Darkside of Human Consciousness Definition
Crime, Deviance, Immorality & iPredators
Dark Psychology includes all criminal and deviant behaviors committed upon other innocent victims. Although many people are intrigued by the discussion of the psychopaths and serial killers, the vast majority of predators hunting human prey are not engaged in murder or sexual deviance. If this writer were to make an estimate, he would put the percentage of human predators at roughly 70% who are out to victimize others, but are not involved in murder or sexual deviance. The remaining 30% are the most dangerous because they seek physical human contact.
This writer has constructed what he believes is a sound theory of the human predator. Dark Psychology assumes what lives within all of us is a potential reservoir of violent malicious energy. All human aggressive and hostile dysfunctional behavior lies on a continuum of purposiveness defined by this writer as the Dark Continuum. Most of these behaviors lie somewhere on the Dark Continuum with most being in the category of subtle, mild and with fleeting thoughts and minor shortfalls. The reality though is Dark Psychology is a universal phenomenon, and there is no dispute all of us, at times in our lives, have had at least thoughts of sheer violence and predatory fantasies.
The difference is that the vast majority of humanity has never acted upon those thoughts. The reason is that we have a low Dark Factor equation compared to the predators. The Dark Factor is the realm, place and potential that exists in all of us and is part of the human condition. This concept is one of the more abstract terms of Dark Psychology, because it is so hard to illustrate via the written expression. For criminal and deviant people, their Dark Factor is elevated; influencing them to move in a direction towards what many define as evil and this writer defines as a trajectory accelerating towards the Dark Singularity.
Alfred Adler’s theories were a powerful influence in this writer’s creation of Dark Psychology. He strongly adheres to Adler’s philosophy that behavior is purposive. The only slight philosophical divergence from Adler is this writer’s belief that all behavior is 99% purposive. He holds the remaining 1% as being within the realm of the black hole of the Dark Singularity. The black hole of the singularity is the area of evil that the predator comes close to, but never reaches.
The Dark Singularity is the potential in all of us to behave as a predator, hunting human prey completely and utterly devoid of purpose. This writer also strongly subscribes to Adler’s theory of subjective processing. Dark Psychology and the human predator have a highly distorted perceptual filtering mechanism. For them, it is no longer about being compassionate and kind. Their subjective processing colors all of their thoughts, emotions and perceptions with blackness and venom.
At some point in the development of the human predator, he/she actuates his thoughts and feelings and starts down the long road of what contemporary criminologist call psychopathy. Within time, their subjective processing filter becomes divorced from experiencing remorse. They come to perceive that the victimization of others is deserved by those who are too naive to protect themselves.
Given that, a large portion of human development surrounds social acceptance, the predator somehow moves into the arena where his Dark Factor becomes an active force fueling an urge for the destruction of others. Once touched by the realm of psychopathy, he has entered the point of no return. Just as light cannot escape a black hole, the human predator cannot escape the path towards the Dark Singularity.
Interviews conducted by forensic investigators and research scientists with convicted notorious psychopaths have proven the theory of accelerated movement towards the Dark Singularity. Some believe this accelerated trajectory to victimize others is more similar to compulsive dependency theory. Although this writer agrees with the compulsive dependency hypothesis of increased needs by human predators to victimize others, Dark Psychology assumes these needs can become needless and less purposive.
Not only have psychopaths divulged a perception of experiencing a sense that their evil acts accelerate in frequency, but also their experience of acting as predator takes on an addictive quality. Using cosmology once again as a metaphor for Dark Psychology, the closer matter approaches a black hole, the faster mass accelerates and can never swing away from the black hole’s awesome gravity. Interviews with psychopaths almost exactly mimic this universal law of astrophysics.
As society moves further into what is defined as the Information Age filled with digital technology and cyberspace, Dark Psychology and its impact on humanity will be tested at greater rates. Given the veil of anonymity cyberspace offers all humanity, the question remains is if the nefarious aspects living within all of us will recognize there is a realm of free reign called the digital universe.
