JonBenet Ramsey – Her Last Christmas & Cold Case Homicide

 

jonbenet-ramsey-the-last-christmas-of-jonbenet-ramsey-laurence-l.-smith-1024 x 512

JonBenet Ramsey-Cold Case Homicide Q & A

In early April 2015, I had the honor of interviewing my friend and associate, Laurence L. Smith, M.S. about his recently published book addressing the unsolved murder of JonBenet Ramsey in 1996. “The Last Christmas of JonBenet Ramsey” is a methodical and exceptional manuscript chronicling the last days of JonBenet and the investigation that followed. Laurence Smith and his profiling skills truly speaks to the Dark Psychology of human consciousness. Pasted in Q & A format are several question and answers from my interview.

Michael Nuccitelli, Psy.D. | Given the amount of material and books written about the JonBenet Ramsey case, how does your book become a definitive account of this case, including the naming of her killer?

Laurence L. Smith, M.S. | A great question. This case demanded a multi-dimensional perspective, especially psychologically. All of the published material written or spoken via the media about this case involved people who were journalists, novelists, law enforcement personnel, and others not having a sufficient psychology background to grasp the psycho-dynamics of the case to make an astute analysis. Other than the early publication of Dr. Cyril Wecht’s book, few resources were comprehensive.

Michael Nuccitelli, Psy.D. | Because police and media members often zero in one or two so-called ‘persons of interest’, how wide of a net did you cast to include as many viable suspects as possible?

Laurence L. Smith, M.S. | I devoted an entire chapter to placing a hypothetical intruder in a scenario to see how viable a suspect he should be. I also devote an entire chapter to placing various psychopathology criminal types in scenarios to see if any appear to be the most viable or likely killer of JonBenet.

Michael Nuccitelli, Psy.D. | How about Ramsey family members, how in-depth did you go in examining their viability for being responsible for JonBenet’s death?

Laurence L. Smith, M.S. | John, Patsy, along with sons Burke, and John Andrew Ramsey Jr. were exhaustively analyzed for any possible role in her death, with a definitive finding for each. (Daughter, Melinda Ramsey, was in Georgia working as a nurse at the time of JonBenet’s death.)

Michael Nuccitelli, Psy.D. | Because of the crime scene and forensics there were many in the media and in Boulder law enforcement who believed JonBenet’s murder was either a botched robbery, kidnapping, or the result of a pedophile. How did you reconcile this seeming dilemma?

Laurence L. Smith, M.S. | Realizing the contradictory actions, if any of these criminal types had been involved, I came to see that this was a non-focused crime and that the murder of JonBenet was essentially a cover-up.

Michael Nuccitelli, Psy. D. | How did you arrive at a motive for JonBenet’s murder?

Laurence Smith, M.S. | There wasn’t really a motive as one generally views a motive in a murder case, but rather a murder out of perceived necessity as a cover-up.

Michael Nuccitelli, Psy. D. | How long do think the entire killing scenario was?

Laurence L. Smith, M.S. | Creating a more realistic time-line than the one police were working with, I believe at least 3 or 4 hours were consumed in the overall crime, including its staging and writing of the innocuously worded ransom letter.

jonbenet-ramsey-who-actually-murdered-jonbenet-dark-psychology-590 x 443

Michael Nuccitelli, Psy. D. | Re-known FBI profiler John Douglas told the media and television viewers that he believed the crime scene appeared staged. At what point did you formulate a definitive analysis as to what type of criminal type the individual was who murdered JonBenet?

Laurence L. Smith, M.S. | Even prior to Mr. Douglas’s statement I had come to see the crime as one that was amateurishly staged and carried out, as if it were a seminal occurrence for this type of crime by the perpetrator, thus eliminating career criminal types or individuals having a criminal record.

Michael Nuccitelli, Psy. D. | In boldly stating that your book is a definitive account of who murdered JonBenet how can you state that so unequivocally?

Laurence L. Smith, M.S. | I believe that once one reads my book and sees the effort made to thoroughly examine suspects and suspect types who remotely could be considered viable as the murderer, overwhelming evidentiary material and circumstances will clearly show who the murderer is.

Michael Nuccitelli, Psy. D. | Given that there is no statute of limitations on murder and this case remaining officially open, do you ever see this murder case being resolved and officially closed?

Laurence L. Smith, M.S. | Unfortunately Dr., this case will remain open interminably, lest someone associated with the murderer or has direct knowledge of the murderous events makes an official statement naming the murderer, which is more than highly unlikely.

jonbenet-ramsey-the-last-christmas-of-jonbenet-ramsey-laurence-l.-smith-dark-psychology-368-488

Laurence L. Smith, M.S.

