Online Deception Checklist-Michael Nuccitelli, Psy.D.

 Online Deception Checklist

Michael Nuccitelli, Psy.D.

cyber-deception-online-deception-online-deception-warning-signs-checklist-ipredator-dark-paychology-internet-safety-image

Online Deception

Visit iPredator’s Cyber Deception page to download, at no cost, their free cyber deception warning signs checklist for assessing online deceptive activities. https://www.ipredator.co/cyber-deception-checklist/

Online Deception Warning Signs Checklist (IBWSC): Based on the iPredator Bridge construct, the Online Deception Warning Signs Checklist is a 50 item checklist designed to investigate if a loved one, colleague or peer is participating in or close to participating in harmful online and/or ICT activities towards others. Multiple affirmative responses to IBWSC statements suggests the person being queried exhibits patterned and/or observable behavioral patterns indicating they may be engaged in online deceptive activities. The IBWSC focuses on confirmed behavioral observations and not upon personal convictions and/or philosophical reasons for harming others online or using ICT.

Based on iPredator Bridge construct, the IBWSC assumes there are both people engaged in nefarious and malevolent activities and those engaged in harming others driven by distorted beliefs they are doing so for righteous and/or morally supported reasons. The common thread identical in both segments is the victims they target suffer from their attacks. The IBWSC has not been validated by clinical research, a governing body or academic institution. It has been compiled and published to be a point of reference to educate and assist anyone who is concerned that they, their children, business or community are in the presence of an iPredator or someone in transit to becoming an iPredator.

Online Deception Checklist-Michael Nuccitelli, Psy.D.

iPredator

iPredator:A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT.
II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

cyber-deception-online-deception-online-deception-warning-signs-checklist-ipredator-dark-paychology-internet-safety-image

iPredator Bridge

iPredator Bridge:  iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology [ICT] to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not initially driven by criminal, malevolent or deviant endeavors,

iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this realm and either proceed in their maladaptive trajectory or cease and desist.

Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors. iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung [1875-1961] and his construct of the Collective Unconscious.

“The Information Age technocentric concept of being “connected” is actually a paradox of disconnection causing us to lose our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology [ICT] grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than realty based relationships.” Michael Nuccitelli, Psy.D. (2014)

cyber-deception-online-deception-online-deception-warning-signs-checklist-ipredator-dark-paychology-internet-safety-image

Dr. Internet Safety: Dr. Internet Safety (aka, Doc iSafety) is an abstract pediatric internet safety character that educates tweens, teens and adult caregivers about cyberbullying, cyber harassment and cyberstalking prevention, online sexual predator identification, cyber security, the dark side of cyberspace, internet addiction and developmentally appropriate iPredator concepts. Dr. Internet Safety is Developmental Psychology and adolescent maturation savvy in relationship to Information Age tweens and teens.

Dr. Internet Safety accepts and communicates to children supporting their perceptual distortion of viewing themselves as being more technology, social media and cyber safety skilled than their adult counterparts. From a societal standpoint, Dr. Internet Safety seeks to make all K-12 educational systems include internet safety classes compulsory for all American school districts. Furthermore, Dr. Internet Safety has graduate level experience in iPredator profiling, online deception, internet addiction and iPredator Inc.’s Information Age Education concept of humility, prevention education and non-denominational family values as being vital to children of the Information Age. To help Dr. Internet Safety teach young children about internet safety, he relies upon the help from iPredator Inc.’s internet safety characters, Cyber Tyger and Troll Man. Created for young children, K-5, Dr. Internet Safety knows Troll Man vs. Cyber Tyger is an exceptional educational tool.

Dr. Internet Safety-Internet Safety-Michael Nuccitelli-iPredator-Online Safety- White Text Image

MICHAEL NUCCITELLI, PSY.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at drnucc@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

cyber-deception-online-deception-online-deception-warning-signs-checklist-ipredator-dark-paychology-internet-safety-image

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: Dr. Internet Safety
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Internet Predator Safety Test-Michael Nuccitelli, Psy.D.

Internet Predator Safety Test

Michael Nuccitelli, Psy.D.

