Tag Archives: Dark Psychology

Cyberstalking Protection Checklist [CSPC] | Dark Psychology

Cyberstalking Prevention Stalking Online Vulnerability Assessments Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Cyberstalking Protection Checklist [CSPC] | Dark Psychology

Cyberstalking Prevention Checklist [CSPC]

The Cyberstalking Prevention Checklist [CSPC] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Cyberstalking Prevention Checklist [CSPC] assesses an online users online risk activities, cyberstalking vulnerabilities and internet safety prowess. Designed to be multi-functional, the Cyberstalking Prevention Checklist [CSPC] is a structured checklist for diagnostics, education, investigation and data collection. The CSPC can also be used for compiling evidentiary information for authorities, Internet Service Providers and the legal system if the online user is suspected of being cyberstalked by an online assailant[s]. Developed by Dr. Nuccitelli, the structured checklist is used for cyberstalking prevention, education, investigation and risk potential.

Cyberstalking is the use of Information and Communications Technology [ICT] to monitor, harass and taunt others themed with implied or actual physical threats. Cyberstalking is a criminal act in many states and continues to grow as a national problem. To help online users prevent cyberstalking victimization, Dr. Nuccitelli designed the Cyberstalking Prevention Checklist [CSPC]. In addition to developing the CSPC, Dr. Nuccitelli designed 25 other online risk assessment tools specific to the typology, age of online user and organization.

CSPC Cyberstalking Protection Checklist CSPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc Cyberstalking Protection Checklist [CSPC] | Dark Psychology

Cyberstalking Assessment

Just as all the checklist risk assessments [IISC Collection], the CSPC can be purchased in the abridged or full version. Both tools include the exact same assessment instrument, but the full version includes the scoring key without having to visit the iPredator scoring key page and has a considerable amount of additional internet safety and cyber attack prevention relevant information used for education and assessment. A full version tool purchase also enables the consumer to contact iPredator Inc. for consultation at no cost. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase. If you prefer not to speak with iPredator Inc., provided here are the direct links to purchase at their website.

I. Cyberstalking Prevention Checklist CSPC [Full Version] $149.95 [USD]
II.
Cyberstalking Prevention Checklist CSPC [Abridged Version] $59.95 [USD]

Cyberstalking Prevention Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Cyberstalking Protection Checklist [CSPC] | Dark Psychology

Cyberstalking Prevention Checklist Definition

Cyberstalking Prevention Checklist [CSPC]: The Cyberstalking Prevention Checklist is a 100-item data collection, diagnostic and educational tool designed to validate and confirm the preparedness of an Information and Communications Technology user, business or organization of being cyber stalked and/or cyber harassed. The CSPC investigates personal and/or corporate vulnerability of being targeted, disparaged, harassed, monitored or infiltrated by cyber criminals, cyber terrorist, cyberstalkers, disgruntled ex-partners, disgruntled past employees/customers or nefarious corporate competitors.

Areas examined in the CSPC include online risk behaviors, identity theft potential, personal and financial information protection, ICT safety, cyber security and cyberstalking preparedness. An adult, business, public figure or associate of a public figure age 18+ completes the CSPC. For purposes of the cyberstalking preparedness the CSPC has been designed to investigate, this checklist combines aspects of cyberstalking, cyber harassment and cyberbullying if the subject being queried is a minor.

The CSPC can also be used, as a data collection instrument to present to authorities if an Information and Communications Technology user is actively being cyberstalked or cyber harassed. The CSPC has been designed with the knowledge that cyberstalking is both a methodology used by assailants and a typology of offender who engages in the behavior of cyberstalking. The CSPC also addresses the growth of mobile device technology and attempts by cyberstalkers to infiltrate their target’s mobile devices.