Laurence L. Smith, M.S. is a past member of American Psychotherapy Association who now devotes his time to consulting or testifying in major criminal trials. He obtained his M.S. Degree in criminal psychology from the University of Chicago in 1996 and has since been in the psychology milieu in various capacities, including psychotherapist, clinician, counselor, and corporate consultant.

“The Last Christmas of JonBenet Ramsey” is Laurence L. Smith’s initial foray into authoring a non-fiction true crime book. This book purports to show how 6-year old celebrity child, JonBenet Ramsey, came to be murdered on Christmas day, 1996 in Boulder, Colorado. In the process, naming whom her killer was in a case where her murder heretofore officially remains unsolved. This aptly titled book is a definitive account of how situational circumstances led to her death by her killer. A murder described by Laurence L. Smith, M.S. as a non-focused killing. To purchase his book, visit his website at http://www.laurencelsmith.com/

jonbenet-ramsey-who-actually-murdered-jonbenet-dark-psychology-612 x 458

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

God Bless JonBenet Ramsey

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

iPredator Inc. is a NYS based Internet Safety Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation and online sexual predation. Created by a NYS licensed psychologist and forensic psychology consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Dark Psychology – Blog Version by Michael Nuccitelli, Psy.D.

 Dark Psychology Blog Version

by

Michael Nuccitelli, Psy.D.

dark-psychology-blog-version-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.

Dark Psychology includes all criminal and deviant behaviors committed upon other innocent victims. Although many people are intrigued by the discussion of the serial killer and psychopath, the vast majority of predators hunting human prey are not engaged in murder or sexual deviance. If this writer were to make an estimate, he would put the percentage of human predators at roughly 70% of the total pool of people who are out to victimize others, but who are not involved in murder or sexual deviance. The remaining 30% are the most dangerous because they seek physical human contact.

This writer has constructed what he believes is a sound theory of the human predator. Dark Psychology assumes what lives within all of us is a potential reservoir of violent malicious energy. All human aggressive and hostile dysfunctional behavior lies on a continuum of purposiveness defined by this writer as the Dark Continuum. Most of these behaviors lie somewhere on the Dark Continuum with most being in the category of subtle, mild and with fleeting thoughts and minor shortfalls. The reality though is Dark Psychology is a universal phenomenon, and there is no dispute all of us, at times in our lives, have had at least thoughts of sheer violence and predatory fantasies.

The difference is the vast majority of humanity has never acted upon those thoughts. The reason is that we have a low Dark Factor equation compared to the predators. The Dark Factor is the realm, place and potential that exists in all of us and is part of the human condition. This concept is one of the more abstract terms of Dark Psychology, because it is so hard to illustrate via the written expression. For criminal and deviant people, their Dark Factor is elevated; influencing them to move in a direction towards what many define as evil and this writer defines as a trajectory accelerating towards the Dark Singularity.

“It is the individual who is not interested in his fellow men who has the greatest difficulties in life and provides the greatest injury to others. It is from among such individuals that all human failures spring.” Alfred Adler [1870-1937]

Alfred Adler’s theories were a powerful influence in this writer’s creation of Dark Psychology. He strongly adheres to Adler’s philosophy that behavior is purposive. The only slight philosophical divergence from Adler is this writer’s belief that all behavior is 99% purposive. He holds the remaining 1% as being within the realm of the black hole of the Dark Singularity. The black hole of the singularity is the area of evil that the predator comes close to, but never reaches.

dark-psychology-blog-version-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.

Dark Singularity

The Dark Singularity is the potential in all of us to behave as a predator, hunting human prey completely and utterly devoid of purpose. This writer also strongly subscribes to Adler’s theory of subjective processing. Dark Psychology and the human predator have a highly distorted perceptual filtering mechanism. For them, it is no longer about being compassionate and kind. Their subjective processing colors all of their thoughts, emotions and perceptions with blackness and venom.

At some point in the development of the human predator, he/she actuates his thoughts and feelings and starts down the long road of what contemporary criminologist call psychopathy. Within time, their subjective processing filter becomes divorced from experiencing remorse. They come to perceive that the victimization of others is deserved by those who are too naive to protect themselves.

dark-psychology-blog-version-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.

Dark Factor

Given that, a large portion of human development surrounds social acceptance, the predator somehow moves into the arena where his/her Dark Factor becomes an active force fueling an urge for the destruction of others. Once touched by the realm of psychopathy, he has entered the point of no return. Just as light cannot escape a black hole, the human predator cannot escape the path towards the Dark Singularity. Interviews conducted by forensic profilers and research scientists with convicted notorious psychopaths have proven the theory of accelerated movement towards the Dark Singularity.