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory

Internet Predator

[IPI-IP]

The iPredator Probability Inventory-Internet Predator [IPI-IP] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The iPredator Probability Inventory-Internet Predator [IPI-IP] assesses a child’s online risk activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the iPredator Probability Inventory-Internet Predator [IPI-IP]  is a structured checklist for diagnostics, education, investigation and data collection. The IPI-IP can also be used for compiling evidentiary information for law enforcement, Internet Service Providers, school officials and the legal system if the online user is suspected of being targeted by an internet predator.

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

An online sexual predator prevention tool, called the iPredator Probability Inventory-Internet Predator [IPI-IP] has been released by iPredator Inc. Developed by Dr. Nuccitelli, the IPI-IP was designed to help parents, educators and pediatric professionals assess a child’s risk of being targeted by online sexual predators.

The online sexual predator engages in the criminal and deviant acts of sextortion and internet predation, which are two of the most egregious forms of Information Age social issues. Although adults can be targeted, the primary victim pool, for online sexual predators, is ignorant, distressed or discouraged children. Unfortunately, American society continues to minimize online sexual predation’s rapid growth and the severe psychological devastation caused to the child victim. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase.

I. iPredator Probability Inventory-Internet Predator [IPI-IP] $125.00 [USD]

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

 IPI-IP Definition

iPredator Probability Inventory-Internet Predator [IPI-IP]: The iPredator Probability Inventory-Internet Predator is a 110-question data collection, diagnostic and educational tool designed to assess a child, adolescent or young adult’s preparedness, vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators. A parent, primary caregiver, school official or pediatric professional completes the IPI-IP. In addition to being a diagnostic tool and inventory, the IPI-IP can also be used as an adjunct to a mental health and/or forensic assessment.

The IPI-IP is designed for children, adolescents and young adults ages 6-21. Just as all the IPI Assessment Collection inventories, the IPI-IP focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for internet safety and preparedness if cyber attacked.

As Dr. Nuccitelli states, “The hours involved in creating the 26 internet safety and cyber attack prevention tools surpassed the time it took me to complete my doctoral dissertation threefold. I also know Information Age victimization will have me conducting research for decades to come. iPredator Inc.’s mission is to strike the proverbial match igniting a national discussion and intervention plan and how to stop the societal disconnection.”

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. [2012]

DrInternetSafety.Com-michael nuccitelli-ipredator-internet safety-cyber safety-yellow text image

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Dr. Internet Safety: Dr. Internet Safety (aka, Doc iSafety) is an abstract pediatric internet safety character that educates tweens, teens and adult caregivers about cyberbullying, cyber harassment and cyberstalking prevention, online sexual predator identification, cyber security, the dark side of cyberspace, internet addiction and developmentally appropriate iPredator concepts. Dr. Internet Safety is Developmental Psychology and adolescent maturation savvy in relationship to Information Age tweens and teens.

Dr. Internet Safety accepts and communicates to children supporting their perceptual distortion of viewing themselves as being more technology, social media and cyber safety skilled than their adult counterparts. From a societal standpoint, Dr. Internet Safety seeks to make all K-12 educational systems include internet safety classes compulsory for all American school districts. Furthermore, Dr. Internet Safety has graduate level experience in iPredator profiling, online deception, internet addiction and iPredator Inc.’s Information Age Education concept of humility, prevention education and non-denominational family values as being vital to children of the Information Age. To help Dr. Internet Safety teach young children about internet safety, he relies upon the help from iPredator Inc.’s internet safety characters, Cyber Tyger and Troll Man. Created for young children, K-5, Dr. Internet Safety knows Cyber Tyger vs. Troll Man is an exceptional educational tool.

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

MICHAEL NUCCITELLI, PSY.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at drnucc@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Michael Nuccitelli, Psy.D.

iPredator Inc. Founder: Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dr. Internet Safety
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Cybercrime Internet Safety Test-Michael Nuccitelli, Psy.D.

Cybercrime Internet Safety Test

Michael Nuccitelli, Psy.D.

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory

Cybercrime

[IPI-C]

The iPredator Probability Inventory-Cybercrime [IPI-C] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. TheiPredator Probability Inventory-Cybercrime [IPI-C] assesses a business or adult’s high-risk online activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the iPredator Probability Inventory-Cybercrime [IPI-C] is a structured inventory for diagnostics, education, investigation and data collection. TheIPI-C can also be used for compiling evidentiary information for authorities, Internet Service Providers and the legal system if the online user or business is being cyber attacked by an online assailant[s].