“Dark Psychology is the study of the chasm within us all, which only few enter, and even fewer ever exit. Without a natural predator to cause humans to rally, we prey upon one another.” Michael Nuccitelli, Psy.D. (2006)
Dark Psychology, iPredator & iPredator Bridge
iPredator Inc. has expertise in cyberbullying, cyberstalking, child predators, cybercrime, cyber psychology, cyber terrorism and Internet safety. Their goal is to reduce victimization, abuse, theft and disparagement from online assailants. Their website, launched June 2012, is the first step to educate, train, assist and advise online users and organizations on the dangers on the Internet. Chief Executive Officer, Dr. Michael Nuccitelli is a New York State licensed psychologist and certified forensic consultant who created the theoretical construct termed, iPredator.
In 2006, Dr. Nuccitelli developed his construct, Dark Psychology, which attempts to define all criminal and deviant human behavior. In 2009, he formulated his second construct, iPredator, which delves into the minds of those who use Information and Communications Technology (ICT) for nefarious and malevolent reasons. As all of contemporary society thrives in the Information Age, iPredator, Dark Psychology and the iPredator Bridge will remain permanent fixtures for many years to come. Provided for you are brief definitions of this writer’s three constructs below.
Dark Psychology: Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior.
Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time. It is the remaining 1%, Dark Psychology parts from Adlerian theory and Teleology. Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic.
Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.
iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.
Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer and distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
- A self-awareness of causing harm to others, directly or indirectly, using ICT.
- The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
- A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.
iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology (ICT) to harm others. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to fully engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this nefarious and malevolent realm and either proceed in their maladaptive trajectory or cease and desist.
The iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung (1875-1961) and his construct of the Collective Unconscious.
Given that humanity is at the beginning of the Information Age, the motivating factors that lead some people to cross over into engaging in asocial behaviors using ICT cannot be explained. The concept of iPredator and iPredator Bridge construct assumes that ICT has unknown effects upon the mind and influence some to engage in destructive and self-destructive patterns. The creation of ICT and cyberspace is equivalent to the philosophical and psychological societal awe that was created when an astronaut took his first step upon the moon. Just as Neil Armstrong (8/5/30 – 8/25/12) stepped into a new celestial territory, humanity is doing the same here on Earth. This new territory is the abstract and artificial electronic universe known as cyberspace.
ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the sociopath, deviant, narcissist or classic criminal, but part of a new generation that will be permanent fixtures to humanity for centuries to follow.
Cyber Stalking: Cyber stalking is defined as the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyber stalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyber stalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.
To meet the criteria of cyber stalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones using ICT. Examples of psychological threats involve using disparagement, humiliation, dis-information dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyber stalker’s demands.
: Cyber harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Cyber harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target. Although cyber harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations devoid of the need to control, dominate or manipulate their target.
Cyberbullying: Like classic bullying, cyberbullying is harmful, repeated and hostile behavior intended to taunt, deprecate & defame a targeted child. Cyberbullying describes threatening or disparaging information against a target child delivered through Information and Communications Technology (ICT.) Unlike classic bullying, cyberbullying includes a phenomenon called Cyberbullying by proxy. Cyberbullying by proxy occurs when a cyberbully encourages or persuades others to engage in deprecating and harassing a target child.
is a dangerous form of cyberbullying because adults may become the accomplices to the cyberbully involved in the harassment and do not know they are dealing with a child or someone they may know. A cyberbully is usually driven by a need for peer acceptance, but may engage in these maladaptive behaviors out of ignorance of the distress they cause a target child, or the most malevolent form, feels minimal remorse for the harm they are inflicting upon the target child.
Cybercrime: Cybercrime is defined as crimes and criminal activity committed on the Internet using Information and Communications Technology as the tools to target victims. All forms of cybercrime involve both Information and Communications Technology and a targeted victim(s). Cybercrime is segmented into two distinct categories involving the focus of the cyber criminal activities. These activities are focalized on the technology of ICT to achieve the cyber criminal’s aims for personal and financial gain or targeted at the person using the Information and Communications Technology.
