tactics/

Online Child Pornography-iPredator-Michael Nuccitelli-iPredator Inc.-Internet Safety-Online Safety-Image

iPredator Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

cyberbullying-cyberbullying-tactic-michael-nuccitelli-ipredator-bullying-internet safety image

dr.-internet-safety-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Cyber Tyger: Internet Safety for Kids & Who is Cyber Tyger?

Cyber Tyger

a-cyber-tyger-troll-man-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dr.-internet-safety-image

Pediatric Internet Safety Super Hero

Cyber Tyger is Pediatric Internet Safety Superhero, Internet Safety Character and is the archenemy to the Internet Troll super villain; Troll Man. Cyber Tyger and Troll Man were created by Michael Nuccitelli, Psy.D, a NYS licensed psychologist, forensic psychology consultant and author of the darkside of cyberspace construct called iPredator. Provided below is a brief definition and overview of Cyber Tyger and Troll Man. As superhero and villain characters, Cyber Tyger and Troll Man were designed to introduce Internet Safety, Information Age Educational concepts and Netiquette to young children K-6.

“Take a Megabyte out of Cybercrime”

Cyber Tyger (aka, Cybr Tygrrr!) is a young white tiger superhero who protects young kids online (K-6). Cyber Tyger helps protect kids from cyberbullies and the dangers of cyberspace. When he was born, the doctors used digital technology to help his mother’s birth, which gave him super cyber powers. Cyber Tyger and his adversaries, including his archenemy Troll Man, were originally conceived in 2011 to educate young kids about internet safety and cyber attack prevention. At present, Troll Man & Cyber Tyger remains as concepts with everything but final character designs. Once graphic designs of Cyber Tyger, Troll Man and other related characters have been created, they will be ready for online and offline publication. iPredator Inc. plans on offering these characters, at no cost, to elementary schools, parents and primary caregivers.

Whereas Cyber Tyger’s hero, McGruff the crime dog says, “Take a Bite out of Crime“, Cyber Tyger’s motto is “Take a Megabyte out of Cybercrime.” Until iPredator Inc. creates his own website, information about Cyber Tyger can be accessed at his iPredator website page, https://www.ipredator.co/cyber-tyger/, or his own domain that redirects to his page as well. (www.CyberTyger.org). Feel free to read or download, at no cost, a brief history of Cyber Tyger and visit his board to download images at iPredator Inc.’s Pinterest account. http://www.pinterest.com/ipredator/cyber-tyger/

a-cyber-tyger-troll-man-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dr.-internet-safety-image

Troll Man

Troll Man is a pediatric internet troll villain, internet safety character, online scoundrel and enemy of the internet safety superhero, Cyber Tyger, for children (K-6). Cyber Tyger and his adversaries, including Troll Man’s profile, were originally conceived in 2011 as a means to educate young children about internet safety and cyber attack prevention. As a Cyborg with digital powers, Troll Man travels through cyberspace cheating, lying and stealing from online users. Once a child opens his iTroll email attachments, they cannot escape unless helped by Cyber Tyger. Troll Man is most dangerous when using his shape shifting powers for online deception. At present, Troll Man & Cyber Tyger remains as concepts with everything but final character designs. Once graphic designs of Cyber Tyger, Troll Man and other related characters have been created, they will be ready for online and offline publication.

iPredator Inc. plans on offering these characters, at no cost, to elementary schools, parents and primary caregivers. Until iPredator Inc. creates his own website, information about Troll Man can be accessed at his iPredator page, https://www.ipredator.co/troll-man/, or his own domain that redirects to his page as well. http://www.TrollMan.org. Feel free to read or download, at no cost, a brief history of Troll Man below and visit his board to download images at iPredator Inc.’s Pinterest account. http://www.pinterest.com/ipredator/troll-man/

a-cyber-tyger-troll-man-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dr.-internet-safety-image

Note: Cyber Tyger and Troll Man are internet safety characters that have changes names, histories, appearances and back-stories multiple times since 2011. Initially, Cyber Tyger was a white panther and Troll Man resembled the Joker character from Batman. Until this writer and his associates all agree upon their final presentation best suited for young children, there is a good chance minor changes will be discussed. iPredator Inc.’s goal is to have final vector images by Spring 2015 with public availability for all online users at no cost. If the reader is adept at graphic design or knows a professional who would be an excellent participant, iPredator Inc. would be thankful to contact us with ideas.

iPredator Inc.’s internet safety themed content and images are public domain and free to download at no cost or requiring contact information. However, iPredator Inc. does not allow plagiarism or claims that parties other than iPredator Inc. are the authors. All concepts, constructs and commercial products offered at iPredator Inc.’s websites, sister blogs and social networking sites are protected by copyright and the intellectual property of Dr. Nuccitelli and iPredator Inc.

