by

Cyber Harassment-Deception, iPredator & Internet Trolls

No comments yet

Categories: Cybercriminal Minds, Featured, Tags: , , , , , , , , , , , , , , , , ,

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

Cyber Harassment Harassment Online Harassment Internet Harassment iPredator Internet Safety Image  600x440 Cyber Harassment Deception, iPredator & Internet Trolls

Cyber Harassment

Visit iPredator Inc.’s “Cyber Harassment” page to review or download, at no cost, information on cyber harassment, cyber abuse, defamation and trolls. If preferring not to visit the iPredator parent site, below are definitions for Cyber Harassment, Online Deception, iPredator, iPredator Bridge & Internet Trolls.

“Cyberstealth is defined as a method and/or strategy by which a child, adult, group or nation uses Information and Communications Technology (ICT) to establish and sustain complete anonymity while they troll, stalk and attack their target(s). To ensure successful anonymity, Cyberstealth employs Online Deception, Social Engineering and Disinformation to distract and confuse their target(s). Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators (aka, Online Assailants) range from negligible to highly complex and multi-faceted.” Michael Nuccitelli, Psy.D. (2014)

Cyber Harassment:Cyber Harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, Cyber Harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber Harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target.

Although Cyber Harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber Harassment differs from cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include a constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation becomes more vulnerable to corruption. As anonymity via the Internet becomes more feasible, Cyber Harassment continues to flourish. Cyber Harassment is the adult form of cyberbullying to a minor.

Internet Troll: An Internet Troll is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to purposely and actively provoke, defame, anger, tease, flame, or incite other online users. More often than not, the Internet Troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet Trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions. When the Internet Troll’s inflammatory statements and actions do not include a direct or implied physical threat to the target(s), their behavior is categorizes as cyber harassment. If the Troll’s verbal assaults include direct or implied physical threats to their target(s), their actions are then defined as cyberstalking.

The motivations for an Internet Troll’s provocative, and often times, bizarre behaviors are numerous. Despite the variations in modus operandi, the vast majority of Trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice. Although there is no hard evidence or clinical research validating the psychology of the Internet Troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors. Those who have begun to investigate the etiology of the Troll suggest that the anonymity of the internet contributes to what has been called, disinhibition effect. It has been postulated that internet anonymity leads some to behave in asocial ways coupled with a lack of guilt or remorse for the harm they cause not being in the target’s physical presence or even knowing their identity.

Cyber Harassment iPredator Internet Troll Text Image 600x69 Cyber Harassment Deception, iPredator & Internet Trolls

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT.
II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Disinformation iPredator Duplicity Online Deception Cyberstealth Social Engineering Internet Safety Themed Image 600x600 Cyber Harassment Deception, iPredator & Internet Trolls

iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology [ICT] to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not initially driven by criminal, malevolent or deviant endeavors, iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this realm and either proceed in their maladaptive trajectory or cease and desist.

Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.

iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung [1875-1961] and his construct of the Collective Unconscious.

Cyber Harassment Provocation Online Harassment Internet Harassment iPredator Internet Safety Image  Cyber Harassment Deception, iPredator & Internet Trolls

“The Information Age technocentric concept of being “connected” is actually a paradox of disconnection causing us to lose our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology [ICT] grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than realty based relationships.” Michael Nuccitelli, Psy.D. (2014)

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in InformationAge Deception or also called online deception. Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, Online Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age Deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Online Deception, [aka, Cyberstealth, Disinformation]: Unlike classic deception used by traditional criminals and deviants, Disinformation [aka, Online Deception, Cyberstealth] completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Disinformation and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Disinformation includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. Disinformation does not require an ICT user to engage in nefarious, deviant or malevolent activities. Although all forms of deception are problematic, Disinformation can be as subtle of what many call a “white lie.”

Another difference is when iPredators use Cyberstealth to hide their identity from victims. In general, iPredators use Cyberstealth when their actions involve illegal activities and hiding their identity is paramount to reduce being identified, apprehended and prosecuted. ICT users who evaluate their odds of being identified, develop tactics and strategies to minimize identification are motivated by criminal, deviant & harmful causes are iPredators using Cyberstealth.

