Troll Man & Cyber Tyger Information

 

a-troll-man-cyber-tyger-ipredator-michael-nuccitelli-authored-internet-safety-image

Troll Man and Cyber Tyger

Free Child Cyber Safety Information

Troll Man and Cyber Tyger are two internet safety character concepts I created a couple years ago to teach young children (K-5) basic internet safety skills. Having many other priorities in launching iPredator Inc. and helping online users, Troll Man and Cyber Tyger always remained web pages on our web site with plans to address and then launch them step-by-step. Troll Man and Cyber Tyger are internet safety characters with the goal of one day finding a special graphic designer to create vector images so they could be properly launched to schools, parents and anyone with young children. Troll Man and Cyber Tyger have always been public domain and free to anyone. The goal is to enable Cyber Tyger to become a partner to McGruff the Crime Dog if he is lucky enough. Until then, below you can review and download, at no cost, the web pages and images I created to help educate young children about internet safety and cyber attack prevention.

To download/print any of the web pages linked below, simply click on the print button at the top or bottom of all our website or blog pages. As of December 2014, our Dark Psychology and Dr. Internet Safety blogs have new Troll Man and Cyber Tyger pages. To download images, simply right click on any image and then choose “save as” in your drop down menu. Pasted in this announcement blog post are brief definitions of Troll Man and Cyber Tyger, their web page links and then a brief biography of our NYS internet safety company, iPredator Inc. Our contact details are pasted below and as Cyber Tyger always shouts,

Take a Megabyte out of Cybercrime!

a-troll-man-cyber-tyger-ipredator-michael-nuccitelli-authored-internet-safety-image

CYBER TYGER

Cyber Tyger (aka, Cybr Tygrrr!) is a young white tiger superhero who protects young kids online (K-5). Cyber Tyger helps protect kids from cyberbullies and the dangers of cyberspace. When he was born, the doctors used digital technology to help his mother’s birth, which gave him super cyber powers. Cyber Tyger and his adversaries, including his archenemy Troll Man, were originally conceived in 2011 to educate young kids about internet safety and cyber attack prevention. Cyber Tyger and Troll Man were designed to introduce internet safety concepts to young children (K-5).

TROLL MAN

Troll Man (aka, Trollman) is a pediatric internet safety super villain, internet safety character, online scoundrel and enemy of the internet safety superhero, Cyber Tyger, who protects young children (K-5). Cyber Tyger and his adversaries, including Troll Man’s profile, were originally conceived in 2011 as a means to educate young children about internet safety and cyber attack prevention. As a Cyborg with digital powers, Troll Man travels through cyberspace cheating, lying and stealing from online users. Troll Man and Cyber Tyger were designed to introduce internet safety concepts to young children (K-5).

a-troll-man-cyber-tyger-ipredator-michael-nuccitelli-authored-internet-safety-image

TROLL MAN & CYBER TYGER PAGES

  • Cyber Tyger-Internet Safety Super Villain for Kids-2015
  • Visit Dark Psychology to read about Dr. Nuccitelli’s Cyber Tyger pediatric internet safety super hero character 2015 updates for young children.
  • https://darkpsychology.co/cyber-tyger-2015/
  • Troll Man-Internet Safety Super Villain for Kids-2015
  • Visit Dark Psychology to read about Dr. Nuccitelli’s Troll Man pediatric internet safety super villain character 2015 updates for young children.
  • https://darkpsychology.co/troll-man-trollman/
  • Troll Man vs. Cyber Tyger-Internet Safety for Kids
  • Visit Dark Psychology to read or download, at no cost, about internet safety for kid’s characters, Cyber Tyger and Troll Man by Michael Nuccitelli, Psy.D.
  • https://darkpsychology.co/troll-man-cyber-tyger/
  • Troll Man-Pediatric Internet Safety Super Villain-2015
  • Visit Dr. Internet Safety to read about Dr. Nuccitelli’s Troll Man pediatric internet safety super villain character 2015 updates for young children.
  • https://drinternetsafety.com/troll-man-trollman/
  • Cyber Tyger-Pediatric Internet Safety Super Hero-2015
  • Visit Dr. Internet Safety to read about Dr. Nuccitelli’s Cyber Tyger pediatric internet safety super hero character 2015 updates for young children.
  • https://drinternetsafety.com/cyber-tyger-2015/
  • Troll Man vs. Cyber Tyger-Child Internet Safety Characters
  • Visit Dr. Internet Safety to read or download, at no cost, about internet safety for kid’s mascots, Cyber Tyger and Troll Man by Michael Nuccitelli, Psy.D.
  • https://drinternetsafety.com/troll-man-vs-cyber-tyger/

