Online Predator Prevention Checklist [OPPC] | Dark Psychology

share
google Online Predator Prevention Checklist [OPPC] | Dark Psychologytwitter Online Predator Prevention Checklist [OPPC] | Dark Psychologyfacebook Online Predator Prevention Checklist [OPPC] | Dark Psychologypinterest Online Predator Prevention Checklist [OPPC] | Dark Psychologytumblr Online Predator Prevention Checklist [OPPC] | Dark Psychologylinkedin Online Predator Prevention Checklist [OPPC] | Dark Psychologyprint Online Predator Prevention Checklist [OPPC] | Dark Psychology

Online Predator Prevention Checklist OPPC Cyber Attack Risk Assessment Internet Safety Tool Michael Nuccitelli iPredator Authored 600px Wide Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

Online Predator Prevention Checklist [OPPC]

TheOnline Predator Prevention Checklist [OPPC] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Online Predator Prevention Checklist [OPPC] assesses an online users online risk activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the Online Predator Prevention Checklist [OPPC] is a structured checklist for diagnostics, education, investigation and data collection. The OPPC can also be used for compiling evidentiary information for authorities, Internet Service Providers and the legal system if the online user is suspected of being sexually solicited by an online assailant[s].

The OPPC helps parents, educators and primary caregivers assess a child’s risk of being targeted by an online sexual predator. The online predator is an adult sexual predator that uses information technology to seek out children driven by criminal and deviant fantasies. Having no internet police or “cyber authorities” to protect children in cyberspace, online predators revel in the freedom to troll for kids at their leisure. As founder of iPredator Inc., Dr. Nuccitelli has designed the Online Predator Prevention Checklist.

OPPC Online Predator Prevention Checklist OPPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Text Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

Online Sexual Predator Prevention

In addition to developing the OPPC, Dr. Nuccitelli designed 25 other internet safety and risk assessment tools specific to the typology, age of online user and organization. Just as all the checklist risk assessments [IISC Collection], the OPPC can be purchased in the abridged or full version. Both tools include the exact same assessment instrument, but the full version has a considerable amount of additional cyber attack prevention relevant information used for education and assessment.

Just as all the checklist risk assessments [IISC Collection], the OPPC can be purchased in the abridged or full version. Both tools include the exact same assessment instrument, but the full version includes the scoring key without having to visit the iPredator scoring key page and has a considerable amount of additional internet safety and cyber attack prevention relevant information used for education and assessment. A full version tool purchase also enables the consumer to contact iPredator Inc. for consultation at no cost. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase. If you prefer not to speak with iPredator Inc., provided here are the direct links to purchase at their website.

I. Online Predator Prevention Checklist-OPPC [Full Version] $149.95 [USD]
II.
Online Predator Prevention Checklist-OPPC [Abridged Version] $59.95 [USD]

Digital Reputation Protection Checklist DRPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Image1 Online Predator Prevention Checklist [OPPC] | Dark Psychology

Online Predator Prevention Checklist Definition

Online Predator Prevention Checklist [OPPC]: The Online Predator Prevention Checklist is a 100-item data collection & educational tool designed to educate and investigate a child, adolescent or young adult’s vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators. The OPPC investigates areas developmentally relevant to a child and young adult, ages 11-21, which can increase their levels of vulnerability. These areas include sexuality, intimate partnerships, curiosity and motivation for peer group acceptance.

A parent, primary care giver, educator or pediatric professional completes the OPPC, or if developmentally appropriate, can be completed in tandem with the subject child. In addition to being a data collection & educational tool, the OPPC can also be used as an adjunct to allow teachers, educators and pediatric professionals interview, collect data and engage in a dialogue with children on their Information and Communications Technology [ICT] practices.

