by

Types of Cyberbullying-Sought for 2015 PSA Article

No comments yet

Categories: Cybercriminal Minds, Tags: , , , , , , , , , , ,

CleanSaveBtn black small Types of Cyberbullying Sought for 2015 PSA ArticlePdfBtn black small Types of Cyberbullying Sought for 2015 PSA ArticleEmailBtn black small Types of Cyberbullying Sought for 2015 PSA ArticleCleanPrintBtn black small Types of Cyberbullying Sought for 2015 PSA Article

Cyberbullying Tactics Types of Cyberbullying Sought for 2015 PSA Educational Article iPredator Image Types of Cyberbullying Sought for 2015 PSA Article

Cyberbullying Tactics & Types of Cyberbullying
Sought for 2015 PSA Educational Article

Cyberbullying Tactics and Types of Cyberbullying Sought for 2015 PSA Educational Article. 38 2014 Tactics Pasted Below. Below I’ve pasted 38 Cyberbullying Tactics from 2014 and I’m now compiling iPredator’s Cyberbullying Tactics for 2015. Please scan the short definitions list below and comment to this post with new tactics not listed. My goal is to have the “2015 Cyberbullying Tactics” internet safety article available by Thanksgiving.

  1. Exclusion: Exclusion is a cyberbullying tactic that is highly effective and directly targets a minor’s developmental need to feel accepted and part of a social construct.
  2. Flaming: Flaming is a cyberbullying tactic defined as an online passionate argument that frequently includes profane or vulgar language.
  3. Exposure: Exposure is a cyberbullying tactic that includes the public display, posting or forwarding of personal communication, images or video by the cyberbully personal to the target minor.
  4. eIntimidation: This is a cyberbully tactic used to inspire fear in the target minor by communicating threats that may be direct or implied using email as the vehicle of communication.
  5. Cyber Harassment: Harassment is sending hurtful messages to the target minor that is worded in a severe, persistent or pervasive manner causing the respondent undue concern.
  6. Phishing: Phishing is a cyberbully tactic that requires tricking, persuading or manipulating the target minor into revealing personal and/or financial information about themselves and/or their loved ones.
  7. Impersonation: Impersonation or “imping” as a tactic in cyberbullying can only occur with the “veil of anonymity” offered by Information and Communications Technology.
  8. Denigration: Used in both classic and cyberbullying, denigration is a term used to describe when cyberbullies send, post, or publish cruel rumors, gossip and untrue statements about a target minor to intentionally damage their reputation or friendships.
  9. Mobile Device Image Sharing: Not only a tactic used in cyberbullying, but a form of information exchange that can be a criminal act if the images are pornographic or graphic enough depicting under aged minors.
  10. Non-Consensual Image and Video Dissemination: The usage of images and video as a cyberbullying tactic has become a growing concern that many communities, law enforcement agencies, and schools are taking seriously.
  11. Interactive Gaming Harassment: Interactive games on online gaming devices allow minors to communicate by chat and live Internet phone with others they are matched with online.
  12. Pornography and Marketing List Insertion: A frustrating and embarrassing tactic committed by cyberbullies is signing the target minor up to numerous pornography and/or junk marketing e-mailing and instant messaging marketing lists.
  13. Cyberstalking: Cyberstalking includes threats of harm, intimidation, and/or offensive comments sent through Information and Communications Technology channels.
  14. Griefing: Griefing is a term used to describe when a cyberbully habitually and chronically causes frustration to the target minor and his/her peers by not following the rules of an interactive online video game and intentionally disrupting the immersion of another player in their gameplay.
  15. Password Theft & Lockout: A cyberbully steals the target minor’s password and begins to chat with other people, pretending to be the target minor (a.k.a. Impersonation.)
  16. Web Page Assassination: This is a tactic whereby the cyberbully creates websites that insult or endanger the target minor.
  17. Voting & Polling Booth Degradation: Some websites offer online users the opportunity to create online polling/voting booths that are free of charge and easy to post.
  18. Bash Boards: Bash Boards are online bulletin boards where minors post anything they choose and frequented by both the cyberbully and target minor’s peer groups and school acquaintances.
  19. Trickery: Trickery is a tactic similar to phishing in that a cyberbully purposely tricks a target minor into divulging secrets, private information, and/or embarrassing information about themselves and then publishes that information online.
  20. Happy Slapping: Happy Slapping is a relatively new type of cyberbullying that integrates the rapid growth of video online and classic bullying.