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Developed by Michael Nuccitelli Psy.D., the structuredinventory is used for cybercrime prevention, diagnostics, education and investigation. Cybercrime, Identity Theft and Telecommunications Piracy are three new terms defining criminal activities in the Information Age. To help online users prevent cybercrime victimization, Dr. Nuccitelli has designed theiPredator Probability Inventory-Cybercrime [IPI-C]. In addition to developing the IPI-C, Dr. Nuccitelli designed 25 other online risk assessment tools specific to the typology, age of online user and organization. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase.

I. iPredator Probability Inventory-Cybercrime [IPI-C] $125.00 [USD]

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

IPI-C Definition

iPredator Probability Inventory-Cybercrime [IPI-C]: The IPI-C is a 110 question diagnostic, education, assessment and data collection tool designed to assess and investigate an adult or business’s probability of being targeted, disparaged, stolen from or infiltrated by iPredators or nefarious corporate competitors engaged in cybercriminal activities. An adult age 18+, business owner or corporate associate familiar with the business’s health and safety completes the IPI-C.

Just as all the IPI Assessment Collection inventories, the IPI-C focuses on the adult or business’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology [ICT] activities and their practice of the behavioral actions necessary for Internet safety, cybercrime prevention and preparedness if cyber attacked. In addition to a diagnostic and data collection tool, the IPI-C can also be used to assist an online user or a business to investigate their security breach weaknesses if they have been victimized by cybercrime. The IPI-C also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

Cybercrime Internet Safety Test-Michael Nuccitelli, Psy.D.

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. [2012]

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Dr. Internet Safety: Dr. Internet Safety (aka, Doc iSafety) is an abstract pediatric internet safety character that educates tweens, teens and adult caregivers about cyberbullying, cyber harassment and cyberstalking prevention, online sexual predator identification, cyber security, the dark side of cyberspace, internet addiction and developmentally appropriate iPredator concepts. Dr. Internet Safety is Developmental Psychology and adolescent maturation savvy in relationship to Information Age tweens and teens.

Dr. Internet Safety accepts and communicates to children supporting their perceptual distortion of viewing themselves as being more technology, social media and cyber safety skilled than their adult counterparts. From a societal standpoint, Dr. Internet Safety seeks to make all K-12 educational systems include internet safety classes compulsory for all American school districts. Furthermore, Dr. Internet Safety has graduate level experience in iPredator profiling, online deception, internet addiction and iPredator Inc.’s Information Age Education concept of humility, prevention education and non-denominational family values as being vital to children of the Information Age. To help Dr. Internet Safety teach young children about internet safety, he relies upon the help from iPredator Inc.’s internet safety characters, Cyber Tyger and Troll Man. Created for young children, K-5, Dr. Internet Safety knows Cyber Tyger vs. Troll Man is an exceptional educational tool.

“Unlike traditional human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to the data available.” Michael Nuccitelli, Psy.D. (2011)

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

MICHAEL NUCCITELLI, PSY.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at drnucc@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: Dr. Internet Safety
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Cyberstalker Identity Interview-Michael Nuccitelli, Psy.D.

Cyberstalker Identity Interview

Michael Nuccitelli, Psy.D.

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstalker Identification Interview

[CSII]

The Cyberstalker Identification Interview [CSII] is an internet safety tool and cyberstalker identification assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Cyberstalker Identification Interview [CSII] helps an online user to assess his/her online risk activities, cyber attack vulnerabilities and the identity of a cyberstalker if being targeted. Designed to be multi-functional, the Cyberstalker Identification Interview [CSII] is a structured identification interview for education, investigation and data collection. The CSII can also be used for compiling evidentiary information for law enforcement, Internet Service Providers and the legal system if the online user is seeking to identify a cyberstalker.

A comprehensive cyberstalker identification tool has been released for purchase by iPredator Inc. Developed by Dr. Nuccitelli, the Cyber Stalker Identification Interview [CSII] helps online users identify unknown cyberstalkers or compile the relevant data if the identity of the cyberstalker is known. As  author of the CSII, Dr. Nuccitelli is available to assist CSII users before and after they have purchased the tool at no cost.