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

iPredator Inc. Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Cyberstalking Protection Checklist [CSPC] | Dark Psychology

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, “It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

Cyberstalking Protection Checklist CSPC internet safety tools caduceus cyber attack risk assessments internet safety checklists ipredator michael nuccitelli authored image Cyberstalking Protection Checklist [CSPC] | Dark Psychology

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II.The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III.A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”Michael Nuccitelli, Psy.D. [2012]

Cyberstalking Prevention Checklist CSPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Horizontal Image Cyberstalking Protection Checklist [CSPC] | Dark Psychology

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

Cyberstalking Prevention Checklist CSPC Cyber Attack Risk Assessment Internet Safety Tool Michael Nuccitelli iPredator Authored 600px Wide Image Cyberstalking Protection Checklist [CSPC] | Dark Psychology

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.”Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

Cyber Safety Cyber Attack Risk Assessments Internet Safety Tools Internet Safety Checklists iPredator Michael Nuccitelli Authored Image Cyberstalking Protection Checklist [CSPC] | Dark Psychology

iPredator Inc. Resources

IPREDATOR INC. INTERNET SAFETY TOOLS CYBER ATTACK RISK ASSESSMENT INTERNET SAFETY TEST INTERNET SAFETY IPREDATOR MICHAEL NUCCITELLI AUTHORED IMAGE Cyberstalking Protection Checklist [CSPC] | Dark Psychology

iPredator Inc.

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA].

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections]. iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

Internet Safety Tools Internet Safety Checklist Psychology ISCP Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Cyberstalking Protection Checklist [CSPC] | Dark Psychology

iPredator Inc. Founder:Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

Made in the USA Cyberstalking Protection Checklist CSPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Cyberstalking Protection Checklist [CSPC] | Dark Psychology

Author: Michael Nuccitelli, Psy.D.

Google

by iPredator Inc.

Find us on Google+

by Dark Psychology

Find us on Google+

Online Predator Prevention Checklist [OPPC] | Dark Psychology

Online Predator Prevention Checklist OPPC Cyber Attack Risk Assessment Internet Safety Tool Michael Nuccitelli iPredator Authored 600px Wide Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

Online Predator Prevention Checklist [OPPC]

TheOnline Predator Prevention Checklist [OPPC] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Online Predator Prevention Checklist [OPPC] assesses an online users online risk activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the Online Predator Prevention Checklist [OPPC] is a structured checklist for diagnostics, education, investigation and data collection. The OPPC can also be used for compiling evidentiary information for authorities, Internet Service Providers and the legal system if the online user is suspected of being sexually solicited by an online assailant[s].

The OPPC helps parents, educators and primary caregivers assess a child’s risk of being targeted by an online sexual predator. The online predator is an adult sexual predator that uses information technology to seek out children driven by criminal and deviant fantasies. Having no internet police or “cyber authorities” to protect children in cyberspace, online predators revel in the freedom to troll for kids at their leisure. As founder of iPredator Inc., Dr. Nuccitelli has designed the Online Predator Prevention Checklist.

OPPC Online Predator Prevention Checklist OPPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Text Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

Online Sexual Predator Prevention

In addition to developing the OPPC, Dr. Nuccitelli designed 25 other internet safety and risk assessment tools specific to the typology, age of online user and organization. Just as all the checklist risk assessments [IISC Collection], the OPPC can be purchased in the abridged or full version. Both tools include the exact same assessment instrument, but the full version has a considerable amount of additional cyber attack prevention relevant information used for education and assessment.

Just as all the checklist risk assessments [IISC Collection], the OPPC can be purchased in the abridged or full version. Both tools include the exact same assessment instrument, but the full version includes the scoring key without having to visit the iPredator scoring key page and has a considerable amount of additional internet safety and cyber attack prevention relevant information used for education and assessment. A full version tool purchase also enables the consumer to contact iPredator Inc. for consultation at no cost. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase. If you prefer not to speak with iPredator Inc., provided here are the direct links to purchase at their website.

I. Online Predator Prevention Checklist-OPPC [Full Version] $149.95 [USD]
II.
Online Predator Prevention Checklist-OPPC [Abridged Version] $59.95 [USD]

Digital Reputation Protection Checklist DRPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Image1 Online Predator Prevention Checklist [OPPC] | Dark Psychology

Online Predator Prevention Checklist Definition

Online Predator Prevention Checklist [OPPC]: The Online Predator Prevention Checklist is a 100-item data collection & educational tool designed to educate and investigate a child, adolescent or young adult’s vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators. The OPPC investigates areas developmentally relevant to a child and young adult, ages 11-21, which can increase their levels of vulnerability. These areas include sexuality, intimate partnerships, curiosity and motivation for peer group acceptance.