  21. Text Wars and Text Attacks: Text Wars and Text Attacks are cyberbullying tactics when the cyberbully and a group of his/her accomplices’ gang up on the target minor by sending hundreds of emails or text messages.
  22. Malicious Code Dissemination: Sending malicious code is a cyberbullying tactic whereby malicious information is sent intentionally to a target minor to damage or harm their ICT.
  23. Warning Wars: Internet Service Providers (ISP) offers a way for consumers to report an online user who is posting inappropriate or abusive information.
  24. Screen Name Mirroring: Screen Name Mirroring is a cyberbullying tactic used against a target minor by constructing a screen name or user name that is very similar to the target minor’s name.
  25. Cyber Drama: Cyber Drama is a cyberbullying tactic that is a lot more common than extreme cases of cyberbullying. Cyber Drama tends to be gossip that was not supposed to be shared on a blog or a “flame war” that ends after a few messages.
  26. Sexting: Sexting is the slang term for the use of a cell phone or other Information and Communications Technologies to distribute images or videos of a sexually explicit nature.
  27. Pseudonym Stealth: A pseudonym is a nickname cyberbullies use when they are online as opposed to when offline. They do this to keep their real identity a secret from the target minor.
  28. Instant Messaging Attacks: Instant Messaging is a type of communications service that enables online users to create a private chat room with another individual.
  29. Cyberbullying by Proxy: Cyberbullying by Proxy is a tactic when a cyberbully encourages or persuades others to engage in deprecating and harassing a target minor.
  30. Social Media Cyberbullying: Social Media Cyberbullying is a tactic used by which the cyberbully persuades the target minor to include them in their “friends” or “buddy” lists and then begins to contact the target minor’s friends, peers and loved ones disseminating disparaging information about the target minor.
  31. Digital Piracy Inclusion: Digital or Internet Piracy is broadly defined as the illegal reproduction and distribution of copyrighted material on the internet using Information and Communications Technology.
  32. Tragedy News Mirroring: Local/National Tragedy Mirroring is a cyberbullying tactic whereby a cyberbully threatens a target minor that he/she will allege that the target minor is planning and preparing to engage in a violent activity directed at the targeted minor’s school or community.
  33. Slut Shaming: Slut Shaming is a cyberbullying tactic primarily targeting a female. A form of sexual cyberbullying, Slut Shaming occurs when a cyberbully records images or videos of the target minor that can easily be construed as sexually provocative.
  34. Cyber Threats: Cyber Threats is a cyberbullying tactic whereby a cyberbully actively engaged in passive aggressive strategies of informing the target minor that he or she is in danger from unknown or felonious assailants.
  35. Trolling: Trolling is the pediatric cyberbullying method of what has been termed, Internet Troll. Internet Trolls are often adults who disparage and harass unidentified online users, but the cyberbullying troll knows the identity of the target minor.
  36. Sextortion: Sextortion is a cyberbullying tactic by which minors exploit other minors for sex and/or sexually themed activities in exchange for not disclosing embarrassing and humiliating information about the target minor.
  37. Twitter Pooping: Twitter Pooping is a colloquial expression used to define the cyberbullying tactic of using Tweets to disparage and humiliate a target minor.
  38. Micro-Visual Cyberbullying: Micro-Visual Cyberbullying is a communication channel that is a future cyberbullying tactic trend.

iPredator Inc. Safety Tools Internet Safety Educational 404 Page iPredator Dr. Internet Safety Dark Psychology 500PX Image Types of Cyberbullying Sought for 2015 PSA Article

iPredator Inc.

iPredator Inc.: iPredator Inc. is a New York State based Internet Safety & Forensics company founded in September 2011 providing products & services regarding cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet trolls, internet addiction, online child pornography, online deception, cyber attacks and the new fields they are pioneering termed, Cybercriminal Psychology & Cybercriminal Profiling.

Created by a NYS licensed psychologist and forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. For visitors interested in learning more about Dark Psychology & iPredator, outside their parent website, please visit their many social site profiles. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the Google Plus & other social sites listed below used as their information and announcement vehicles.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media and consult with online users. To contact Dr. Nuccitelli about training, education, investigation or consultation, please email him at drnucc@ipredatorinc.com or via phone at 347-871-2416.

