psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york

Online Psychopathy Checklist

Online Psychopathy is an Information Age criminology and human consciousness construct replacing classic pre-Information Age Psychopathy. Online Psychopathy is a characterlogical disorder describing anyone who skillfully uses cyberspace to exploit, control, subjugate and manipulate others. Driven by grandiosity or perversion, they experience no remorse or guilt from the devastation they cause others. Many Online Psychopaths do not break the law and live unscathed by law enforcement, fraternal organizations, religious institutions and legal systems. Just as classic psychopaths, Online Psychopaths are remorseless, without conscience, divisive and highly deceptive.

The difference between the pre-Information Age Psychopath and Online Psychopath is access to cyberspace, social media and Information and Communications Technology (ICT). The “veil of anonymity” cyberspace afforded to all online users allows the Online Psychopath to completely cloak their modus operandi, goals and nefarious online activities. Coupled with their grandiosity and distorted fantasy life, cyberspace and the internet acts as an accelerant to identifying and targeting unsuspecting, discouraged and vulnerable online users.

For interested parties, at the base of this page is the Google Drive direct download link to this writer’s Online Psychopathy Traits paper describing online psychopathic traits and tactics they use in cyberspace with internet enabled electronic devices. Just as all this writer’s authored materials, constructive criticism is always welcomed. Provided below is a 180 trait bullet list for your review.

Please note that this list is presently being audited and will almost certainly be altered numerous times by the iPredator Team. As the more input we receive from outside resources will benefit us greatly in the final masterlist, iPredator Inc. would be very appreciative if you contact us with any results you may compile when assessing a friend, associate, loved one or adversary. Fell free to contact us anytime here in New York by calling 347-871-2416 or via email at info@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

Online Psychopathy Checklist Categories

  • A: Affective/Emotional
  • B: Behavioral/Online Actions
  • C: Cognitive/Thinking Processes
  • D: Developmental History
  • I: Interpersonal/Described by Online Users
  • O: Online Appearance/Persona
  • P: Perceptual/Interpretations

psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york

Online Psychopathy Checklist

  1. A | Contemptuousness for empathy as described by online peers and associates.
  2. A | Exhibits a pattern of shallow emotions when interacting with online users.
  3. A | Experiences little to no guilt from the harm they cause online users.
  4. A | Feels invincible and is undeterred by online obstacles.
  5. A | Has deep seated rage exhibited online that is intentional and unintentional.
  6. A | In both online and offline environments, is remorseless, shameless and guiltless.
  7. A | Covertly hostile towards online peers, coworkers and acquaintances.
  8. A | Tends to be emotionally callous viewing other online users in an insensitive, indifferent or unsympathetic manner.
  9. A | Depending on level of interpersonal dexterity, tends to have intermittent to frequent online verbal outbursts.
  10. A | Tends to be remorseless feeling little contrition, regret and repentance from online assaults, cyber attacks and online victimization.
  11. A | Although comfortable in dispensing online criticism, quickly becomes uncomfortable and angry if he/she is criticized by online users.
  12. A | Easily offended and reacts aggressively online.
  13. A | Exhibits a “Jekyll and Hyde” personality that is witnessed by online users.
  14. A | Feels immune by the consequences of his/her own online actions.
  15. A | Feigns emotion in most online forums.
  16. A | Prone to quickly feeling bored in online environments.
  17. A | Rarely admits or discloses feeling depressed in online social sites.
  18. A | Tends to quickly become vicious if confronted by online peers and loved ones.
  19. A | Experiences minimal fear engaging in offline violence and online cybercrime, cyber terrorism, online sexual predation or cyberstalking.
  20. A | Feels aroused when communicating explicit details of obscene, violent and graphic events in online environments.
  21. A | Remorse only experienced when control and manipulation of an online user has been lost.
  22. A | Although a rare occurrence, becomes emotional or tearful, in online environments, which is rooted in frustration.
  23. A | In online environments, tends to be highly contradictory and habitually reports  feeling misunderstood.
  24. B | Experiences autonomic arousal from viewing graphic, violent or sexually perverse online information.
  25. B | Has a history of poor employment behavior that is either communicated to others online or evidenced by online employment task ineptitude.
  26. B | A pediatric and recent adult history of behaving irresponsibly online.
  27. B | Actual ulterior motives are almost always cloaked in online social environments.
  28. B | Almost always engages in online conning for profit using social media and other forms of online social forums.
  29. B | Behaves in an impulsive manner evident to other online users.
  30. B | Compulsively engages in repeated online deceptive, assaultive, deviant, illegal and immoral acts.
  31. B | Engages in habitual online conning to experience pleasure, power and control.
  32. B | Exhibits online entrepreneurial versatility that may or may not be legal.
  33. B | Has poor behavioral control that may or may not be evidenced online.
  34. B | If asocial, having minimal interactions with others in social networking sites [i.e., Google Plus, Twitter, Facebook, etc.], their avoidant behaviors are not due to  mental illness.
  35. B | In addition to habitual offline residence changes, tend to frequently change their social media profiles, website themes and content they disseminate online.
  36. B | Likely to be animal abuse perpetrators offline, they frequently broadcast their animal abuse in images and videos that are disseminated online.
  37. B | May or may not have past or present legal entanglements caused by illegal online activities.
  38. B | Not always, but often has a history of cybercriminal versatility that they may or may not brag about in online environments.
  39. B | Online allies, peers, family members and cyber attack accomplices often become their victims.
  40. B | Tend to be avid gamblers engaging in online gaming, gambling and competitive video gaming.
  41. B | Tends to have a history of financial obligations failure that is evidenced in both online and offline environments.
  42. B | In both online and offline environments, frequently engage in the use of aliases.
  43. B | Habitually uses cruel, repressive and fear inducing online methods to control their targets.
  44. B | If online victimization is difficult due to geographic location, will target the victim’s friends, family members and coworkers online.
  45. B | Tends to exhibit a habitual pattern of personal safety recklessness and self-destructiveness.
  46. B | May or may not require actual physical contact with their online victims.
  47. B | If physical contact with their victim is sought, ICT and social networking are the primary tools they use to ensure an offline meeting.
  48. B | If homicide or physical torture is the modus operandi, will frequent online classified ad websites, adult sex sites, fetish sites and online dating sites.
  49. B | Will often only frequent informational websites and blogs that validates his/her fantasies and perversions.
  50. B | Seeks out online peer validation, interest and acceptance to justify their violent, abusive and perverse fantasies.psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york
  51. B | Actively engages in online reputation management [ORM].
  52. B | Attempts to instill guilt in online users if the user protests about doing something that he/she wants the target online user to do.
  53. B | Easily provoked to violence or online direct or indirect threats of physical harm.
  54. B | Fascinated by notable psychopaths and infamous criminals evidenced by obtaining, disseminating and exchanging online information with others who experience the same intrigue.
  55. B | Has deficits in affective and interpersonal online functioning.
  56. B | In online chatrooms, forums and message boards, frequently changes group rules or cajoles moderators to change the rules to suit his/her nefarious plans.
  57. B | Often rebellious to online rules and social site guidelines and policies.
  58. B | Takes credit for other online users work and highly likely to engage in online plagiarism.
  59. B | Uses coercion and threats to manipulate online users into indiscriminate sexual relationships that may or may not involve physical contact.