The OPPC combines common factors causing children to be sexually solicited, harassed and targeted by online sexual predators. The factors most problematic for children the OPPC explores include inappropriate personal information disclosure, high-risk ICT behaviors and minimal iPredator awareness. Furthermore, the OPPC takes into consideration the reality that most pediatric sexual victimization occurs by offenders they are familiar with, close in age and often manipulated into consenting to sexual activities. The OPPC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Online Predator Prevention Internet Predators Online Vulnerability Assessments Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, “It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

IPREDATOR INC Adult Internet Safety Checklist AISC Internet Safety Tool Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II.The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III.A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”Michael Nuccitelli, Psy.D. [2012]

Digital Reputation Protection Checklist DRPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Horizontal Image1 Online Predator Prevention Checklist [OPPC] | Dark Psychology

Cyberstealth

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

Online Vulnerability Assessments Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to humanity for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.”Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

iPredator Inc. Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

iPredator Inc. Resources

IPREDATOR INC. INTERNET SAFETY TOOLS CYBER ATTACK RISK ASSESSMENT INTERNET SAFETY TEST INTERNET SAFETY IPREDATOR MICHAEL NUCCITELLI AUTHORED IMAGE Online Predator Prevention Checklist [OPPC] | Dark Psychology

iPredator Inc.

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA].

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections]. iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

iPredator Inc. Founder:Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

Made in the USA Online Predator Prevention Checklist OPPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

share
google Online Predator Prevention Checklist [OPPC] | Dark Psychologytwitter Online Predator Prevention Checklist [OPPC] | Dark Psychologyfacebook Online Predator Prevention Checklist [OPPC] | Dark Psychologypinterest Online Predator Prevention Checklist [OPPC] | Dark Psychologytumblr Online Predator Prevention Checklist [OPPC] | Dark Psychologylinkedin Online Predator Prevention Checklist [OPPC] | Dark Psychologyprint Online Predator Prevention Checklist [OPPC] | Dark Psychology

Author: Michael Nuccitelli, Psy.D.

Google

by iPredator Inc.

Find us on Google+

by Dark Psychology

Find us on Google+

Digital Reputation Protection Checklist [DRPC] | Dark Psychology

share
google Digital Reputation Protection Checklist [DRPC] | Dark Psychologytwitter Digital Reputation Protection Checklist [DRPC] | Dark Psychologyfacebook Digital Reputation Protection Checklist [DRPC] | Dark Psychologypinterest Digital Reputation Protection Checklist [DRPC] | Dark Psychologytumblr Digital Reputation Protection Checklist [DRPC] | Dark Psychologylinkedin Digital Reputation Protection Checklist [DRPC] | Dark Psychologyprint Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Digital Reputation Protection Checklist DRPC Cyber Attack Risk Assessment Internet Safety Tool Michael Nuccitelli iPredator Authored 600px Wide Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Digital Reputation Protection Checklist [DRPC]

The Digital Reputation Protection Checklist [DRPC] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Digital Reputation Protection Checklist [DRPC] assesses an online users online reputation management practices, cyber attack vulnerabilities and internet safety knowledge. Designed to be multi-functional, the Digital Reputation Protection Checklist [DRPC] is a structured checklist for diagnostics, education, investigation and data collection. The DRPC can also be used for compiling evidentiary information for authorities, Internet Service Providers and the legal system if the online user is suspected of being cyber attacked by an online assailant[s]. Developed by Dr. Nuccitelli, the Digital Reputation Protection Checklist [DRPC] helps online users and businesses monitor and track their online reputation.

Online Reputation Management

Digital Reputation [aka Online Reputation] is a term used to describe the reputation of an Information and Communications Technology [ICT] user or business that is disseminated online and available to peers, superiors, loved ones and consumers. This information can be positive or negative and vital to the health, success and reputation of an ICT user or business.

DRPC Digital Reputation Protection Checklist DRPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Text Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Just as all the checklist risk assessments [IISC Collection], the DRPC can be purchased in the abridged or full version. Both tools include the exact same assessment instrument, but the full version includes the scoring key without having to visit the iPredator scoring key page and has a considerable amount of additional internet safety and cyber attack prevention relevant information used for education and assessment. A full version tool purchase also enables the consumer to contact iPredator Inc. for consultation at no cost. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase. If you prefer not to speak with iPredator Inc., provided here are the direct links to purchase at their website.