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

by

G+ Volunteer Cyber Attack Investigation Network Launched

No comments yet

Categories: Cybercriminal Minds, Featured, Tags: , , , , , , , , , , , , ,

a-cain-cyber-attack-investigation-network-internet-safety-ipredator-social-media-safety-image
CleanSaveBtn black small G+ Volunteer Cyber Attack Investigation Network LaunchedPdfBtn black small G+ Volunteer Cyber Attack Investigation Network LaunchedEmailBtn black small G+ Volunteer Cyber Attack Investigation Network LaunchedCleanPrintBtn black small G+ Volunteer Cyber Attack Investigation Network Launched

CAIN

CAIN Cyber Attack Investigation Network iPredator Internet Safety Michael Nuccitelli Dr. Internet Safety Image 700x500 G+ Volunteer Cyber Attack Investigation Network Launched

Volunteer Cyber Attack Investigation Network Launched

CAIN, a volunteer cyber attack investigation network, has been launched by iPredator Inc. in Google+. Below is a brief introduction about CAIN. The link to the full article, available at iPredator’s internet safety website, is available at the end of this post.   

CAIN, Cyber Attack Investigation Network, is a group of online users who volunteer their time helping other online users that are cyberstalked, cyberbullied, internet trolled, sexually solicited, cyber harassed, exploited, deceived and defamed. In addition to helping online users, CAIN actively searches for those who meet criteria for iPredator. If the assailant(s) is an iPredator, they are tracked, reported, blocked and monitored until Google+ or the host social networking site deletes and bans their profile.

When the assailant is profiled as being high risk, CAIN members will investigate the assailant outside of Google+ or the host social networking site to assess if they are actively involved in cybercriminal and/or deviant behaviors requiring law enforcement intervention. CAIN also disseminates internet safety and cyber attack prevention information relevant to online users of all ages.

CAIN Cyber Attack Investigation Network iPredator Internet Safety Michael Nuccitelli Dark Psychology Image G+ Volunteer Cyber Attack Investigation Network Launched

CAIN: https://plus.google.com/+IpredatorCoCAIN/posts

CAIN G+ Community: https://plus.google.com/u/0/communities/107895202001874547216

I created the concept of CAIN, Cyber Attack Investigation Network, in late 2012 to be an adjunct to the iPredator Team. Both were created to help financially strapped & pediatric online users who are abused, exploited and harmed online. Having a plethora of other projects and helping iPredator targets, I was prevented from having the time to focus on launching these groups as planned. iPredator Team and CAIN were scheduled for some time in the near future. iPredator Team description is as follows:

It was not until I met Ms. Tina Connelly (+Tina Connelly) in Google+ that my schedule for CAIN was moved up to October 2014. Interacting with Ms. Connelly in Google+, I was slowly introduced to the online behaviors of the most incredible group of Google+ members who worked in small groups to hunt and identify iPredators.

CAIN Cyber Attack Investigation Network iPredator Internet Safety Michael Nuccitelli Social Media Safety Image G+ Volunteer Cyber Attack Investigation Network Launched

The most astonishing fact I learned is that they are primarily high school and college aged online users. Ranging from fourteen years old to early twenties, they spend their time searching Google+ for cyberstalkers, cyberbullies, internet trolls, online sexual predator, cyber harassers and online users who use social networking sites to exploit, deceive and defame others. Instead of spending time socializing and networking, like the vast majority of online users who use Google+, they predominantly focus on hunting iPredators.

Once they identify and compile proof of the iPredator’s malevolent and nefarious online activities, they alert their followers, report them to Google+ and then block them. Like a pack of wolves working in unison, they track iPredators until Google+ suspends their profiles or the iPredator cancels their own account not being able to continue in their cyber abuse or online deception.

For anyone who reads this article, I strongly suggest you create a Google+ profile. I cannot recommend enough setting up a profile allowing you to watch the hunters become the hunted. The best metaphor I can use to explain their talents is that of a wolf pack on the hunt for their next meal. Tenacious, coordinated, relentless and innovative best describes their online investigation tactics. In the realm of humility, I have yet to see one of them brag or target online users fueled by retribution or envy. They do not ask to be paid, recognized or thanked by Google for the valuable service they provide Google+ members and all online users. It is time for them to be recognized and this why I have accelerated CAIN’s introduction.