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

A cyberstalker is a criminal, deviant, severely disturbed or disgruntled ex-partner that uses Information and Communications Technology to taunt, harm, manipulate and control other online users. To prevent cyberstalking victimization and identification if the assailant is unknown, Dr. Nuccitelli created the Cyber Stalker Identification Interview [CSII.] In addition to developing the CSII, Dr. Nuccitelli designed 25 other online risk assessment tools specific to the typology, age of online user and organization. The CSII is a 75 question diagnostic and investigation tool designed to examine an online user’s cyberstalking risks & internet safety practices. To view a sample of the items that are used in  the iPredator internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase.

I. Cyber Stalker Identification Interview [CSII]  $80.00 [USD]

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyber Stalker Identification Interview [CSII] Definition

Cyber Stalker Identification Interview [CSII]: The Cyber Stalker Identification Interview [CSII] is a 75 question diagnostic and data collection tool designed to achieve a three-fold purpose. The three functions include A. Assess the vulnerability and preparedness of a child, adolescent, adult, business or public figure of being cyber stalked, internet trolled or cyber harassed. B. Assist law enforcement, legal professionals, parents, adults and businesses in collecting data on the identity of an unknown cyber stalker. C. Assess the extent and skills of the cyber stalker’s tactics and the target’s Information and Communications Technology [ICT] weaknesses and high-risk behaviors the cyber stalker is attacking.

For purposes of the target vulnerability estimate, the CSII has been formatted to investigate aspects of cyberstalking, cyber harassment and cyberbullying if the target is a minor. Provided below is a sample of the CSII questions. Based on the rationale for completing the CSII, the person conducting or completing the interview is advised to interpret the questions as follows: I. If the cyber stalker is known or his/her identity is suspected, the questions are straight forward and formatted for this event. II. If the identity of the cyberstalker is unknown, the questions should be premised with, “If the cyber stalker were known,” and then read the question and note responses accordingly.

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

CSII Term Acronyms

I. CS: A suspected, alleged, confirmed or unknown person or group engaged in cyberstalking another person, group or organization using information and communications technology.

II. Target: A person, group or organization that is being taunted, harassed, disparaged or abused using Information and Communications Technology [ICT] by a suspected, alleged, confirmed or unknown person or group.

  • Does the CS have a motive or suspected motive? [Note examples whether factual or alleged.]
  • Are the harassing threats or central themes sexual, obsessive or violent in nature or a combination of the three? [Note examples whether factual or alleged.]
  • Has the CS posted and/or disclosed personal information about the target that the target is unable to understand how the CS obtained the personal information? [Note examples.]
  • Has the CS ever followed or suspected of following the target appearing in their home or place of business? [Note when, where, how often and last reported incident.]
  • Has the CS persuaded other ICT users into harassing or threatening the target by utilizing online bulletin boards or chat rooms? [Note examples and/or names of websites.]

Cyberstalker Identity Interview-Michael Nuccitelli, Psy.D.

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, “It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II.The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III.A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. [2012]

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.”Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Dr. Internet Safety: Dr. Internet Safety (aka, Doc iSafety) is an abstract pediatric internet safety character that educates tweens, teens and adult caregivers about cyberbullying, cyber harassment and cyberstalking prevention, online sexual predator identification, cyber security, the dark side of cyberspace, internet addiction and developmentally appropriate iPredator concepts. Dr. Internet Safety is Developmental Psychology and adolescent maturation savvy in relationship to Information Age tweens and teens.

Dr. Internet Safety accepts and communicates to children supporting their perceptual distortion of viewing themselves as being more technology, social media and cyber safety skilled than their adult counterparts. From a societal standpoint, Dr. Internet Safety seeks to make all K-12 educational systems include internet safety classes compulsory for all American school districts. Furthermore, Dr. Internet Safety has graduate level experience in iPredator profiling, online deception, internet addiction and iPredator Inc.’s Information Age Education concept of humility, prevention education and non-denominational family values as being vital to children of the Information Age. To help Dr. Internet Safety teach young children about internet safety, he relies upon the help from iPredator Inc.’s internet safety characters, Cyber Tyger and Troll Man. Created for young children, K-5, Dr. Internet Safety knows Cyber Tyger vs. Troll Man is an exceptional educational tool.

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

MICHAEL NUCCITELLI, PSY.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at drnucc@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dr. Internet Safety
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Cyberstalking Safety Test-Michael Nuccitelli, Psy.D.