  60. B | Described by online users in online social forums as compulsively lecturing others until agreed with by respondents.
  61. B | Exhibits obsessive traits of orderliness and neatness with his/her online profiles and website design.
  62. B | Habitually creates online conflict and distrust with online friends and loved ones.
  63. B | Habitually engages in internet troll behaviors.
  64. B | In online social forums, may or may not disclose his/her neurotic fascination with fire, weapons, sexual perversions and mood/mind altering substance.
  65. B | In online social forums, often disseminates information that is rude, vulgar and obscene.
  66. B | In online/offline environments, exhibits an absence of anxiety or other fear driven neurotic states.
  67. B | In online/offline environments, exhibits an absence of delusional thinking and other signs of thought disordered psychopathology.
  68. B | Not driven by cyber safety purposes, regularly deletes online information that illustrates sentimental connections with online users.
  69. B | Often gives vague answers in online forums.
  70. B | Seldomly expresses gratitude and appreciation to online users.
  71. B | Uses threats and intimidations to keep other online users close.
  72. B | Targets the ignorance of online users and creates an impression of superiority.
  73. B | Habitually uses online deception as a tactic to find out the truth.
  74. C | Central to their perceptually distorted grandiose online activities, often fantasizes about becoming a world leader.
  75. C | Habitually engages in offline and online fantasies that are divine entity themed.
  76. C | Has thoughts of extreme grandiosity that typically includes information technology in the theme.
  77. C | Ranging from moderate to obsessive, thinks and fantasizes about securing willing online victims.
  78. C | Thinks that he/she is pervasively entitled that is described by online users as extreme.
  79. C | Thoughts tend to be short sighted with a failure to plan ahead that is evidenced in at least one online social environment.
  80. C | Has frequent bizarre, violent and/or sexually perverse thoughts and fantasies that are not caused by psychiatric illness.
  81. C | Exhibits an inability to understand irony expressed by online users.
  82. C | Has a selective memory evidenced by quickly recalling other online user mistakes, but forgetting  his/her own.
  83. C | Adulterates the ethical principles of online users to serve his/her own interests.
  84. C | Concurrent with grandiosity, exhibits a grossly inflated view of his/her abilities and self-worth in online environments.
  85. C | Frequently changes his/her opinion, behavior and philosophical beliefs depending on the online user or forum he/she is attempting to manipulate.
  86. C | Habitually disputes the qualities, abilities and personalities of other online users.
  87. C | Likely to have an average to above average intelligence described by offline and online peers.
  88. C | Often uses logical argument tactics to camouflage his/her online claims.
  89. C | Rarely recalls offline/online emotional outbursts or denies having them.
  90. C | Unable to accept responsibility for his/her inappropriate online  actions.
  91. D | Intentional or unintentionally, they habitually alter their personal history in online environments.
  92. D | Juvenile delinquency in online environments, or if an adult, was involved in juvenile delinquency rehabilitation.
  93. D | Likely to have experienced prior pediatric brain damage that may or may not be evidenced by his/her online communications.
  94. D | Not always, but often has a developmental history that includes pediatric sexual acting out in offline and online environments.
  95. D | Not always, but often has a developmental history that includes pediatric academic and behavioral in offline and online environments.
  96. D | Not always, but often has a developmental history that includes pediatric sexual abuse in offline and online environments [perpetrator, victim or both].
  97. D | As a child, known genetic or neurodevelopmental factors making him/her notably callous online.
  98. D | As a child, had low behavioral inhibition leading to poor socialization and evident in online environments.
  99. D | Has disclosed online or there is offline evidence of a pre-pubescent history of fire-setting.
  100. D | Exhibits online or offline neuropsychological deficits.
  101. D | Has disclosed online or proven offline a history of inconsistent parental discipline.
  102. D | Has disclosed online or proven offline a history of parental rejection.
  103. D | Has disclosed online or proven offline violations of conditional release with two or more escapes from security or breaches of probation.
  104. D | No history of actual suicide attempts or online suicidal threats.
  105. I | Has an incapacity for love that may or may not be disclosed online.
  106. I | Defined by online users as being highly secretive with the information they share online.
  107. I | Depending on their level of interpersonal dexterity, their superficial charm may or may not be initially recognizable.
  108. I | Described as being glib in online communications  meaning the respondent feels they are uncharacteristically smooth and carefree with overtones of insincerity.
  109. I | Described by both offline and online peers as being unreliable in all affairs that do not have immediate personal benefits.
  110. I | In at least one online social environment, defined as being a master of  exploitation.psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york
  111. I | Rationalizes the emotional pain that he/she has inflicted upon other online users.
  112. I | Described by online users as being an extreme narcissist and at the center of his/her own universe.
  113. I | Described by online users as being authoritarian and frequently tyrannical.
  114. I | Described by online users as being charismatic, captivating and engaging in at least one online social environment.
  115. I | Described by online users as being charming with a pleasant personality and easy to chat with in at least one online social environment.
  116. I | Described by online users as being covertly and overtly domineering.
  117. I | Described by online users as being unreliable with habitual hollow promises.
  118. I | Despotic, authoritarian and controlling towards online victims, potential targets and loved ones.