Visit Dark Psychology or Dr. Internet Safety to download, at no cost, iPredator's internet safety for kids characters, Troll Man and Cyber Tyger.

  • Troll Man-Internet Safety for Kids-What is Troll Man
  • Visit iPredator’s Troll Man webpage to review or download, at no cost, information about the pediatric internet troll super villain called Troll Man.
  • https://www.ipredator.co/troll-man/
  • Cyber Tyger-Pediatric Internet Safety Super Hero
  • Visit iPredator’s Cyber Tyger webpage to review or download, at no cost, information about the pediatric internet safety super hero called Cyber Tyger.
  • https://www.ipredator.co/cyber-tyger/
  • Cyber Tyger and Troll Man | Internet Safety for Kids
  • Visit iPredator to read or download, at no cost, about internet safety for kid’s characters, Cyber Tyger and Troll Man by Michael Nuccitelli, Psy.D.
  • https://www.ipredator.co/cyber-tyger-and-troll-man/

a-troll-man-cyber-tyger-ipredator-michael-nuccitelli-authored-internet-safety-image

PSA DISCLAIMER

iPredator Inc.’s internet safety themed content and images are public domain, free to download and does not require attribution. However, iPredator Inc. does not allow plagiarism or claims that parties other than iPredator Inc. are the authors. All concepts, constructs and commercial products offered at our websites, sister blogs and social networking sites are protected by copyright. Everything we disseminate is public domain and free to use, but not to profit from by stating you are the intellectual property owner. In the age of Copyright and Patent Trolls, it is unfortunate we have to state this claim.

a-troll-man-cyber-tyger-ipredator-michael-nuccitelli-authored-internet-safety-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler  University. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files. For tweens and teens, iPredator Inc. created Dr. Internet Safety. For young children, K-5, Cyber Tyger, Troll Man and the Cyber Tyger vs. Troll Man struggle are used to introduce basic internet safety concepts.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at info@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

 

a-troll-man-cyber-tyger-ipredator-michael-nuccitelli-authored-internet-safety-image

Take a Megabyte out of Cybercrime!

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

a-troll-man-cyber-tyger-ipredator-michael-nuccitelli-authored-internet-safety-image

Internet Predator Internet Safety Exam

Internet Predator Internet Safety Exam-iPredator Inc.

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Internet Predator

The iPredator Probability Inventory-Internet Predator [IPI-IP]  is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. TheiPredator Probability Inventory-Internet Predator [IPI-IP] assesses a child’s online risk activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the iPredator Probability Inventory-Internet Predator [IPI-IP]  is a structured checklist for diagnostics, education, investigation and data collection. The IPI-IP can also be used for compiling evidentiary information for law enforcement, Internet Service Providers, school officials and the legal system if the online user is suspected of being targeted by an internet predator.

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

An online sexual predator prevention tool, called the iPredator Probability Inventory-Internet Predator [IPI-IP] has been released by iPredator Inc. Developed by Dr. Nuccitelli, the IPI-IP was designed to help parents, educators and pediatric professionals assess a child’s risk of being targeted by online sexual predators. The online sexual predator engages in the criminal and deviant acts of sextortion and internet predation, which are two of the most egregious forms of Information Age social issues. Although adults can be targeted, the primary victim pool, for online sexual predators, is ignorant, distressed or discouraged children. Unfortunately, American society continues to minimize online sexual predation’s rapid growth and the severe psychological devastation caused to the child victim.