Cyberstalking Safety Test

Michael Nuccitelli, Psy.D.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Cyberstalking

[IPI-CS]

The iPredator Probability Inventory-Cyberstalking [IPI-CS]  is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The iPredator Probability Inventory-Cyberstalking [IPI-CS] assesses a child’s online risk activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the iPredator Probability Inventory-Cyberstalking [IPI-CS]  is a structured inventory for diagnostics, education, investigation and data collection.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

The IPI-CS can also be used for compiling evidentiary information for law enforcement, Internet Service Providers and the legal system if the online user is being suspected of being cyberstalked. Developed by Dr. Nuccitelli, the IPI-CS was designed to help online users assess their potential of being cyberstalked.

Cyberstalking is the use of the internet and Information and Communications Technology [ICT] to taunt, tease, disparage and monitor a target victim[s]. Unlike cyber harassment, internet trolling and cyberbullying, cyberstalking requires a direct or implied physical threat within the harmful information being disseminated. The IPI-CS is a 110-question diagnostic and education tool designed to examine an online user’s cyberstalking risks & internet safety practices. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase.

I. iPredator Probability Inventory-Cyberstalking [IPI-CS] $125.00 [USD]

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Cyberstalking Definition

iPredator Probability Inventory-Cyberstalking [IPI-CS]: The iPredator Probability Inventory- Cyberstalking is a 110-question diagnostic, education, assessment and data collection tool designed to assess the probability and preparedness of a young adult, adult or public figure of being cyberstalked. In addition to cyberstalking, the IPI-CS investigates the subject’s potential of being cyber harassed by an ex-partner, ex-associate, fan, nefarious corporate entity or pathologically driven online user.

Just as all the IPI Assessment Collection inventories, the IPI-CS focuses on the subject’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their online activities and behavioral actions necessary for internet safety and preparedness if cyber attacked. For purposes of the probability estimate the IPI-CS has been designed to assess, this inventory combines aspects of cyberstalking, cyber harassment and habitual online personal disparagement.

An adult, public figure or associate of a public figure, ages 18+, completes the IPI-CS. Once completed, the IPI score, ranging from 0-110, represents the preparedness, vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyberstalking, cyber harassment or cyberbullying, if the subject being queried is a minor.

The IPI-CS can be used as both a cyberstalking prevention tool and data collection instrument if the online user or business is presently being cyberstalked. The IPI-CS also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, “It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

Cyberstalking Safety Test-Michael Nuccitelli, Psy.D.

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”Michael Nuccitelli, Psy.D. [2012]

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.”Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Dr. Internet Safety: Dr. Internet Safety (aka, Doc iSafety) is an abstract pediatric internet safety character that educates tweens, teens and adult caregivers about cyberbullying, cyber harassment and cyberstalking prevention, online sexual predator identification, cyber security, the dark side of cyberspace, internet addiction and developmentally appropriate iPredator concepts. Dr. Internet Safety is Developmental Psychology and adolescent maturation savvy in relationship to Information Age tweens and teens.

Dr. Internet Safety accepts and communicates to children supporting their perceptual distortion of viewing themselves as being more technology, social media and cyber safety skilled than their adult counterparts. From a societal standpoint, Dr. Internet Safety seeks to make all K-12 educational systems include internet safety classes compulsory for all American school districts. Furthermore, Dr. Internet Safety has graduate level experience in iPredator profiling, online deception, internet addiction and iPredator Inc.’s Information Age Education concept of humility, prevention education and non-denominational family values as being vital to children of the Information Age. To help Dr. Internet Safety teach young children about internet safety, he relies upon the help from iPredator Inc.’s internet safety characters, Cyber Tyger and Troll Man. Created for young children, K-5, Dr. Internet Safety knows Cyber Tyger vs. Troll Man is an exceptional educational tool.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

MICHAEL NUCCITELLI, PSY.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at drnucc@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Inc. Founder:Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dr. Internet Safety
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Cyber Bully Internet Safety Test-Michael Nuccitelli, Psy.D.

Cyber Bully Internet Safety Test

Michael Nuccitelli, Psy.D.

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Cyberbully Abuser

[IPI-CBA]

The iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]  is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA] assesses a child’s online risk activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]  is a structured inventory for diagnostics, education, investigation and data collection. The IPI-CBA can also be used for compiling evidentiary information for law enforcement, Internet Service Providers, school officials and the legal system if the child is suspected of being a cyberbully.