“Whether used to influence the masses or in cyberspace to persuade others into divulging confidential or sensitive information, social engineering requires psychological manipulation to control a person, group or nation. In the Information Age, children can be just as effective at social engineering as adults and cause driven groups.” Michael Nuccitelli, Psy.D. (2014)

iPredator Online Deception InfoAge Deception Michael Nuccitelli Internet Safety Themed Image 600x450 Cyber Harassment Deception, iPredator & Internet Trolls

IPREDATOR INC.

iPredator Inc.:iPredator Inc. is a New York State based Internet Safety & Forensics company founded in September 2011 providing products & services regarding cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet trolls, internet addiction, online child pornography, online deception, cyber attacks and the new fields they are pioneering termed, Cybercriminal Psychology & Cybercriminal Profiling.

Created by a NYS licensed psychologist and forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. For visitors interested in learning more about Dark Psychology & iPredator, outside their parent website, please visit their many social site profiles. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the Google Plus & other social sites listed below used as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media and consult with online users. To contact Dr. Nuccitelli about training, education, investigation or consultation, please email him at drnucc@ipredatorinc.com or via phone at 347-871-2416.

“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” Michael Nuccitelli, Psy.D. (2012)

I. iPredator Website: https://www.ipredator.co/
II. iPredator Construct: https://www.ipredator.co/ipredator/
III. Dark Psychology:  https://www.ipredator.co/ipredator/dark-psychology/
IV. Dr. Internet Safety Blog:  https://drinternetsafety.com/
V. Dark Psychology Blog:  https://darkpsychology.co/
IV. Online Psychopathy Article:  http://goo.gl/aOZP17

Online Predation Perversions Have No Boundaries Deb Link 2014 Take Your Time Online Internet Safety Awareness iPredator Image 600x377 Cyber Harassment Deception, iPredator & Internet Trolls

Michael Nuccitelli, Psy.D.:Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the criminal/deviant side of cyberspace.

In June 2013, Dr. Nuccitelli and iPredator Inc. launched their website, www.iPredator.co, offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations. Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist for 10 years and worked in the field of forensic psychology conducting evaluations and consultation for attorneys and court systems. Dr. Nuccitelli has extensive career and academic experiences. His areas of expertise include forensic & criminal psychology, cybercriminal psychology, psychiatric illness, addictions and developmental psychology.

He is an avid follower of national & criminal news and enjoys educating the public by interacting with the media. Dr. Nuccitelli continues to investigate and expand his construct he has designed called iPredator. Dr. Nuccitelli can be reached 7 days a week by calling 347-871-2416  or emailing him at drnucc@ipredatorinc.com.

I. G+ Profile Michael Nuccitelli, Psy.D.  https://plus.google.com/+michaelnuccitelli/posts
II. G+ Page iPredator  https://plus.google.com/+ipredatorco/about
III. G+ Page Dark Psychology  https://plus.google.com/+darkpsychologycosite/about
IV. G+ Page iPredator Inc.  https://plus.google.com/113685898762854433539/posts
V. G+ Community Dark Psychology  https://plus.google.com/communities/102609896572601482722
VI. G+ Community iPredator  https://plus.google.com/communities/116267329212801720338
VII. Linked In  http://www.linkedin.com/in/ipredator
VIII. Twitter  https://twitter.com/theipredator
IX. YouTube  http://www.youtube.com/user/ipredatorteam
X. Facebook  http://www.facebook.com/pages/the-ipredator/314877728534332
XI. Pinterest  http://www.pinterest.com/ipredator/

Cyber Harassment | Cyber Abuse, Deception & Trolls | SSL Secure Site | No $, Personal Information or Email Address Required to Download Page | Authored by NYS Licensed Psychologist, Michael Nuccitelli, Psy.D. & iPredator Inc. Associates | iPredator Inc. is a New York State Internet Safety & Cybercriminal Psychology Company | Education, Consultation, Profiling & Investigation 347-871-2416. https://www.ipredator.co/cyber-harassment/

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

Online Child Predators Online Sexual Predation Internet Safety Savvy Moms The Darkside of Cyberspace Hides Us Too iPredator Parents Image 600x600 Cyber Harassment Deception, iPredator & Internet Trolls

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

by

Online Deception-Online Deception Question & Answer Review

No comments yet

Categories: Cybercriminal Minds, Featured, Tags: , , , , , , , , , , , , ,

online-deception-question-answer-online-deception-identity-cloaking-construct-cyberstealth-internet-safety-ipredator-image