In addition to developing this inventory, Dr. Nuccitelli designed 25 other internet safety and risk assessment tools specific to the typology, age of online user and organization. To view a sample of the items that are used in all of the internet safety tools, feel free to visit iPredator Inc.’s cyber risk checklist page by clicking on this link: iPredator Cyber Risk Checklist Page

To contact iPredator Inc. directly, with questions, or to order the tool via telephone, please call 347-871-2416. He can also be contacted by email at mailto:info@ipredatorinc.com

I. iPredator Probability Inventory-Internet Predator [IPI-IP]  $125.00 [USD]

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Internet Predator Definition

iPredator Probability Inventory-Internet Predator [IPI-IP]: The iPredator Probability Inventory-Internet Predator is a 110-question data collection, diagnostic and educational tool designed to assess a child, adolescent or young adult’s preparedness, vulnerability and risk potential of being targeted, sexually solicited and/or victimized by online sexual predators. A parent, primary caregiver, school official or pediatric professional completes the IPI-IP. In addition to being a diagnostic tool and inventory, the IPI-IP can also be used as an adjunct to a mental health and/or forensic assessment.

The IPI-IP is designed for children, adolescents and young adults ages 6-21. Just as all the IPI Assessment Collection inventories, the IPI-IP focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for internet safety and preparedness if cyber attacked.

As Dr. Nuccitelli states, “The hours involved in creating the 26 internet safety and cyber attack prevention tools surpassed the time it took me to complete my doctoral dissertation threefold. I also know Information Age victimization will have me conducting research for decades to come. iPredator Inc.’s mission is to strike the proverbial match igniting a national discussion and intervention plan and how to stop the societal disconnection.”

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying,It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer and distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. [2012]

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive, nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Inc. Resources

an-ipredator-probability-inventory-internet-predator-ipip-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler  University. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files. For tweens and teens, iPredator Inc. created Dr. Internet Safety. For young children, K-5, Cyber Tyger, Troll Man and the Cyber Tyger vs. Troll Man struggle are used to introduce basic internet safety concepts.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at info@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

internet-predator-internet-safety-exam-michael-nuccitelli-psy.d.-dark-psychology-ipredator-ipredator-inc.

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Cybercrime Internet Safety Exam-iPredator Inc.

Cybercrime Internet Safety Exam-iPredator Inc.

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Cybercrime [IPI-C]

TheiPredator Probability Inventory-Cybercrime [IPI-C] is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. TheiPredator Probability Inventory-Cybercrime [IPI-C] assesses a business or adult’s high-risk online activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, theiPredator Probability Inventory-Cybercrime [IPI-C] is a structured inventory for diagnostics, education, investigation and data collection. TheIPI-C can also be used for compiling evidentiary information for authorities, Internet Service Providers and the legal system if the online user or business is being cyber attacked by an online assailant[s].

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Developed by Michael Nuccitelli Psy.D., the structured inventory is used for cybercrime prevention, diagnostics, education and investigation. Cybercrime, Identity Theft and Telecommunications Piracy are three new terms defining criminal activities in the Information Age. To help online users prevent cybercrime victimization, Dr. Nuccitelli has designed theiPredator Probability Inventory-Cybercrime [IPI-C]. In addition to developing the IPI-C, Dr. Nuccitelli designed 25 other online risk assessment tools specific to the typology, age of online user and organization. In addition to developing this inventory, Dr. Nuccitelli designed 25 other internet safety and risk assessment tools specific to the typology, age of online user and organization. To view a sample of the items that are used in all of the internet safety tools, feel free to visit iPredator Inc.’s cyber risk checklist page by clicking on this link: iPredator Cyber Risk Checklist Page

To contact iPredator Inc. directly, with questions, or to order the tool via telephone, please call 347-871-2416. He can also be contacted by email at mailto:info@ipredatorinc.com

I. iPredator Probability Inventory-Cybercrime [IPI-C] $159.95 [USD]

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Cybercrime [IPI-C] Definition

iPredator Probability Inventory-Cybercrime [IPI-C]: The IPI-C is a 110 question diagnostic, education, assessment and data collection tool designed to assess and investigate an adult or business’s probability of being targeted, disparaged, stolen from or infiltrated by iPredators or nefarious corporate competitors engaged in cybercriminal activities. An adult age 18+, business owner or corporate associate familiar with the business’s health and safety completes the IPI-C.