I. Digital Reputation Protection Checklist-DRPC [Full Version] $149.95 [USD]
II
Digital Reputation Protection Checklist-DRPC [Abridged Version] $59.95 [USD]

Digital Reputation Protection Checklist DRPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Digital Reputation Protection Checklist [DRPC] Definition

Digital Reputation Protection Checklist [DRPC]:The Digital Reputation Protection Checklist is a 100-item checklist designed for an Information and Communications Technology user and/or their business to monitor, protect and manage their digital reputation. Digital Reputation [a.k.a. Online Reputation] is a term used to describe the reputation of an Information and Communications Technology user or business that is disseminated online, created and sustained by peers, school, work associates, loved ones, acquaintances, consumers, competitors, adversaries, online strangers and iPredators.

This information can be positive or negative and vital to the success, growth and health of an Information and Communications Technology user or business. The DRPC is a data collection & assessment tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees, angry customers or nefarious corporate competitors.

The DRPC focuses on the Information and Communications Technology user and the business’s cyber-security breach potential, digital reputation acumen and capacity to successfully institute online reputation prevention and protection strategies. With the rapid growth and expansion of Information and Communications Technology, all businesses, professionals, students and online users are now required to address both cyber security and digital reputation management. The DRPC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Digital Reputation Protection Checklist DRPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Horizontal Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, “It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

digital reputation protection checklist drpc internet safety tools caduceus cyber attack risk assessments internet safety checklists ipredator michael nuccitelli authored image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II.The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III.A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”Michael Nuccitelli, Psy.D. [2012]

Cyber Safety Cyber Attack Risk Assessments Internet Safety Tools Internet Safety Checklists iPredator Michael Nuccitelli Authored Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Cyberstealth

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to humanity for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.”Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

Internet Safety Checklists Internet Safety Tools Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

iPredator Inc. Resources

IPREDATOR INC. INTERNET SAFETY TOOLS CYBER ATTACK RISK ASSESSMENT INTERNET SAFETY TEST INTERNET SAFETY IPREDATOR MICHAEL NUCCITELLI AUTHORED IMAGE Digital Reputation Protection Checklist [DRPC] | Dark Psychology

iPredator Inc.

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA].

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections]. iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

iPredator Inc. Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

iPredator Inc. Founder:Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

share
google Digital Reputation Protection Checklist [DRPC] | Dark Psychologytwitter Digital Reputation Protection Checklist [DRPC] | Dark Psychologyfacebook Digital Reputation Protection Checklist [DRPC] | Dark Psychologypinterest Digital Reputation Protection Checklist [DRPC] | Dark Psychologytumblr Digital Reputation Protection Checklist [DRPC] | Dark Psychologylinkedin Digital Reputation Protection Checklist [DRPC] | Dark Psychologyprint Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Author: Michael Nuccitelli, Psy.D.

Google

by iPredator Inc.

Find us on Google+

by Dark Psychology

Find us on Google+

The Peter Pinho Radio Network | PPRN | Internet Radio Host Trolls

share
google The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollstwitter The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollsfacebook The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollspinterest The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollstumblr The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollslinkedin The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollsprint The Peter Pinho Radio Network | PPRN | Internet Radio Host Trolls

Peter Pinho Radio Network Show PPRN Internet Radio Host Trolls iPredator Image The Peter Pinho Radio Network | PPRN | Internet Radio Host Trolls

The Peter Pinho Radio Network | Internet Radio Host Trolls

On The Peter Pinho Radio Network [PPRN], this writer was a guest expert on April 16, 2014, scheduled to discuss the Darkside of Cyberspace, Online Psychopathy and Internet Trolls. The Peter Pinho Radio Network defines their 3-4 hour show as uncensored and adult humor themed. Having never heard of the  Peter Pinho Radio Network show, this writer emailed them a guest introduction responding to their post on  www.RadioGuestList.com seeking guests. Without going into details, this writer was scheduled for a telephonic interview just as he had done many times before. The show announcement and podcast link is as follows:

The Peter Pinho Radio Network

Show Title: CT Sirens and Beat City Beauties Live

Show Date:April 16, 2014

Time:7pm-11pm EST

PPRN Show Direct Link

This writer’s appearance and what occurred both during and after the show was the motivating force to write to this article . Not having listened to any of their past shows prior to scheduling, this writer was embarrassed, frustrated and ashamed for having been a guest. Not that they shocked or angered this writer, but having been called, emailed and personally advised by various associates was where  this writer’s humiliation stemmed. This writer takes full responsibility for agreeing to appear on their show and not quickly ended contact oncethe Peter Pinho Radio Network’s  unprofessional agenda was quickly observed. It is up to the reader and online listener to decide if their claims of being the best of news, entertainment, comedy, sports and talk radio show online. For anyone who may embark on educating others within the realm of internet radio, three tips are as follows:

  1. I did not listen to three different shows, for at least 10 minutes, to get a feel for who they were, what they were about and how they treated their guests prior to agreeing to be a guest
  2. I should have never answered their call in the first place, immediately hung up or stated I could not stay after the first break once hearing what they define as an adult comedy themed talk show. As advised by some other radio broadcast hosts who later listened to a portion of the show, I should have ended the interview as quickly as possible, given they had little interest in educating their listeners and clearly was not a real information show.
  3. I should have never dropped to their level and used profanity, as they did, to answer the few questions I was asked. Even though I thought it would  fit with their style, my use of profanity was unprofessional.

The Peter Pinho Radio Network PPRN Internet Radio Broadcast Host Trolls iPredator Image The Peter Pinho Radio Network | PPRN | Internet Radio Host Trolls

 

Internet Troll Definition

Internet Trolls and Internet Trolling (aka, Cyber Harassment) are terms describing online users who harass, control, provoke or habitually disparage a child, adult, business or group using Information and Communications Technology (ICT). Usually not knowing their targets, trolls use ICT to provoke, inflame or defame others they rarely know offline or online. Provided for the reader below is a brief Internet Troll definition. Internet Trolls are a subset of aggressive online users who engage in cyber harassment. The primary difference is Internet trolls typically do not know the person they are targeting and will likely never meet that person offline. Internet Troll and Trolling are very subjective terms and used to describe many similar, but variable, events. For example, online users can troll other online users or a group of online users who share similar qualities. This is a behavioral term describing an online behavior that does not necessarily have to be motivated for criminal or nefarious reasons.

Internet Radio Show Trolls

Internet radio show trolling is a play on words for describing  The Peter Pinho Radio Network and how they use cyberspace and Information and Communications Technology to deprecate and defame their guests and a variety of issues. Although Internet Trolls typically target online users randomly and have never met or spoken to their targets, the Peter Pinho Radio Network show is close in typology. Just as internet trolls, the PPRN hosts gain personal satisfaction from jeering their guests. Referencing this definition of an Internet Troll above,  PPRN fits the profile quite well. If any of the PPRN hosts do come across this post, this writer strongly suspects they will take the information presented as a compliment and badge of honor. Just as true Internet Trolls, the Peter Pinho Radio Network hosts will use this article as a declaration of their radio broadcast irreverence.

Unfortunately, PPRN and the rest of  Internet Radio Show Trolls are not supported or viewed as being skillful in their juvenile antics. This writer has no ill will towards the Peter Pinho Radio Network, other than having no idea why they wanted to book this forensic psychologist  to discuss his cyber criminology constructs. There was no introduction of whom this writer was, what he did, his internet safety website, constructs or means to contact for their few listeners. If anything, PPRN uses their guests for jeering and provocation. Not that this writer is devoid of a sense of humor, but online sexual predation, cyberstalking, internet trolling and online psychopathy are not topics to be mocked.