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Developed by Dr. Nuccitelli, the IPI-CBA helps parents, educators and pediatric professionals investigate a child’s probability of engaging in harmful online activity towards a targeted child. The cyberbully is a child who engages teasing, taunting and disparagement of a target child using the internet and Information and Communications Technology (ICT.) As America is starting to address this growing societal epidemic, few parents, primary caregivers and educators take into consideration, it is another child who is the assailant. The IPI- CBA is a 110 question diagnostic and education tool designed to examine a child’s risk of being a cyberbully or cyberbully bystander. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase.

I. iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]  $125.00 [USD]

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Cyberbully Abuser

Definition

iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]: The iPredator Probability Inventory-Cyberbully Abuser is a 110 question diagnostic, education, assessment and data collection tool designed to investigate a child or adolescent’s online probability and potential to intimidate, humiliate and taunt other children engaging in online harassment and cyberbullying. A parent, primary caregiver and school official or pediatric professional complete the IPI-CBA for children, and adolescents ages 6-17.

Just as all the IPI Assessment Collection inventories, the IPI-CBA focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for non-adversarial and appropriate online activities.

Once completed, the IPI score, ranging from 0-110, represents the vulnerability and risk potential of the child becoming a cyberbully abuser, both cyberbully target and abuser or cyberbully bystander. The IPI-CBA can be used as both a cyberbullying assessment tool for children and a data collection instrument for parents and educators investigating cyberbullying episodes involving their child or student. Similar to the IPI-CB, the IPI-CBA investigates the knowledge and understanding parents and/or educators have relevant to investigating the cyberbully abuser. The IPI-CBA also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

Cyberbullying: Cyberbullying is the use of Information and Communications Technology between minors to humiliate, taunt and disparage one another. Cyberbullying is intended to tease, embarrass, deprecate & defame a targeted minor with the assailant’s developmental needs for peer acceptance and recognition being a priori. Dissimilar to physical bullying, cyberbullying does not involve face-to-face contact and primarily occurs online using electronic devices as the tools for information dissemination. Unlike classic bullying, cyber bullying includes a phenomenon called Cyber Bullying by proxy.

Cyber bullying by proxy occurs when a cyber bully encourages or persuades others to engage in deprecating and harassing a target child. Cyber bullying by proxy is a dangerous form of cyber bullying because adults may become the accomplices to the cyber bully involved in the harassment and do not know they are dealing with a child or someone they may know. A cyberbully is usually driven by a need for peer acceptance, but may engage in these maladaptive behaviors out of ignorance of the distress they cause a target child, or the most malevolent form, feels minimal remorse for the harm they are inflicting upon the target child.

Cyber Bully Internet Safety Test-Michael Nuccitelli, Psy.D.

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, “It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”Michael Nuccitelli, Psy.D. [2012]

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.”Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-imageDR. INTERNET SAFETY

Dr. Internet Safety: Dr. Internet Safety (aka, Doc iSafety) is an abstract pediatric internet safety character that educates tweens, teens and adult caregivers about cyberbullying, cyber harassment and cyberstalking prevention, online sexual predator identification, cyber security, the dark side of cyberspace, internet addiction and developmentally appropriate iPredator concepts. Dr. Internet Safety is Developmental Psychology and adolescent maturation savvy in relationship to Information Age tweens and teens.

Dr. Internet Safety accepts and communicates to children supporting their perceptual distortion of viewing themselves as being more technology, social media and cyber safety skilled than their adult counterparts. From a societal standpoint, Dr. Internet Safety seeks to make all K-12 educational systems include internet safety classes compulsory for all American school districts. Furthermore, Dr. Internet Safety has graduate level experience in iPredator profiling, online deception, internet addiction and iPredator Inc.’s Information Age Education concept of humility, prevention education and non-denominational family values as being vital to children of the Information Age. To help Dr. Internet Safety teach young children about internet safety, he relies upon the help from iPredator Inc.’s internet safety characters, Cyber Tyger and Troll Man. Created for young children, K-5, Dr. Internet Safety knows Cyber Tyger vs. Troll Man is an exceptional educational tool.

“Unlike traditional human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to the data available.” Michael Nuccitelli, Psy.D. (2011)

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

MICHAEL NUCCITELLI, PSY.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

IPREDATOR INC.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at drnucc@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Inc. Founder:Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dr. Internet Safety
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Pin It on Pinterest