Some believe, this accelerated trajectory to victimize others is more similar to what has been called a compulsive dependency theory. Although this writer agrees with the compulsive dependency hypothesis of increased needs by human predators to victimize others, Dark Psychology assumes these needs can become needless and less purposive.

Not only have psychopaths divulged a perception of experiencing a sense that their evil acts accelerate in frequency, but also their experience of acting as predator takes on an addictive quality. Using cosmology once again as a metaphor for Dark Psychology, the closer matter approaches a black hole, the faster mass accelerates and can never swing away from the black hole’s awesome gravity. Interviews with psychopaths almost exactly mimic this universal law of astrophysics.

As society moves further into what is defined as the Information Age filled with digital technology and cyberspace, Dark Psychology and its impact on humanity will be tested at greater rates. Given the veil of anonymity cyberspace offers all humanity, the question remains is if the nefarious aspects living within all of us will recognize there is a realm of free reign called the digital universe. Dark Psychology is the study of the chasm within us all, which only the few enter, and even fewer ever exit. Without a natural predator to cause humans to rally, we prey upon one another.

dark-psychology-blog-version-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dark-psychology-blog-version-michael-nuccitelli-psy.d.-ipredator-ipredator-inc.

home-button-dark psychology-darkside of human consciousness-michael nuccitelli, psy.d.-ipredator

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and forensic psychology consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

iPredator’s Information Age Education Webpage Updated

ipredator-information-age-education-dark-psychology-michael-nuccitelli-psy.d.-image

iPredator

Information Age Education Webpage Updated

Information Age Education (IAE) is an internet safety and cyber attack prevention concept I authored last year to encourage educators, parents and all online users to consider adapting when they use Information and Communications Technology. With the growth of cyberbullying, cyberstalking, online sexual predation and other darkside of cyberspace assailants, IAE introduces a three-pronged educational solution for consideration.

Recently updated and provided below is the search result and link to our iPredator Information Age Education (IAE) page. At the base of the IAE webpage, click on the blue fingerprint image to download the PDF article. I’ve also pasted below new Information Age Education images to download at no cost or having to provide an email address. To download images, click on the image, right click and hit “save as” to save to your desktop or a file folder. 

  • Information Age Education-Cyber Attack Prevention
  • Visit iPredator’s Information Age Education page to download, at no cost, Dr. Nuccitelli’s family values, prevention education & humility concept article.
  • https://www.ipredator.co/information-age-education/

ipredator-information-age-education-dark-psychology-michael-nuccitelli-psy.d.-image

Information Age Education (IAE): Information Age Education (IAE) is a cyber attack prevention paradigm offering a resolution to reducing the negative consequences of living in the Information Age. Information and Communications Technology presents positive and negative influences upon humanity, in which the negative aspects grow at a feverish pace. Cyberbullying, cyberstalking and online sexual predation are just a few of these destructive forces. IAE prioritizes prevention education, non-denominational family values, and humility as solutions to connecting the disconnected, educating the ignorant, and conquering the corrupt. IAE is an educational concept, not just for children of the Information Age, but all online users.

ipredator-information-age-education-dark-psychology-michael-nuccitelli-psy.d.-image

ipredator-information-age-education-dark-psychology-michael-nuccitelli-psy.d.-image

ipredator-information-age-education-dark-psychology-michael-nuccitelli-psy.d.-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

iPredator Inc. is a NYS based Internet Safety Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation and cyber deception. Created by a NYS licensed psychologist and forensic psychology consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

LNM Radio Network: Michael Vara and Online Defamation Exposed

lnm-radio-network-michael-vara-online-defamation-exposed-dark-matter-radio-network

LNM Radio Network & Michael Vara

Online Defamation Exposed

(click images @ base of post for pdf paper & internet radio interview)

Michael Vara of LNM Radio Network (aka, Late Night in the Midlands), Dr. Leonard Horowitz and Sherri Kane of “WarOnWeThePeople” are three online users who continue to slander and defame iPredator Inc., our internet safety initiatives and myself. Whereas, initially I thought they were posturing to meet criteria for iPredator Bridge, but then their recent internet defamation campaigns have elevated their online assailant statuses to iPredators. Horowitz, Kane, Vara and their blind faith supporters have entered the realm I study, investigate and help protect others from, seven days a week, since authoring iPredator in 2010 and establishing iPredator Inc. in 2011.