  119. I | Difficulty sustaining offline and online attachments.
  120. I | Engages in habitual promiscuity, online or offline, by frequenting online dating and adult sex sites.
  121. I | Exhibits online and offline peer safety recklessness by manipulating others to engage in risky online activities.
  122. I | Extremely convincing with online users when seeking out accomplices for his/her malevolent or deceptive plans.
  123. I | Having a habitual pattern of offline infidelity, tends to frequent online dating and sex sites seeking intimate partnerships.
  124. I | Highly manipulative that is evident in almost all online environments.
  125. I | If an online victim has been secured, habitually manipulates the victim using love/hate cycles.
  126. I | In addition to online allies and accomplices, offline peers and family members become victims using ICT.
  127. I | In most online relationships, he/she exhibits porous personal boundaries.
  128. I | Kindness toward online users is always feigned and usually part of a deceptive strategy.
  129. I | Pathologically lies in both offline and online environments.
  130. I | Tends to be humiliation driven  evidenced in at least one online environment.
  131. I | Tends to have a parasitic lifestyle seeking online users to manage their life responsibilities.
  132. I | Unable to recognize the emotions and needs of other online users and exhibits a lack of empathy.
  133. I | Unmoved by and oblivious to human suffering evident in other online users.
  134. I | Demands absolute loyalty from online users and views constructive criticism as a personal assault.
  135. I | Describes by online users as being arrogant.
  136. I | Exhibits an absence of moral consideration and connection with online users.
  137. I | Externalizes blame for his/her problems online and often claims that he/she was “set up”.
  138. I | Often manipulates online users to cyberbully, cyberstalk or cyber harass targeted online users.
  139. I | Twists and distorts offline facts presented by online users to mimic his/her online image.
  140. I | Described by online users as a “human paradox” by being logical and coherent, while at same time, exhibiting attitudes and behaviors that are opposite.
  141. I | Described by online users as being easily prone to boredom.
  142. I | Described by online users as being interpersonally  cold despite a presentation of gregariousness and superficial warmth.
  143. I | Evidenced by online peer interactions, exhibits poise, verbal facility and poise.
  144. I | Evidenced by online peer interactions, exhibits poor judgment and fails to learn from his/her online experience.
  145. I | Has little interest in making effort to comfort online users unless manipulating them.
  146. I | Often waits to the last minute to instigate online users into engaging in risky online activities.
  147. I | Threatens in underhanded ways or engage in online extortion or sextortion.
  148. O | Disseminates and exchanges images and videos themed as having a conventional appearance.
  149. O | If engaged in illegal online activities, habitually changes their online image, profile pics and videos to avoid identification and prosecution.
  150. O | May or may not have a commanding physical presence in online vlogs, webchats or video clips.
  151. P | Denies being dysfunctional in online environments unless part of deceptive strategy.
  152. P | Believes the most appropriate consequence for online user discretions is physical punishment or severe psychological torture.
  153. P | Guided by “ends justify the means” in most online relationships.
  154. P | If an online victim has been secured, often fantasizes about his/her enslavement.
  155. P | If an online victim has not been secured, looks for online indications of hopelessness and helplessness leading to victim choosing.
  156. P | If deemed insignificant, easily becomes enraged, which is communicated in online environments.
  157. P | In addition to viewing online users as objects, views them as targets “ripe for picking”.
  158. P | In at least one online environment, does not recognize the rights of others and viewed as non-existent.
  159. P | Interprets all distressed online users as victimization opportunities.
  160. P | Interprets all self-serving behaviors as permissible in all online environments.
  161. P | Interprets an online user’s distress as weakness causing them to feel contempt towards the online user.
  162. P | Interprets most online user communications with a sense of paranoia.
  163. P | Life hopes, dreams and plans are often unrealistic and rooted in grandiose visions of self, which is communicated online.
  164. P | Moderate to severe obsessive compulsive needs for online stimulation.
  165. P | Perceives online users, not as human, but objects to be subjugated and defamed.
  166. P | Suffer Internet Abuse and Internet Dependence at much higher rates than online users who are not reliant upon ICT in order to properly function in day-to-day functioning.
  167. P | Expects total online victim submission, but at the same time, seek acceptance and admiration for his/her tyrannical tactics.
  168. P | Highly reliant upon online activities to confirm and validate their grandiose plans and fantasies.
  169. P | Views the simple act of publishing their fantasies and grandiose plans online means they are real and achievable, even without online user confirmations.
  170. P | Views certain online information as credible as opposed to initially first being skeptical until validated.
  171. P | Engages in the defense mechanism of projection online by accusing others of faults and weaknesses that are actually his/her own.
  172. P | Exhibits a distorted sense of reality confirmed by online users.
  173. P | Habitually exhibits a minimal fear threshold when engaging in risky online activities.
  174. P | Habitually seeks out novel and exciting online information and relationships.
  175. P | In addition to being unable to accept responsibility or blame for his/her online actions, he/she is described as being in denial by online users.
  176. P | Unable or unwilling to accept personal responsibility for their online actions.
  177. P | Views online authority with disdain.
  178. P | Believes he/she is exempt from digital citizenship and netiquette in online environments.
  179. P | Interprets offline/online communications in “black or white”.
  180. P | If engaged in Internet Trolling, views his/her online provocations with pride.

psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york

Cybercriminal Psychology

Cybercriminal Psychology: Cybercriminal Psychology is the study of motivations, typologies and cognitive, affective, behavioral and perceptual processes influencing Information and Communications Technology [ICT] users to engage in nefarious, deviant, deceptive and criminal online activities. Unlike classic Criminal Psychology, Cybercriminal Psychology places emphasis on a person’s psychodynamic interpretations, modus operandi and interpersonal relationships within the abstract and artificial electronic universe of cyberspace. Although cyberspace is an illusory and virtual reality dimension, Cybercriminal Psychology assumes many perpetrators and their targets do not interpret cyberspace as perceptual facsimiles, but as a realistic dimension.

At present, Cybercriminal Psychology is not an accepted or recognized field of study within the realm social sciences. In fact, Cyber Psychology [aka, Internet Psychology, Web Psychology, etc.] also is not a formalized field of study. As this writer and iPredator Inc. associates slowly formulate and design this infant field, all input is greatly appreciated. iPredator Inc. founder and author of the Information Age Forensics construct, iPredator, strongly supports the assumption that both online perpetrators and their potential target victims behave and perceive differently than they do offline. Cyberstalking, cybercrime, cyber harassment, internet trolling, cyber terrorism, cyberbullying [small segment], online sexual predation, online child pornography, internet addiction, online psychopaths and pathological online deception are typologies and asocial activities the iPredator construct attempts to address.

12-characteristics-of-psychopaths-7-signs-of-online-psychopathy-ipredator-inc.

12 Characteristics of Psychopaths

  1. Absence of Guilt, Shame and Remorse
  2. Absence of Empathy
  3. Shallow Emotions (Absence of Fear)
  4. Deceitful and Manipulative
  5. Self-Entitled and Grandiose
  6. Superficial Charm
  7. Absence of Delusions
  8. Absence of Irrational Thinking
  9. Absence of Nervousness or Distress
  10. Unreliable and Insincere
  11. Does Not Learn from Experience
  12. Minimal Insight

7 Signs of Online Psychopathy

  1. A self-awareness of causing harm to others, directly or indirectly, using ICT.
  2. The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  3. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
  4. Uses ICT to exploit and manipulate others driven by grandiosity or severe narcissism.
  5. Experiences minimal to no guilt or remorse from the harm they cause others.
  6. Cyberspace, online forums and digital environments are desired to identify and engage their target.
  7. Using the “veil of anonymity” afforded to all online users in cyberspace, online deception is their preferred weapon.

psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer and distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Dark Psychology

Dark Psychology: Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior.

Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time. It is the remaining 1%, Dark Psychology parts from Adlerian theory and Teleology. Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic.

Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.

psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york

iPredator Inc.

iPredator Inc. is a New York State based Information Age Forensics and Internet Safety Company founded in September 2011 to provide educational and advisory products & services to consumers and organizations on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.

Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files. For tweens and teens, iPredator Inc. created Dr. Internet Safety. For young children, K-5, Cyber Tyger, Troll Man and the Cyber Tyger vs. Troll Man struggle are used to introduce basic internet safety concepts.

Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media. To invite Dr. Nuccitelli to conduct training, educational service or consultation, he can be reached by calling 347-871-2416 or via email at info@ipredatorinc.com.

“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from the Adler  University. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched their internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety offering site visitors an incredible amount of information, education and advisory services. Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

iPredator’s Online Psychopaths Flickr Link

https://www.flickr.com/photos/ipredatorinc/sets/72157650847114371/

iPredator’s Online Psychopaths Pinterest Board Link

https://www.pinterest.com/ipredator/online-psychopathy-aka-ipredopathy/

Online Psychopathy Checklist
(iP3)

  1. Online Psychopathy Direct Download Link: Online Psychopathy Checklist PDF
  2. iPredator Site Page Link: Online Psychopaths

“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” Michael Nuccitelli, Psy.D. (2012)

psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york

psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Author: Michael Nuccitelli, Psy.D.
Google
Published by iPredator Inc.
Find us on Google+
Publisher: iPredator
Find us on Google+
Publisher: Dark Psychology
Find us on Google+

psychopaths-online-psychopathy-checklist-traits-michael-nuccitelli-psy.d.-ipredator-inc.-new-york

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Pin It on Pinterest

Share This