ONLINE DECEPTION

ONLINE DECEPTION CYBERSTEALTH ONLINE DUPLICITY DISINFORMATION IPREDATOR INTERNET SAFETY THEMED IMAGE 600x600 Online Deception Online Deception Question & Answer Review

Types of Online Deception

Disinformation [aka, Online Deception, Cyberstealth]: Unlike classic deception used by traditional criminals and deviants, Disinformation [aka, Online Deception, Cyberstealth] completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Disinformation and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Disinformation includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. Disinformation does not require an ICT user to engage in nefarious, deviant or malevolent activities. Although all forms of deception are problematic, Disinformation can be as subtle of what many call a “white lie.”

Another difference is when iPredators use Cyberstealth to hide their identity from victims. In general, iPredators use Cyberstealth when their actions involve illegal activities and hiding their identity is paramount to reduce being identified, apprehended and prosecuted. ICT users who evaluate their odds of being identified, develop tactics and strategies to minimize identification are motivated by criminal, deviant & harmful causes are iPredators using Cyberstealth.

IBWSC

Online Deception Warning Signs Checklist (IBWSC): Based on the iPredator Bridge construct, the Online Deception Warning Signs Checklist is a 50 item checklist designed to investigate if a loved one, colleague or peer is participating in or close to participating in harmful online and/or ICT activities towards others. Multiple affirmative responses to IBWSC statements suggests the person being queried exhibits patterned and/or observable behavioral patterns indicating they may be engaged in online deceptive activities. The IBWSC focuses on confirmed behavioral observations and not upon personal convictions and/or philosophical reasons for harming others online or using ICT.

Based on iPredator Bridge construct, the IBWSC assumes there are both people engaged in nefarious and malevolent activities and those engaged in harming others driven by distorted beliefs they are doing so for righteous and/or morally supported reasons. The common thread identical in both segments is the victims they target suffer from their attacks. The IBWSC has not been validated by clinical research, a governing body or academic institution. It has been compiled and published to be a point of reference to educate and assist anyone who is concerned that they, their children, business or community are in the presence of an iPredator or someone in transit to becoming an iPredator.

Cyberstealth iPredator Duplicity Disinformation Online Deception Social Engineering Internet Safety Themed Image 600x483 Online Deception Online Deception Question & Answer Review

CYBERSTEALTH

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called online deception. Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, Online Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age Deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

“Whether used to influence the masses or in cyberspace to persuade others into divulging confidential or sensitive information, social engineering requires psychological manipulation to control a person, group or nation. In the Information Age, children can be just as effective at social engineering as adults and cause driven groups.” Michael Nuccitelli, Psy.D. (2014)

iPredator Duplicity Disinformation Online Deception Cyberstealth Social Engineering Internet Safety Themed Image 600x478 Online Deception Online Deception Question & Answer Review

IPREDATOR

iPredator:A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT.
II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Duplicity iPredator Disinformation Online Deception Cyberstealth Social Engineering Internet Safety Themed Image 600x392 Online Deception Online Deception Question & Answer Review

IPREDATOR BRIDGE

iPredator Bridge:  iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology [ICT] to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not initially driven by criminal, malevolent or deviant endeavors,

iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this realm and either proceed in their maladaptive trajectory or cease and desist.

Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors. iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung [1875-1961] and his construct of the Collective Unconscious.

“The Information Age technocentric concept of being “connected” is actually a paradox of disconnection causing us to lose our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology [ICT] grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than realty based relationships.” Michael Nuccitelli, Psy.D. (2014)

 MICHAEL NUCCITELLI, PSY.D. 

Michael Nuccitelli, Psy.D.: Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the criminal/deviant side of cyberspace.

In June 2013, Dr. Nuccitelli and iPredator Inc. launched their website, www.iPredator.co, offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations. Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist for 10 years and worked in the field of forensic psychology conducting evaluations and consultation for attorneys and court systems. Dr. Nuccitelli has extensive career and academic experiences. His areas of expertise include forensic & criminal psychology, cybercriminal psychology, psychiatric illness, addictions and developmental psychology.

He is an avid follower of national & criminal news and enjoys educating the public by interacting with the media. Dr. Nuccitelli continues to investigate and expand his construct he has designed called iPredator. Dr. Nuccitelli can be reached 7 days a week by calling 347-871-2416  or emailing him at drnucc@ipredatorinc.com.