When the individual is the main target of cybercrime, ICT is the tool rather than the target. These are the crimes, which have existed for centuries in offline societies. Scams, Theft and Fraud have existed long before the development of information technology. Cyber criminals utilize technological tools that increase their potential pool of victims and make them difficult to identify and apprehend. Cybercrime targets people, property or governments using Information and Communications Technology.
Cyber Terrorism: Cyber Terrorism is defined as the use of Information and Communications Technology (ICT) by iPredators, organized groups and/or terrorist groups to advance their agenda motivated by religious, political and/or philosophical ideologies. Examples of cyber terrorism include 1. The use of ICT to organize and execute attacks against networks, and Information and Communications Technology (ICT) infrastructures. 2. The exchanging of information or making threats electronically. 3. The act of hacking into computer systems. 4. Introducing viruses and malware to vulnerable networks. 5. Defacement of websites and blogs. 6. Denial-of-service attacks 7. Terroristic threats made via electronic communication.
When strategic cyber-attacks are motivated for financial gain, these attacks are defined as cybercrime. Cyber terrorism is any premeditated, politically, religious or philosophically motivated attack against information, computer systems, computer programs and data, which results in violence against non-combatant targets by sub-national groups or clandestine agents. A cyber terrorist attack is designed to cause physical violence or extreme financial harm to the targeted victims or community.
According to the U.S. Commission of Critical Infrastructure Protection, cyber terrorist targets include the banking industry, military installations, power plants, air traffic control centers and water systems. The F.B.I. define cyber terrorism as “The premeditated, politically motivated attack against information, computer systems, computer programs and data which result in violence against noncombatant targets by sub-national groups or clandestine agents.”
Online Sexual Predation
Online Sexual Predation: The typology of iPredator that is categorized in Online Sexual Predators has a variety of different terms used to describe the same patterns and motivations for their abuse. Online Sexual Predators are defined as adult online users who seek to exploit vulnerable children or adolescents for sexual or other abusive purposes. Online Sexual Predators are sexual predators who use Information and Communications Technology and the Internet to locate, target and victimize minors. Common forums used by Online Sexual Predators to target children include chat rooms, instant messaging or social networking sites for the purpose of flirting with and meeting others for illicit sexual experiences.
Online Sexual Predators often are motivated to manipulate or “groom” a minor with the ultimate goal of meeting and engaging in sexual activity, despite knowing they are engaging in illegal activities. In instances where meeting their victims to engage in sexual activities is not the primary objective, Online Sexual Predators also attempt to persuade children and adolescents to participate in some form of online sexual and/or sexually provocative activity motivated by sexual deviance and/or for financial gain engaging in the distribution and sale of child pornography.
Michael Nuccitelli, Psy.D.
Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler University. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.
iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files. For tweens and teens, iPredator Inc. created Dr. Internet Safety. For young children, K-5, Cyber Tyger, Troll Man and the Cyber Tyger vs. Troll Man struggle are used to introduce basic internet safety concepts.
Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at firstname.lastname@example.org.
- Google Plus: iPredator
- Google Plus: Dark Psychology
- Google Plus: Michael Nuccitelli, Psy.D.
- Linked In: iPredator
- Twitter: TheiPredator
- YouTube: iPredator Team
- Facebook: The iPredator
- Pinterest: iPredator Inc.
“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)
- IPREDATOR INC.
- CEO: Michael Nuccitelli, Psy.D.
- NYS Licensed Psychologist
- New York, USA
- Ph:(347) 871-2416
- Blog I:Dark Psychology
- Blog II: Internet Safety
“The study, exploration and understanding of iPredator are the first steps in the humanization of global Information and Communications Technology. By understanding iPredator, humanity walks safely in cyberspace.” Michael Nuccitelli, Psy.D. (2012)