What is Online Deception

Michael Nuccitelli, Psy.D.


Q & A Online Deception

Online Deception [aka, Digital Deception, Internet Deception, Cyber Deception] is the use of Information and Communications Technology to deceive other online users usually rooted in malevolent, nefarious or covert online activities. Although primarily used for anti-social purposes, online deception tactics are occasionally designed for benevolent purposes, such as, when law enforcement design felonious profiles of children used to locate, identify and arrest online sexual predators. The art & science of online deception is used by all iPredator typologies including cyberbullies, cyberstalkers, cyber criminals, cyber terrorist, cyber harassers, internet trolls and online sexual predators.

I. Why are online user’s easily deceived? Having spent a great deal of time creating the darkside of human consciousness construct, iPredator, this writer spent many hours endeavoring  to answer the question of why online users are so easily deceived online. In the most concise way to answer this quandary, one must first understand that humanity is enraptured by the novelty and awe of a new societal paradigm called the Information Age. It is this point in time, in the evolution of human civilization, where information technology and the electronic universe of cyberspace has become part of the metaphorical fabric influencing many interpersonal relationships and aspects of daily life functioning. It cannot be denied that present day society is at the beginning of a new technological frontier that is paradoxically  sensory magnificent and unchartered territory. Within these unknown aspects of the Information Age, temptation and curiosity act as accelerants driving online users to deceive their peers.

Cyberspace and the “veil of anonymity” it affords all online users is a temptation few can resist. The practice of deception has been part of the human experience since the beginning of civilization. The reason why it continues to this very day is because it is part of what it means to be fallible, and oftentimes, insecure human beings. Whether one subscribes to evolutionary biology or a religious dogma, the practice of deception is innate to all humans. Not just in humans, but  in most living organisms that must practice stealth and camouflage to survive, flourish and reproduce.

Many people are easily deceived online because they stubbornly want to believe what they see, hear and read online is real, attainable and without consequences. Despite the fact that  information technology is still in its infancy within the evolution of human civilization, many people still forgo their innate instincts of skepticism and self-preservation. Instead, they replace these survival traits with what they believe is an opportunity waiting to be embraced. Unfortunately, in cyberspace, what appears to be an opportunity, often times, turns out to be “a wolf in sheep’s clothing”.


II. Does not having access to someone’s physical expression [i.e., body language, non-verbal communication, etc.] contribute to online deception gullibility? There is some merit supporting the argument that cyberspace, information technology and virtual reality hampers an online user’s ability to access and rely upon their physical, psychological and intuitive senses. Although this writer agrees cyberspace and online interpersonal dynamics, without physical evidence of intent, contributes to a reduction in accurately making conclusions about another person’s modus operandi, this writer does not believe it is a major cause. This writer does not believe having fewer sensory tools causes online users to become more susceptible to online user misinterpretations and increased gullibility to online deception.

III. What are some surprising ways an online user can be conned online? Having spent the last 5 years obsessed with learning about the Darkside of Cyberspace and how to stop online users from engaging in malevolent and nefarious activities, there is very little left in what this writer would categorize as surprising in the realm of conning online users. Prior to changing career paths to focusing on developing what this writer hopes one day becomes the field of Cybercriminal Psychology, this writer was a full time practicing psychologist and forensic evaluator. In both those realms, there were patient and forensic cases this writer found surprising. Not in the sense of surprising as being novel and creative, but surprising in how some would harm their loved ones, peers and community associates without merit.

It is the same now in my present career trajectory. What is most surprising living in the Information Age, are not the perpetrators, but the targets of their criminal, deceptive and deviant tactics. This writer is amazed by how few online users, parents, businesses and organizations take the time to learn basic cyber attack prevention measures. There is nothing surprising about the ever growing multitude of new malware, spyware, viruses, bots and hacking programs.

What is surprising, if not amazing, is that few people seem to take the time to learn simple strategies to insulate themselves, their loved ones and businesses from cyber attacks. One does not have to have a graduate degree in technology to learn how to reduce the chances of being conned online or victimized.

IV. How can an online user make sure they do not fall victim to online deception? This writer cannot emphasize enough, but refraining from disclosing personal information is the number one recommendation to prevent being conned online. For some, like celebrities, public figures and those in the community spotlight, they have a harder time restricting their personal information because they are consistently under the public’s proverbial microscope. Although this is a reality for anyone who has the attention of the masses, measures still can be implemented to significantly reduce the chances of being targeted.

For those not in the public spotlight, it is the same internet safety recommendation. The less personal information disseminated and exchanged online, the lower the probability is of being attacked or approached by online con-artists. Lastly, and equally as important to personal information restrictions is the acronym ODDOR. During the development of the iPredator construct, this writer was hit with an epiphany that can reduce an online user’s chances of being targeted. The concept being mentioned is ODDOR or Offline Distress Dictates Online Response. This writer strongly believes that a child and adult’s offline stressors directly impacts their online demeanor, choices and responses to other online users.

If an online user is experiencing heightened stress due to familial, relationship, financial or any other types of life stressors, they are much more likely to be conned, flattered and manipulated by those who are trolling cyberspace for vulnerable targets. If an online user makes it a habit to take 60 seconds each time, before going online to assess their level of ODDOR, they are far less likely to behave in ways that online con artists, cyberstalkers, trolls and cybercriminals look for when searching for their next target.


V. What is Cyberstealth? Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception, used by traditional criminals and deviants, online deception relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

VI. What is iPredator? iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Although the benefits of Information and Communications Technology far outweigh the detriments for society, humanity has been seduced by the illusory notion that more technology translates into a better quality of life.” Michael Nuccitelli, Psy.D. [2014]


Dr. Internet Safety

Dr. Internet Safety: Dr. Internet Safety (aka, Doc iSafety) is an abstract pediatric internet safety character that educates tweens, teens and primary caregivers about cyberbullying, cyber harassment, cyberstalking, online sexual predation, cyber security, the dark side of cyberspace, internet addiction and developmentally appropriate iPredator concepts. Dr. Internet Safety is Developmental Psychology and adolescent maturation savvy in relationship to Information Age tweens and teens.

Dr. Internet Safety accepts and communicates to children supporting their perceptual distortion of viewing themselves as being more technology, social media and cyber safety skilled than their adult counterparts. From a societal standpoint, Dr. Internet Safety seeks to make all K-12 educational systems include internet safety classes compulsory for all American school districts. Furthermore, Dr. Internet Safety has graduate level experience in iPredator profiling, online deception, internet addiction and iPredator Inc.’s Information Age Education concept of humility, prevention education and non-denominational family values as being vital to children of the Information Age. To help Dr. Internet Safety teach young children about internet safety, he relies upon the help from iPredator Inc.’s internet safety characters, Cyber Tyger and Troll Man. Created for young children, K-5, Dr. Internet Safety knows Troll Man vs. Cyber Tyger is an exceptional educational tool.


Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, cyberbullying, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.


Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
Phone: 347-871-2416


Pin It on Pinterest

Share This