The prime reason for this writer posting this article is to educate readers on the dangers of defaming others online. As the reader will learn below, real Internet Trolls are not all online users simply teasing unknown targets. Both at the beginning,  during, when they hung up on this writer, and soon after PPRN was finished, this writer was sent two emails by an unknown Internet Troll. For the first time in his professional career, the Troll’s message was not attacking this writer, but the Peter Pinho Radio Network.

Not but one, but two emails were sent to this writer anonymously. Internet radio show trolls need to know the information they share may be heard by those trolling themselves seeking out targets. It is not that shows like PPRN need to change their broadcast format, but temper their shallow tactics and habitual attempts to embarrass others. Most disconcerting for PPRN is the Troll’s last line in his first message. There is no way to know for sure if one day PPRN will be habitually attacked, but the troll’s seconds email, with the last minute of the show when one of the hosts called this writer a troll is an example of what they need to temper.

 

The Peter Pinho Radio Network PPRN Internet Radio Host Trolls iPredator Image The Peter Pinho Radio Network | PPRN | Internet Radio Host Trolls

The Peter Pinho Radio Network Internet Radio Show Links

Below are the two emails from the Internet Troll who wrote during the show and soon after the show’s end. The emails were untraceable and he/she may have read this writer’s show announcement from the social media posts. Although not targeting this writer, the last sentence is why this post was written to educate others on the importance of digital citizenship and internet safety.

Troll’s First Email

“Gotta give ya credit Doc! Because of wannabees like PPRN is why we troll. I listened for bout 15 minutes, threw up, then quickly swallowed my puke. Sorry, if I wanted to listen to a triad of complete assholes like those three, I’d spend a Friday night at a tranny bar in Staten Island  Worst internet show I’ve ever heard. Like being in a room with 4 country ass wannabees. Betcha if I listened to their podcast archives, every fucking show includes beans, porn, tits, swallowing cum and degradation. It wouldn’t take me but 5 minutes to find something proving tout themselves as the next Howard Stern or shock jock troop.

And you say we’re psychopathic? No wonder why they only get 20 people to listen live to their horseshit. Like 95% of all internet radio shows, they tell everyone most of their listeners are “archived listeners” and they are in the 1000’s. Tomorrow morning, I’ll be sure to pass on their podcast so everyone else can hear what little whitecracker bitches they are. Guaranteed, they’re all white ass mutha fuckers, pathetically ugly and live to fuck with people disguised as radio comedy. I may occasionally troll, but even I wouldn’t waste my time on their fecal minds. Let them know they have nothing to worry about being trolled, cause no one will waste their time. I’d rather be caught fucking a 4 year old than having my friends know I actually trolled them. You watch, before they end their carnie listening circus, they’ll target niggers, fags and trannies.

I also guarantee that once they’re done with you, one of them will say something to make you sound like an asshole. lol…I’m not even a forensic shrink, like you, to predict that shit. And they’re stupid enough to post their Twitter and a fucking Google map showing they’re in Southbury, CT? You’d be an utter asshole to ever go back on their show. If you are stupid enough, let them know one thing.”

 

The Peter Pinho Radio Network PPRN Internet Radio Host Trolls iPredator Internet Safety Image The Peter Pinho Radio Network | PPRN | Internet Radio Host Trolls

We’re Watching, Not Listening but Watching!

Troll’s Second Email

Approximately 2-3 hours after the show was over, this writer received a second Troll email that was short and copies of what they included in the subject line and message body. Their message is as follows:  Email Subject Text: As Fucking Predicted 245.46 Minutes Email Message Text: As Fucking Predicted 245.46 Minutes

PPRN Reverbnation Public Biography

Sounds Like: Howard Stern

Mission: Fantastic, funny, uncensored, & LIVE talk radio! Not since “Two for Tuesday” & “Double Play Wednesday” has anything so amazing happened to America! 8-11pm every Tuesday & Wednesday! World domination one listener at a time!