I. G+ Profile Michael Nuccitelli, Psy.D.  https://plus.google.com/+michaelnuccitelli/posts
II. G+ Page iPredator  https://plus.google.com/+ipredatorco/about
III. G+ Page Dark Psychology  https://plus.google.com/+darkpsychologycosite/about
IV. G+ Page iPredator Inc.  https://plus.google.com/113685898762854433539/posts
V. G+ Community Dark Psychology  https://plus.google.com/communities/102609896572601482722
VI. G+ Community iPredator  https://plus.google.com/communities/116267329212801720338
VII. Linked In  http://www.linkedin.com/in/ipredator
VIII. Twitter  https://twitter.com/theipredator
IX. YouTube  http://www.youtube.com/user/ipredatorteam
X. Facebook  http://www.facebook.com/pages/the-ipredator/314877728534332
XI. Pinterest  http://www.pinterest.com/ipredator/

Disinformation iPredator Duplicity Online Deception Cyberstealth Social Engineering Internet Safety Themed Image 600x600 Online Deception Online Deception Question & Answer Review

IPREDATOR INC.

iPredator Inc.:iPredator Inc. is a New York State based Internet Safety & Forensics company founded in September 2011 providing products & services regarding cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet trolls, internet addiction, online child pornography, online deception, cyber attacks and the new fields they are pioneering termed, Cybercriminal Psychology & Cybercriminal Profiling.

Created by a NYS licensed psychologist and forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. For visitors interested in learning more about Dark Psychology & iPredator, outside their parent website, please visit their many social site profiles. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the Google Plus & other social sites listed below used as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media and consult with online users. To contact Dr. Nuccitelli about training, education, investigation or consultation, please email him at drnucc@ipredatorinc.com or via phone at 347-871-2416.

“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” Michael Nuccitelli, Psy.D. (2012)

I. iPredator Website: https://www.ipredator.co/
II. iPredator Construct: https://www.ipredator.co/ipredator/
III. Dark Psychology:  https://www.ipredator.co/ipredator/dark-psychology/
IV. Dr. Internet Safety Blog:  https://drinternetsafety.com/
V. Dark Psychology Blog:  https://darkpsychology.co/
IV. Online Psychopathy Article:  http://goo.gl/aOZP17

Cyberstealth Deception iPredator Sub Construct Online Identity Camouflaging iPredator Internet Safety Themed Image1 600x600 Online Deception Online Deception Question & Answer Review

iPredator Deception Page Link

Online Deception Q & A | Disinformation, Cyberstealth & Deceptive Online Activities | iPredator | SSL Secure Site | No $, Personal Information or Email Address Required to Download Page | Authored by NYS Licensed Psychologist, Michael Nuccitelli, Psy.D. & iPredator Inc. Associates | iPredator Inc. is a New York State Internet Safety & Cybercriminal Psychology Company | Education, Consultation, Profiling & Investigation 347-871-2416. Visit iPredator’s internet safety site to download, at no cost, a Q & A page about online deception, digital disinformation and deceptive online activities. https://darkpsychology.co/online-deception-review/  ‎

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

by

Online Deception & Identity Cloaking Construct | Cyberstealth

No comments yet

Categories: Cybercriminal Minds, Featured, Tags: , , , , , , , , , , , , , ,

online-deception-identity-cloaking-construct-cyberstealth-internet-safety-ipredator-image

Cyberstealth Deception iPredator Sub Construct Online Identity Camouflaging iPredator Internet Safety Themed Image 600x600 Online Deception & Identity Cloaking Construct | Cyberstealth

CYBERSTEALTH

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called online deception. Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, Online Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age Deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

“Whether used to influence the masses or in cyberspace to persuade others into divulging confidential or sensitive information, social engineering requires psychological manipulation to control a person, group or nation. In the Information Age, children can be just as effective at social engineering as adults and cause driven groups.” Michael Nuccitelli, Psy.D. (2014)

Cyberstealth Deception iPredator Camouflage Online Identity Camouflaging iPredator Internet Safety Themed Image 600x433 Online Deception & Identity Cloaking Construct | Cyberstealth

iPredator:A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT.
II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Cyberstealth Deception iPredator Sub Construct Identity Cloaking Covert Deception Planning Target Assessed Vulnerabilities iPredator Internet Safety Themed Image 600x433 Online Deception & Identity Cloaking Construct | Cyberstealth

Online Deception

iPredator Bridge:  iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology [ICT] to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not initially driven by criminal, malevolent or deviant endeavors,

iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this realm and either proceed in their maladaptive trajectory or cease and desist.

Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors. iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung [1875-1961] and his construct of the Collective Unconscious.

“The Information Age technocentric concept of being “connected” is actually a paradox of disconnection causing us to lose our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology [ICT] grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than realty based relationships.” Michael Nuccitelli, Psy.D. (2014)

Social Engineering Cyberstealth Online Manipulation Online Deception iPredator Internet Safety Awareness Image 600x404 Online Deception & Identity Cloaking Construct | Cyberstealth

Michael Nuccitelli, Psy.D.: Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the criminal/deviant side of cyberspace.

In June 2013, Dr. Nuccitelli and iPredator Inc. launched their website, www.iPredator.co, offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations. Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist for 10 years and worked in the field of forensic psychology conducting evaluations and consultation for attorneys and court systems. Dr. Nuccitelli has extensive career and academic experiences. His areas of expertise include forensic & criminal psychology, cybercriminal psychology, psychiatric illness, addictions and developmental psychology.

He is an avid follower of national & criminal news and enjoys educating the public by interacting with the media. Dr. Nuccitelli continues to investigate and expand his construct he has designed called iPredator. Dr. Nuccitelli can be reached 7 days a week by calling 347-871-2416  or emailing him at drnucc@ipredatorinc.com.

I. G+ Profile Michael Nuccitelli, Psy.D.  https://plus.google.com/+michaelnuccitelli/posts
II. G+ Page iPredator  https://plus.google.com/+ipredatorco/about
III. G+ Page Dark Psychology  https://plus.google.com/+darkpsychologycosite/about
IV. G+ Page iPredator Inc.  https://plus.google.com/113685898762854433539/posts
V. G+ Community Dark Psychology  https://plus.google.com/communities/102609896572601482722
VI. G+ Community iPredator  https://plus.google.com/communities/116267329212801720338
VII. Linked In  http://www.linkedin.com/in/ipredator
VIII. Twitter  https://twitter.com/theipredator
IX. YouTube  http://www.youtube.com/user/ipredatorteam
X. Facebook  http://www.facebook.com/pages/the-ipredator/314877728534332
XI. Pinterest  http://www.pinterest.com/ipredator/

IPREDATOR INC.

iPredator Inc.:iPredator Inc. is a New York State based Internet Safety & Forensics company founded in September 2011 providing products & services regarding cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet trolls, internet addiction, online child pornography, online deception, cyber attacks and the new fields they are pioneering termed, Cybercriminal Psychology & Cybercriminal Profiling.

Created by a NYS licensed psychologist and forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. For visitors interested in learning more about Dark Psychology & iPredator, outside their parent website, please visit their many social site profiles. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the Google Plus & other social sites listed below used as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media and consult with online users. To contact Dr. Nuccitelli about training, education, investigation or consultation, please email him at drnucc@ipredatorinc.com or via phone at 347-871-2416.

“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” Michael Nuccitelli, Psy.D. (2012)

I. iPredator Website: https://www.ipredator.co/
II. iPredator Construct: https://www.ipredator.co/ipredator/
III. Dark Psychology:  https://www.ipredator.co/ipredator/dark-psychology/
IV. Dr. Internet Safety Blog:  https://drinternetsafety.com/
V. Dark Psychology Blog:  https://darkpsychology.co/
IV. Online Psychopathy Article:  http://goo.gl/aOZP17

America Time to Wake the Giant Admiral Isoroku Yamamoto Pearl Harbor Stop ISIS iPredator Image  600x433 Online Deception & Identity Cloaking Construct | Cyberstealth

Identity Cloaking Construct

Cyberstealth | Online Deception & Identity Cloaking Construct | SSL Secure Site | No $, Personal Information or Email Address Required to Download Page | Authored by NYS Licensed Psychologist, Michael Nuccitelli, Psy.D. & iPredator Inc. Associates | iPredator Inc. is a New York State Internet Safety & Cybercriminal Psychology Company | Education, Consultation, Profiling & Investigation 347-871-2416 iPredator Page Link: https://www.ipredator.co/cyberstealth/

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

1 2 3 4 5 59 60