Just as all the IPI Assessment Collection inventories, the IPI-C focuses on the adult or business’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology [ICT] activities and their practice of the behavioral actions necessary for Internet safety, cybercrime prevention and preparedness if cyber attacked. In addition to a diagnostic and data collection tool, the IPI-C can also be used to assist an online user or a business to investigate their security breach weaknesses if they have been victimized by cybercrime. The IPI-C also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer and distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. [2012]

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Inc. Resources

a-ipredator-probability-inventory-cybercrime-ipic-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler  University. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files. For tweens and teens, iPredator Inc. created Dr. Internet Safety. For young children, K-5, Cyber Tyger, Troll Man and the Cyber Tyger vs. Troll Man struggle are used to introduce basic internet safety concepts.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at info@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

cybercrime-internet-safety-exam-michael-nuccitelli-psy.d.-dark-psychology-ipredator-ipredator-inc.

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Cyberstalker Identification Interview-iPredator Inc.

Cyberstalker Identification Interview-iPredator Inc.

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstalker Identification Interview [CSII]

The Cyberstalker Identification Interview [CSII] is an internet safety tool and cyberstalker identification assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The Cyberstalker Identification Interview [CSII] helps an online user to assess his/her online risk activities, cyber attack vulnerabilities and the identity of a cyberstalker if being targeted. Designed to be multi-functional, the Cyberstalker Identification Interview [CSII] is a structured identification interview for education, investigation and data collection. The CSII can also be used for compiling evidentiary information for law enforcement, Internet Service Providers and the legal system if the online user is seeking to identify a cyberstalker.

A comprehensive cyberstalker identification tool has been released for purchase by iPredator Inc. Developed by Dr. Nuccitelli, the Cyber Stalker Identification Interview [CSII] helps online users identify unknown cyberstalkers or compile the relevant data if the identity of the cyberstalker is known. As  author of the CSII, Dr. Nuccitelli is available to assist CSII users before and after they have purchased the tool at no cost.

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

A cyberstalker is a criminal, deviant, severely disturbed or disgruntled ex-partner that uses Information and Communications Technology to taunt, harm, manipulate and control other online users. To prevent cyberstalking victimization and identification if the assailant is unknown, Dr. Nuccitelli created the Cyber Stalker Identification Interview [CSII.] In addition to developing the CSII, Dr. Nuccitelli designed 25 other online risk assessment tools specific to the typology, age of online user and organization. The CSII is a 75 question diagnostic and investigation tool designed to examine an online user’s cyberstalking risks & internet safety practices.

In addition to developing this inventory, Dr. Nuccitelli designed 25 other internet safety and risk assessment tools specific to the typology, age of online user and organization. To view a sample of the items that are used in all of the internet safety tools, feel free to visit iPredator Inc.’s cyber risk checklist page by clicking on this link: iPredator Cyber Risk Checklist Page

To contact iPredator Inc. directly, with questions, or to order the tool via telephone, please call 347-871-2416. He can also be contacted by email at mailto:info@ipredatorinc.com

I. Cyber Stalker Identification Interview [CSII]   $80.00 [USD]

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyber Stalker Identification Interview [CSII] Definition

Cyber Stalker Identification Interview [CSII]: The Cyber Stalker Identification Interview [CSII] is a 75 question diagnostic and data collection tool designed to achieve a three-fold purpose. The three functions include A. Assess the vulnerability and preparedness of a child, adolescent, adult, business or public figure of being cyber stalked, internet trolled or cyber harassed. B. Assist law enforcement, legal professionals, parents, adults and businesses in collecting data on the identity of an unknown cyber stalker. C. Assess the extent and skills of the cyber stalker’s tactics and the target’s Information and Communications Technology [ICT] weaknesses and high-risk behaviors the cyber stalker is attacking.

For purposes of the target vulnerability estimate, the CSII has been formatted to investigate aspects of cyberstalking, cyber harassment and cyberbullying if the target is a minor. Provided below is a sample of the CSII questions. Based on the rationale for completing the CSII, the person conducting or completing the interview is advised to interpret the questions as follows: I. If the cyber stalker is known or his/her identity is suspected, the questions are straight forward and formatted for this event. II. If the identity of the cyberstalker is unknown, the questions should be premised with, “If the cyber stalker were known,” and then read the question and note responses accordingly.