  • Cyber Tyger | Pediatric Internet Safety Super Hero
  • Visit iPredator’s Cyber Tyger webpage to review or download, at no cost, information about the pediatric internet safety super hero called Cyber Tyger.
  • Link: https://www.ipredator.co/cyber-tyger/
  • Troll Man | Pediatric Internet Troll Super Villain 
  • Visit iPredator’s Troll Man webpage to review or download, at no cost, information about the pediatric internet troll super villain called Troll Man.
  • Link:https://www.ipredator.co/troll-man/

a-cyber-tyger-troll-man-michael-nuccitelli-ipredator-authored-internet-safety-copywritten-dr.-internet-safety-image

  • Copyright © 2014. iPredator Inc., All Rights Reserved.
  • Troll Man:  U.S. Copyright  #1-1796196711
  • Cyber Tyger:  U.S. Copyright  #1-1825203061

dr.-internet-safety-michael-nuccitelli-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Cyber Harassment: Internet Trolls, Online Deception & iPredator

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

Cyber Harassment

Internet Trolls, Online Deception & iPredator

Visit iPredator Inc.’s “Cyber Harassment” page to review or download, at no cost, information on cyber harassment, cyber abuse, defamation and trolls. If preferring not to visit the iPredator parent site, below are definitions for Cyber Harassment, Online Deception, iPredator, iPredator Bridge & Internet Trolls.

Cyberstealth is defined as a method and/or strategy by which a child, adult, group or nation uses Information and Communications Technology (ICT) to establish and sustain complete anonymity while they troll, stalk and attack their target(s). To ensure successful anonymity, Cyberstealth employs Online Deception, Social Engineering and Disinformation to distract and confuse their target(s). Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators (aka, Online Assailants) range from negligible to highly complex and multi-faceted.” Michael Nuccitelli, Psy.D. (2014)

Cyber Harassment:Cyber Harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, Cyber Harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber Harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target.

Although Cyber Harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber Harassment differs from cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include a constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation becomes more vulnerable to corruption. As anonymity via the Internet becomes more feasible, Cyber Harassment continues to flourish. Cyber Harassment is the adult form of cyberbullying to a minor.

Internet Troll: An Internet Troll is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to purposely and actively provoke, defame, anger, tease, flame, or incite other online users. More often than not, the Internet Troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet Trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions. When the Internet Troll’s inflammatory statements and actions do not include a direct or implied physical threat to the target(s), their behavior is categorizes as cyber harassment. If the Troll’s verbal assaults include direct or implied physical threats to their target(s), their actions are then defined as cyberstalking.

The motivations for an Internet Troll’s provocative, and often times, bizarre behaviors are numerous. Despite the variations in modus operandi, the vast majority of Trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice. Although there is no hard evidence or clinical research validating the psychology of the Internet Troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors. Those who have begun to investigate the etiology of the Troll suggest that the anonymity of the internet contributes to what has been called, disinhibition effect. It has been postulated that internet anonymity leads some to behave in asocial ways coupled with a lack of guilt or remorse for the harm they cause not being in the target’s physical presence or even knowing their identity.

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasserinternet trollcybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  1.  A self-awareness of causing harm to others, directly or indirectly, using ICT.
  2. The usage of ICT to obtain, tamper with, exchange and deliver harmful information
  3. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology [ICT] to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not initially driven by criminal, malevolent or deviant endeavors, iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this realm and either proceed in their maladaptive trajectory or cease and desist.

Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.

iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung [1875-1961] and his construct of the Collective Unconscious.

“The Information Age technocentric concept of being “connected” is actually a paradox of disconnection causing us to lose our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology [ICT] grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than realty based relationships.” Michael Nuccitelli, Psy.D. (2014)

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called online deception. Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, Online Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age Deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Online Deception, [aka, Cyberstealth, Disinformation]: Unlike classic deception used by traditional criminals and deviants, Disinformation [aka, Online Deception, Cyberstealth] completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Disinformation and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Disinformation includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. Disinformation does not require an ICT user to engage in nefarious, deviant or malevolent activities. Although all forms of deception are problematic, Disinformation can be as subtle of what many call a “white lie.”

Another difference is when iPredators use Cyberstealth to hide their identity from victims. In general, iPredators use Cyberstealth when their actions involve illegal activities and hiding their identity is paramount to reduce being identified, apprehended and prosecuted. ICT users who evaluate their odds of being identified, develop tactics and strategies to minimize identification are motivated by criminal, deviant & harmful causes are iPredators using Cyberstealth.

“Whether used to influence the masses or in cyberspace to persuade others into divulging confidential or sensitive information, social engineering requires psychological manipulation to control a person, group or nation. In the Information Age, children can be just as effective at social engineering as adults and cause driven groups.” Michael Nuccitelli, Psy.D. (2014)

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dr.-internet-safety-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

 

Pin It on Pinterest