A parent, primary care giver, educator or pediatric professional completes the OPPC, or if developmentally appropriate, can be completed in tandem with the subject child. In addition to being a data collection & educational tool, the OPPC can also be used as an adjunct to allow teachers, educators and pediatric professionals interview, collect data and engage in a dialogue with children on their Information and Communications Technology [ICT] practices.

The OPPC combines common factors causing children to be sexually solicited, harassed and targeted by online sexual predators. The factors most problematic for children the OPPC explores include inappropriate personal information disclosure, high-risk ICT behaviors and minimal iPredator awareness. Furthermore, the OPPC takes into consideration the reality that most pediatric sexual victimization occurs by offenders they are familiar with, close in age and often manipulated into consenting to sexual activities. The OPPC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Online Predator Prevention Internet Predators Online Vulnerability Assessments Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, “It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

IPREDATOR INC Adult Internet Safety Checklist AISC Internet Safety Tool Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II.The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III.A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”Michael Nuccitelli, Psy.D. [2012]

Digital Reputation Protection Checklist DRPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Horizontal Image1 Online Predator Prevention Checklist [OPPC] | Dark Psychology

Cyberstealth

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

Online Vulnerability Assessments Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to humanity for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.”Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

iPredator Inc. Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

iPredator Inc. Resources

IPREDATOR INC. INTERNET SAFETY TOOLS CYBER ATTACK RISK ASSESSMENT INTERNET SAFETY TEST INTERNET SAFETY IPREDATOR MICHAEL NUCCITELLI AUTHORED IMAGE Online Predator Prevention Checklist [OPPC] | Dark Psychology

iPredator Inc.

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA].

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections]. iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

iPredator Inc. Founder:Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

Made in the USA Online Predator Prevention Checklist OPPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Online Predator Prevention Checklist [OPPC] | Dark Psychology

Author: Michael Nuccitelli, Psy.D.

Google

by iPredator Inc.

Find us on Google+

by Dark Psychology

Find us on Google+

Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Digital Reputation Protection Checklist DRPC Cyber Attack Risk Assessment Internet Safety Tool Michael Nuccitelli iPredator Authored 600px Wide Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Digital Reputation Protection Checklist [DRPC]

The Digital Reputation Protection Checklist [DRPC] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Digital Reputation Protection Checklist [DRPC] assesses an online users online reputation management practices, cyber attack vulnerabilities and internet safety knowledge. Designed to be multi-functional, the Digital Reputation Protection Checklist [DRPC] is a structured checklist for diagnostics, education, investigation and data collection. The DRPC can also be used for compiling evidentiary information for authorities, Internet Service Providers and the legal system if the online user is suspected of being cyber attacked by an online assailant[s]. Developed by Dr. Nuccitelli, the Digital Reputation Protection Checklist [DRPC] helps online users and businesses monitor and track their online reputation.

Online Reputation Management

Digital Reputation [aka Online Reputation] is a term used to describe the reputation of an Information and Communications Technology [ICT] user or business that is disseminated online and available to peers, superiors, loved ones and consumers. This information can be positive or negative and vital to the health, success and reputation of an ICT user or business.

DRPC Digital Reputation Protection Checklist DRPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Text Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Just as all the checklist risk assessments [IISC Collection], the DRPC can be purchased in the abridged or full version. Both tools include the exact same assessment instrument, but the full version includes the scoring key without having to visit the iPredator scoring key page and has a considerable amount of additional internet safety and cyber attack prevention relevant information used for education and assessment. A full version tool purchase also enables the consumer to contact iPredator Inc. for consultation at no cost. To view a sample of the items that are used in internet safety tools, feel free to visit iPredator Inc.’s cyber risk list web page or clicking on this link: Cyber Risk List.

Internet Safety Advocate Discount: Reserved for online users, parents, organizations and professionals actively seeking to educate their community or loved ones in cyber attack prevention, all internet safety tools are significantly discounted by verifying your activism or activism plans. As iPredator Inc.’s mission is to inspire a nationally sustained prevention education campaign, interested parties contact iPredator Inc., 347-871-2416, speak with Dr. Nuccitelli or an iPredator Inc. associate, verbalize your internet safety themed activism, and negotiate a discounted fee for purchase. If you prefer not to speak with iPredator Inc., provided here are the direct links to purchase at their website.