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

CSII Term Acronyms

I. CS: A suspected, alleged, confirmed or unknown person or group engaged in cyberstalking another person, group or organization using information and communications technology.  II. Target: A person, group or organization that is being taunted, harassed, disparaged or abused using Information and Communications Technology [ICT] by a suspected, alleged, confirmed or unknown person or group.

  • Does the CS have a motive or suspected motive? [Note examples whether factual or alleged.]
  • Are the harassing threats or central themes sexual, obsessive or violent in nature or a combination of the three? [Note examples whether factual or alleged.]
  • Has the CS posted and/or disclosed personal information about the target that the target is unable to understand how the CS obtained the personal information? [Note examples.]
  • Has the CS ever followed or suspected of following the target appearing in their home or place of business? [Note when, where, how often and last reported incident.]
  • Has the CS persuaded other ICT users into harassing or threatening the target by utilizing online bulletin boards or chat rooms? [Note examples and/or names of websites.]

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying, It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer and distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. [2012]

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

a-cyberstalker-identification-interview-csii-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler  University. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files. For tweens and teens, iPredator Inc. created Dr. Internet Safety. For young children, K-5, Cyber Tyger, Troll Man and the Cyber Tyger vs. Troll Man struggle are used to introduce basic internet safety concepts.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at info@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

cyberstalker-identification-interview-michael-nuccitelli-psy.d.-dark-psychology-ipredator-ipredator-inc.

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Cyberstalking Internet Safety Exam-iPredator Inc.

Cyberstalking Internet Safety Exam-iPredator Inc.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Cyberstalking [IPI-CS]

The iPredator Probability Inventory-Cyberstalking [IPI-CS]  is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The iPredator Probability Inventory-Cyberstalking [IPI-CS] assesses a child’s online risk activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the iPredator Probability Inventory-Cyberstalking [IPI-CS]  is a structured inventory for diagnostics, education, investigation and data collection. The IPI-CS can also be used for compiling evidentiary information for law enforcement, Internet Service Providers and the legal system if the online user is being suspected of being cyberstalked. Developed by Dr. Nuccitelli, the IPI-CS was designed to help online users assess their potential of being cyberstalked.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstalking is the use of the internet and Information and Communications Technology [ICT] to taunt, tease, disparage and monitor a target victim[s]. Unlike cyber harassment, internet trolling and cyberbullying, cyberstalking requires a direct or implied physical threat within the harmful information being disseminated. The IPI-CS is a 110-question diagnostic and education tool designed to examine an online user’s cyberstalking risks & internet safety practices. In addition to developing this inventory, Dr. Nuccitelli designed 25 other internet safety and risk assessment tools specific to the typology, age of online user and organization. To view a sample of the items that are used in all of the internet safety tools, feel free to visit iPredator Inc.’s cyber risk checklist page by clicking on this link: iPredator Cyber Risk Checklist Page

To contact iPredator Inc. directly, with questions, or to order the tool via telephone, please call 347-871-2416. He can also be contacted by email at mailto:info@ipredatorinc.com

I. iPredator Probability Inventory-Cyberstalking [IPI-CS] $125.00 [USD]

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Cyberstalking [IPI-CS] Definition

iPredator Probability Inventory-Cyberstalking [IPI-CS]: The iPredator Probability Inventory- Cyberstalking is a 110-question diagnostic, education, assessment and data collection tool designed to assess the probability and preparedness of a young adult, adult or public figure of being cyberstalked. In addition to cyberstalking, the IPI-CS investigates the subject’s potential of being cyber harassed by an ex-partner, ex-associate, fan, nefarious corporate entity or pathologically driven online user.

Just as all the IPI Assessment Collection inventories, the IPI-CS focuses on the subject’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their online activities and behavioral actions necessary for internet safety and preparedness if cyber attacked. For purposes of the probability estimate the IPI-CS has been designed to assess, this inventory combines aspects of cyberstalking, cyber harassment and habitual online personal disparagement.