Biography: Started in The Year of Our Lord Two Thousand & Twelve by Peter Pinho with the intention of spreading joy, laughter, & drug related information, it has quickly become a beacon for justice and freedom! Come, listen, & enjoy!

Description: Live talk radio every Tuesday & Wednesday 8pm to 11pm Eastern Standard Time! Listen each week as a group of fantastic radio talents brings you the latest & greatest that FREE radio has to offer! Like racism, drugs, sex, music, & some geek shit? Well so do we! Can’t listen live? Download every episode for free at Spreaker.

Personal Interests: To make people laugh PPRN, The Peter Pinho Radio Network, seeks All Types of Experts, No Discrimination We are looking for all types of guests, from musicians, authors, TV personalities, medical / psychological experts…etc. The Peter Pinho Radio Network Radio Guest List Classified Show

Name: PPRN The Peter Pinho Radio Network

Show Description: Funny and uncut with no scripts… anything goes… Uncensored! Booking

Contact for Interviews: Candace or Steve 203-992-7776

Email Address: pprnlive@gmail.com

Audience Demographics for Your Show: 18-65 men and women Audience Size for Your Show and Source for Your Claim: 31,000 plus total listens, all over the world

Show Format: Internet Radio Show &Recorded Podcast Broadcast Schedule: LIVE shows run Tuesday and Wednesday Nights 7:00-10:00 pm EST Show URL: http://www.spreaker.com/show/the_peter_pinho_radio_network

 

Spreaker Community Guidelines

Spreaker is an open and free community where every user has the right to chat and share ideas while broadcasting good music. However there are some Community Guidelines which should be respected. These Guidelines are here to help you understand what it means to be a member of Spreaker. Don’t forget that your use of Spreaker is subject to these Community Guidelines and our Terms of use. By uploading or creating any piece of content on the Spreaker site, you are stating that you have read and accepted our Community Guidelines. While Using Spreaker

  • Use common sense. We’re a community made of many different individuals. Diversity is our strength and our beauty, but all users have the right to feel safe and comfortable using our website. So, be responsible and respect our guidelines.
  • Be respectful to each other. There is no tolerance for predatory behaviour, disparaging or defamatory comments, threats, harassment, illegal activities, invading privacy, racial hatred, discrimination of any kind, offensive cultural behaviour, vulgar or obscene content, or other inappropriate behaviour or the revealing of other members’ personal information.
  • Comply with law. Make sure you comply with all applicable rules and laws. Do not promote information that you know or think is criminal or illegal.

Spreaker reserves the right to investigate and take appropriate legal action against anyone who, in Spreaker’s sole discretion, is in breach of these Community Guidelines, including without limitation, removing the offending content from the Spreaker site without notice and terminating the username of such users. Spreaker will determine in its sole discretion whether content and/or conduct is in breach of these Community Guidelines. We will update these Community Guidelines from time to time, so please check this page regularly. If you wish to flag inappropriate material to Spreaker, please send an email referring the episode and the exact episode timing when these guidelines have been broken.

PPRN The Peter Pinho Radio Network PPINHO PPRNLIVE Peter Pinho Radio Network show PPRN Image The Peter Pinho Radio Network | PPRN | Internet Radio Host Trolls

iPredator Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

The three criteria used to define an iPredator include: I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target. Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

iPredator Resource Links

Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image The Peter Pinho Radio Network | PPRN | Internet Radio Host Trolls

iPredator Inc.

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies. For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected.

With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA]. In addition to ofering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections]. iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

Internet Radio Broadcast Host Trolls

share
google The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollstwitter The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollsfacebook The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollspinterest The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollstumblr The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollslinkedin The Peter Pinho Radio Network | PPRN | Internet Radio Host Trollsprint The Peter Pinho Radio Network | PPRN | Internet Radio Host Trolls

Author: Michael Nuccitelli, Psy.D.

Google

by iPredator Inc.

Find us on Google+

by Dark Psychology

Find us on Google+

Post Navigation