CAIN Cyber Attack Investigation Network Michael Nuccitelli Social Media Safety Internet Safety Image G+ Volunteer Cyber Attack Investigation Network Launched

CAIN

CAIN, the Cyber Attack Investigation Network, officially was born October 30, 2014 with a handful of members. Our goal is to increase one thousand fold by the same time next year, October 30, 2015. Membership is free and CAIN accepts any online user interested in helping to make Google+ and the internet a safer environment. Anyone can follow our Google+ page and request to join our private CAIN G+ Community.

Cyber Attack Investigation Network CAIN iPredator Michael Nuccitelli Cyberstalking Cyberbullying Trolls Internet Safety Shield 190px Image G+ Volunteer Cyber Attack Investigation Network Launched

iPredator Inc.

iPredator Inc.: iPredator Inc. is a New York State based Internet Safety & Forensics Company founded in September 2011 providing products & services regarding cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet trolls, internet addiction, online child pornography, online deception, cyber attacks and the new fields they are pioneering termed, Cybercriminal Psychology & Cybercriminal Profiling.

Created by a NYS licensed psychologist and forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. For visitors interested in learning more about iPredator, outside their parent website, please visit their many social site profiles. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the Google Plus & other social sites listed below used as their information and announcement vehicles.

CAIN Cyber Attack Investigation Network iPredator Internet Safety Michael Nuccitelli Cyber Safety Image G+ Volunteer Cyber Attack Investigation Network Launched

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with media and consult with online users. To contact Dr. Nuccitelli about training, education, investigation or consultation, please email him at drnucc@ipredatorinc.com or via phone at 347-871-2416.

“Comfort the Victims, Educate the Ignorant & Conquer the Corrupt!” Michael Nuccitelli, Psy.D. (2012)

CAIN Pinterest Board

http://www.pinterest.com/ipredator/cain/

iPredator Website CAIN Webpage Link

https://www.ipredator.co/cain-internet-safety/

CAIN Cyber Attack Investigation Network iPredator Internet Safety Michael Nuccitelli Cyber Safety Laptop Image G+ Volunteer Cyber Attack Investigation Network Launched

CAIN Post Hashtags

#CAIN #CyberAttackInvestigationNetwork #iPredator #InternetSafety #Cyberbullying #Cyberstalking #MichaelNuccitelli #SocialMediaSafety #OnlinePredators #DarkPsychology #DrInternetSafety #InternetTrolls #Parenting #CyberPsychology #CriminalPsychology #Forensics #Radio #Education #Cyberspace

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.<br />
New York, New York
US
Phone: 347-871-2416

CAIN Cyber Attack Investigation Network Michael Nuccitelli Bullying Prevention Internet Safety Image G+ Volunteer Cyber Attack Investigation Network Launched

by

Michael Nuccitelli, Psy.D. | Flory’s Donation Appreciated

No comments yet

Categories: Cybercriminal Minds, Featured, Tags: , , , , , , , , , , , , ,

Florys-New York-Convenience-Gas-Delis-South Street Seaport-New York City-Michael Nuccitelli-iPredatorImage
CleanSaveBtn black small Michael Nuccitelli, Psy.D. | Florys Donation AppreciatedPdfBtn black small Michael Nuccitelli, Psy.D. | Florys Donation AppreciatedEmailBtn black small Michael Nuccitelli, Psy.D. | Florys Donation AppreciatedCleanPrintBtn black small Michael Nuccitelli, Psy.D. | Florys Donation Appreciated

Michael Nuccitelli Psy.D. Flory Corp. Internet Safety Company Donation Appreciation iPredator Inc. 700px Image Michael Nuccitelli, Psy.D. | Florys Donation Appreciated

Michael Nuccitelli, Psy.D.

Flory’s Donation Appreciated

This writer, Michael Nuccitelli, Psy.D., of iPredator Inc. would like to formally thank Flory Corp. for their kind donation for operating expenditures. Their timely donation will be used for site updates, legal expenses and internet safety educational initiatives. In addition to their charitable donation, Flory Corp. disseminates cyberbullying and internet safety for kids educational information both offline and online. Although Flory Corp. is involved in other entrepreneurial ventures, Flory’s use their convenience stores as vehicles to educate the community. To express your appreciation for Flory’s helping to educate online users, be sure to visit there stores.