An adult, public figure or associate of a public figure, ages 18+, completes the IPI-CS. Once completed, the IPI score, ranging from 0-110, represents the preparedness, vulnerability and risk potential of being targeted by an iPredator engaged in cybercrime, cyberstalking, cyber harassment or cyberbullying, if the subject being queried is a minor. The IPI-CS can be used as both a cyberstalking prevention tool and data collection instrument if the online user or business is presently being cyberstalked. The IPI-CS also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying,It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer and distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli, Psy.D. [2012]

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Inc. Resources

an-ipredator-probability-inventory-cyberstalking-ipi-cs-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler  University. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files. For tweens and teens, iPredator Inc. created Dr. Internet Safety. For young children, K-5, Cyber Tyger, Troll Man and the Cyber Tyger vs. Troll Man struggle are used to introduce basic internet safety concepts.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at info@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

cyberstalking-internet-safety-exam-michael-nuccitelli-psy.d.-dark-psychology-ipredator-ipredator-inc.

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Cyberbully Abuser Internet Safety Exam-iPredator Inc.

Cyberbully Abuser Internet Safety Exam-iPredator Inc.

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]

The iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]  is an internet safety tool and cyber attack risk assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, certified forensic consultant and iPredator Inc. founder. The iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA] assesses a child’s online risk activities, cyber attack vulnerabilities and internet safety prowess. Designed to be multi-functional, the iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]  is a structured inventory for diagnostics, education, investigation and data collection. The IPI-CBA can also be used for compiling evidentiary information for law enforcement, Internet Service Providers, school officials and the legal system if the child is suspected of being a cyberbully.

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Developed by Dr. Nuccitelli, the IPI-CBA helps parents, educators and pediatric professionals investigate a child’s probability of engaging in harmful online activity towards a targeted child. The cyberbully is a child who engages teasing, taunting and disparagement of a target child using the internet and Information and Communications Technology (ICT.) As America is starting to address this growing societal epidemic, few parents, primary caregivers and educators take into consideration, it is another child who is the assailant. The IPI- CBA is a 110-question diagnostic and education tool designed to examine a child’s risk of being a cyberbully or cyberbully bystander.

In addition to developing this inventory, Dr. Nuccitelli designed 25 other internet safety and risk assessment tools specific to the typology, age of online user and organization. To view a sample of the items that are used in all of the internet safety tools, feel free to visit iPredator Inc.’s cyber risk checklist page by clicking on this link: iPredator Cyber Risk Checklist Page

To contact iPredator Inc. directly, with questions, or to order the tool via telephone, please call 347-871-2416. He can also be contacted by email at mailto:info@ipredatorinc.com

I. iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]  $125.00 [USD]

iPredator Probability Inventory-Cyberbully Abuser Definition

iPredator Probability Inventory-Cyberbully Abuser [IPI-CBA]: The iPredator Probability Inventory-Cyberbully Abuser is a 110 question diagnostic, education, assessment and data collection tool designed to investigate a child or adolescent’s online probability and potential to intimidate, humiliate and taunt other children engaging in online harassment and cyberbullying. A parent, primary caregiver and school official or pediatric professional complete the IPI-CBA for children, and adolescents ages 6-17.

Just as all the IPI Assessment Collection inventories, the IPI-CBA focuses on the child’s relationship to ICT, their knowledge base of malevolent and nefarious users, environmental aspects influencing their Information and Communications Technology (ICT) activities and their practice of the behavioral actions necessary for non-adversarial and appropriate online activities.

Once completed, the IPI score, ranging from 0-110, represents the vulnerability and risk potential of the child becoming a cyberbully abuser, both cyberbully target and abuser or cyberbully bystander. The IPI-CBA can be used as both a cyberbullying assessment tool for children and a data collection instrument for parents and educators investigating cyberbullying episodes involving their child or student. Similar to the IPI-CB, the IPI-CBA investigates the knowledge and understanding parents and/or educators have relevant to investigating the cyberbully abuser. The IPI-CBA also addresses the growth of mobile device technology and attempts by iPredators to infiltrate their target’s mobile devices.

cyberbully-abuser-internet-safety-exam-michael-nuccitelli-psy.d.-dark-psychology-ipredator-ipredator-inc.