I. Digital Reputation Protection Checklist-DRPC [Full Version] $149.95 [USD]
II
Digital Reputation Protection Checklist-DRPC [Abridged Version] $59.95 [USD]

Digital Reputation Protection Checklist DRPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Digital Reputation Protection Checklist [DRPC] Definition

Digital Reputation Protection Checklist [DRPC]:The Digital Reputation Protection Checklist is a 100-item checklist designed for an Information and Communications Technology user and/or their business to monitor, protect and manage their digital reputation. Digital Reputation [a.k.a. Online Reputation] is a term used to describe the reputation of an Information and Communications Technology user or business that is disseminated online, created and sustained by peers, school, work associates, loved ones, acquaintances, consumers, competitors, adversaries, online strangers and iPredators.

This information can be positive or negative and vital to the success, growth and health of an Information and Communications Technology user or business. The DRPC is a data collection & assessment tool that investigates a business’s vulnerability of being targeted, disparaged, slandered, stolen from or infiltrated by cyber criminals, disgruntled past employees, angry customers or nefarious corporate competitors.

The DRPC focuses on the Information and Communications Technology user and the business’s cyber-security breach potential, digital reputation acumen and capacity to successfully institute online reputation prevention and protection strategies. With the rapid growth and expansion of Information and Communications Technology, all businesses, professionals, students and online users are now required to address both cyber security and digital reputation management. The DRPC also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Digital Reputation Protection Checklist DRPC Internet Safety Tool Cyber Attack Risk Assessment iPredator Inc. Michael Nuccitelli Authored Horizontal Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, “It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

digital reputation protection checklist drpc internet safety tools caduceus cyber attack risk assessments internet safety checklists ipredator michael nuccitelli authored image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II.The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III.A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target.

Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.”Michael Nuccitelli, Psy.D. [2012]

Cyber Safety Cyber Attack Risk Assessments Internet Safety Tools Internet Safety Checklists iPredator Michael Nuccitelli Authored Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Cyberstealth

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to humanity for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.”Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

Internet Safety Checklists Internet Safety Tools Cyber Attack Risk Assessment iPredator Michael Nuccitelli Authored Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

iPredator Inc. Resources

IPREDATOR INC. INTERNET SAFETY TOOLS CYBER ATTACK RISK ASSESSMENT INTERNET SAFETY TEST INTERNET SAFETY IPREDATOR MICHAEL NUCCITELLI AUTHORED IMAGE Digital Reputation Protection Checklist [DRPC] | Dark Psychology

iPredator Inc.

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.

For consumers seeking internet safety education and cyber-attack protection, feel free to read about iPredator Inc.’s innovative advisory-based membership service called, iPredator Protected. With the growth and expansion of social media, Dr. Nuccitelli and iPredator Inc. offers a unique assessment service called the iPredator Facebook Safety Analysis [iFSA].

In addition to offering advice, education and investigation, Dr. Nuccitelli has designed 26 internet safety and cyber attack prevention checklists and inventories [IISC & IPI Collections]. iPredator Inc. also offers abridged versions [IISC Collection-Abridged] that are less expensive and geared more for individual online users. All of Dr. Nuccitelli’s checklists and inventories were designed for assessment, diagnostics, education and prevention education.

Dr. Nuccitelli can be reached at DrNucc@iPredatorInc.com. The iPredator website offers site visitors an enormous database on Cybercriminal Psychology, Internet Safety and iPredators. Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit their social sites planned to be their major information and announcement vehicles.

iPredator Inc. Internet Safety Tools Internet Safety Checklists Cyber Attack Risk Assessments iPredator Michael Nuccitelli Authored Image Digital Reputation Protection Checklist [DRPC] | Dark Psychology

iPredator Inc. Founder:Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, forensic consultant & author of the theoretical constructs, iPredator & Dark Psychology. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State [License # 013009.] In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners Institute [Identification # 103110.] Given the nature of Information Age deception online, Dr. Nuccitelli is available to contact and always prepared to forward documentation of his identity and degrees for verification.

Author: Michael Nuccitelli, Psy.D.

Google

by iPredator Inc.

Find us on Google+

by Dark Psychology

Find us on Google+

Post Navigation