Flory Corp. is a New York State based family owned business operating all-in-one gas stations, convenience stores & delis throughout the Hudson Valley. With stores in Hopewell Junction, Mahopac & Fishkill, they are located minutes from the Taconic State Parkway & Rte. 9. Flory establishments offer Mobil fuels, quality delis serving fresh cold cuts, hot lunches and convenience store products. Flory’s pride themselves as having spotless rest rooms, fast service, gourmet style foods & competitive prices.

Florys New York Convenience Gas and Delis Hopewell Junction Fishkill Mahopac Flory Corp Michael Nuccitelli iPredator Image Michael Nuccitelli, Psy.D. | Florys Donation Appreciated

The addresses to their store locations are attached in the following image available to download and save. Simply click on the image and save to your chosen device. Although known for their fried chicken, this writer’s personal favorite is either their penne vodka or Italian sausage with peppers & onions. To say thank you to Flory’s for supporting iPredator Inc. operations, visit their stores and if not living or working in the New York metropolitan area, visit their social sites pasted here and give them a +1, like or Thank You.

  1. Flory’s Website (Site Completed 11/2014): https://www.FloryCorp.com
  2. Google Plus: https://plus.google.com/+Florycorp/about
  3. Facebook:  https://www.facebook.com/Florycorp
  4. Twitter: @FloryCorp https://twitter.com/FloryCorp
  5. Pinterest: http://www.pinterest.com/florycorp/

Flory’s Hopewell Junction Mahopac Fishkill New York Convenience Gas Delis iPredator Michael Nuccitelli Image Michael Nuccitelli, Psy.D. | Florys Donation Appreciated

 (click image to save contact information image)

This writer was truly surprised when receiving Flory’s donation, given iPredator Inc. has never solicited other businesses for funds to help defer operating expenses. As stated above, Flory’s donation will be immediately funneled to website and blog updates, recent and upcoming legal expenses and ongoing internet safety initiatives focused on educating young children and their parents about online safety. Although WordPress and GoDaddy combine to make iPredator, Dark Psychology & Dr. Internet Safety excellent resources for site visitors, the administration and fees involved to ensure they load fast and cyber secure with responsive designs for mobile devices can be costly.

From a legal expenditure standpoint, few Americans would disagree with reality that America has become a litigious society. Spending time in civil courts, engaged in suing business for inane reasons, have become commonplace until America commits to national Tort Reform. Given this unfortunate reality, Flory’s donation will be used if legal counsel is required for this writer, Michael Nuccitelli, Psy.D. and iPredator Inc. Most important and valuable to this writer is that the Flory’s donation will be used for internet safety and cyber attack prevention education information. At the time of authoring this post, it is October 2014 and National Bullying Prevention Month here in the United States. The amount of educational information this writer and other iPredator Inc. associates hope to publish is enormous. This writer would like to say one thing and one thing only to Flory’s.

Thank You Mr. Flory From Dr. Nuccitelli iPredator Image Michael Nuccitelli, Psy.D. | Florys Donation Appreciated

Grazie per il tuo aiuto Mr. Flory!

Michael Nuccitelli, Psy.D.:  Michael Nuccitelli, Psy.D. is a New York State licensed psychologist, forensic consultant and author of the Information Age dark side of human consciousness construct, iPredator. He completed his doctoral degree in clinical psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the criminal/deviant side of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their website, offering site visitors an incredible amount of information, education and advisory services.

Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations. Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist for 10 years and worked in the field of forensic psychology conducting evaluations and consultation for attorneys and court systems. Dr. Nuccitelli has extensive career and academic experiences. His areas of expertise include internet safety, forensic & criminal psychology, cybercriminal psychology, psychiatric illness, addictions and developmental psychology.

He is an avid follower of national & criminal news and enjoys educating the public by interacting with the media. Dr. Nuccitelli continues to investigate and expand his construct he has designed called iPredator. Dr. Nuccitelli can be reached 7 days a week by calling 347-871-2416 or emailing him at drnucc@ipredatorinc.com.

Florys New York Convenience Gas Delis Mahopac Fishkill Hopewell Junction Michael Nuccitelli iPredator Image Michael Nuccitelli, Psy.D. | Florys Donation Appreciated

Thank You Flory Corp.

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Florys New York Convenience Gas Delis South Street Seaport New York City Michael Nuccitelli iPredatorImage Michael Nuccitelli, Psy.D. | Florys Donation Appreciated

1 2 3 4 5 63 64