Cyberbullying: Cyberbullying is the use of Information and Communications Technology between minors to humiliate, taunt and disparage one another. Cyberbullying is intended to tease, embarrass, deprecate & defame a targeted minor with the assailant’s developmental needs for peer acceptance and recognition being a priori. Dissimilar to physical bullying, cyberbullying does not involve face-to-face contact and primarily occurs online using electronic devices as the tools for information dissemination. Unlike classic bullying, cyber bullying includes a phenomenon called Cyber Bullying by proxy.

Cyber bullying by proxy occurs when a cyber bully encourages or persuades others to engage in deprecating and harassing a target child. Cyber bullying by proxy is a dangerous form of cyber bullying because adults may become the accomplices to the cyber bully involved in the harassment and do not know they are dealing with a child or someone they may know. A cyberbully is usually driven by a need for peer acceptance, but may engage in these maladaptive behaviors out of ignorance of the distress they cause a target child, or the most malevolent form, feels minimal remorse for the harm they are inflicting upon the target child.

Visit Dark Psychology  to purchase or learn about the “iPredator Probability Inventory-Cyberbully Abuser” authored by iPredator CEO, Dr. Nuccitelli.

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to function as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.

Cyber Attack Risk Assessment & Educational Tool

Dr. Nuccitelli is quoted saying,It amazes me how some teens are able to both survive and thrive in the Information Age. Cyberbullying, cyberstalking, online sexual predation and cyber harassment await them every day if they let down their guard in cyberspace. Not only support, encourage and educate your children on internet safety, but tell them how impressed with their capacity to stay safe you are.”

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer and distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Cyberstealth Definition

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology [ICT] , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called cyber deception. Given the internet inherently affords everyone anonymity, Cyberstealth, used by iPredators, range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators.

This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, online deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, their level of Cyberstealth complexity, digital footprint, victim preferences, ICT skills and behavioral patterns are used to identify who they are.

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Information Age Forensics

Information Age Forensics: Information Age Forensics [IAF] is a new field of forensic science, cybercriminal psychology and digital forensics investigation and profiling. IAF recognizes the existence and inevitable growth of the Information Age forensic construct, iPredator. Information Age assailants, aggressors, criminals, trolls, deviants and violently disturbed, iPredators, who use Information and Communications Technology [ICT] in the commission of their criminal, deviant and harmful activities are criminal and psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator.

Vital to understanding the theoretical core of iPredator and Information Age Forensics is that iPredators are variants of classical assailants, aggressors, criminals, deviants and nefarious entities. ICT and the Information Age have created a new dimension leading to an entirely new population of humanity engaged in malevolent, harmful and deceptive practices. ICT and cyberspace are not tools used by the aggressor, sociopath, deviant, narcissist or classic criminal, but part of a new generation, that will be permanent fixtures to the darkside of human consciousness for centuries to follow.

iPredator and Information Age Forensics accepts the reality that the new dimension of cyberspace is an abstract and artificial environment that offers the “veil of anonymity” to those seeking to engage in deceptive, addictive,  nefarious and malevolent online activities.

“Pathological human narcissism transforms the actions of deceit, denial & misrepresentation into a reliable set of tools for those seeking to hide their indiscretions.” Michael Nuccitelli, Psy.D. iPredator Inc. [2013]

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

iPredator Inc. Resources

an-ipredator-probability-inventory-cyberbully-abuser-ipi-cba-internet-safety-tool-cyber-attack-risk-assessment-michael-nuccitelli-ipredator-dr-internet-safety-dark-psychology-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler  University. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

iPredator Inc.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files. For tweens and teens, iPredator Inc. created Dr. Internet Safety. For young children, K-5, Cyber Tyger, Troll Man and the Cyber Tyger vs. Troll Man struggle are used to introduce basic internet safety concepts.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at info@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

cyberbully-abuser-internet-safety-exam-michael-nuccitelli-psy.d.-dark-psychology-ipredator-ipredator-inc.

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Pin It on Pinterest