Note to Reader: Just as all past, present and future content we publish, involving the named online user and their affiliates; this information is DMCA compliant and a statement of fact. All content contained herein exercised due diligence and serves as a defensive measure in response to the named online user’s disinformation campaigns and false statements of fact.

In their December 2014 psychopathological attempt at character assassination, Leonard George Horowitz authored, publically published and sent the NYS Education Department, Office of Professional Discipline a 177-page diatribe of paranoid themed nonsense. In his urgent complaint, he calls for the state to revoke my license as a practicing psychologist and that I’m “engaging in conduct which creates a grave risk of death to another person”.

For those of you who think I may be exaggerating or not yet read my Troll Triad paper; provided below is a link to Exhibit-1, which is the 1st page of Len Horowitz’s manifesto to the NYS Education Department. I also provide here a link to my secure copy of his full 177-page manifesto to download or review. Sherri Kane and Michael Vara were cc’d his complaint, which can be confirmed by scrolling to the base of page 8. If you do choose to open or download his off the wall manifesto, it is 177 pages and may take a minute to fully open. If not interested, here is Exhibit-63, which is a screenshot image captured from page 8.

Exhibit-63: Sherri Kane-Horokane & Horowitz Bizarre Defamation Exposed

Horowitz Authored, Kane Endorsed, Vara Supported Complaint-1st Page Image

Horowitz, Kane & Vara 177 Page NYS Education Department Complaint

lnm-radio-network-michael-vara-late-night-in-the-midlands-defamation-exposed

Michael Vara, LNM Radio Network and the Troll Triad have confirmed my recently authored Troll Triad construct as possibly having some merit. As of the date this blog post was published on January 21, 2015, their bizarre accusations and bogus allegations that I’m a white supremacist, anti-semitic, cyberstalker and a member of a covert federal agency assigned to shut down Michael Vara’s show and website are guaranteed to be their next bogus campaign. Using his nightly talk radio show, he will continue to inject comments and asides defending his actions.

Fitting the Crier archetype, Michael Vara will spread Leonard Horowitz and Sherri Kane’s conspiracy themed messages to his LNM Radio Network listeners. To disseminate their defamatory information without appearing paranoid, Vara will deliver this information in a mild manner.

What is Troll Triad?     

Troll Triad is a cyber psychology, forensics and group-profiling construct introducing a three-pronged archetypal model defining groups of online users who engage in defamation of character, slander & libel. Troll Triad is not just a facetious term describing my three small-minded cowards. Troll Triad attempts to introduce and describe groups of online users who use Information and Communications Technology to defame, manipulate, curry favor and seek support from other like-minded online users. Troll Triad is also a conceptual framework and template describing how future groups of successful iPredators will be partitioned into three archetypal segments.

This troika includes the Cerebral, Provocateur and Crier Archetypes. When these three elements mix correctly, the Troll Triad becomes a masterpiece of human predation alchemy. The Cerebral, Provocateur and Crier typologies, in the Troll Triad, are archetypes and segments of groups who are allied in a mission to defame, disparage and destroy their target’s online reputation and trust.

The Troll Triad is an archetypal model that can describe three like-minded people or an entire nation bound by the same goal of harming other nations. In relationship to my trolls, Michael Vara, Dr. Leonard Horowitz and Sherri Kane, it does not take long to identify each of their positions quickly within the Troll Triad. Dr. Leonard Horowitz is the Cerebral. Sherri Kane is the Provocateur and Michael Vara is the Crier.

Michael Vara’s Typology? Crier

Within the archetypal Information Age concept of Troll Triad, the Crier is the online user who serves as messenger, event planner and the cloaked skeptic when communicating the Troll Triad’s rationale for launching and managing their denigration and fraudulent defamation campaigns. The Crier habitually disseminates felonious information, partial truths and “us vs. them” implanted morsels of disinformation to rationalize the Troll Triad’s malevolent online activities. Within the Troll Triad, the Crier is least likely to be the most intelligent, provocative or charismatic as the Cerebral and Provocateur. Where the Crier is more adept and skilled than the other two is in their ability to spread the Triad’s message.

Not only is the Crier the most effective messenger of the three typologies, but they also serve as the group’s cloaked skeptic. Although their objectives to disparage and defame a target are the same as the Cerebral and Provocateur, the Crier works to validate the Cerebral’s intellect and the Provocateur’s passion by presented alternative views and insights. When done effectively, the Crier not only further motivates like-minded online users, but also encourages online users who are not yet committed to join their defamation and disinformation campaigns.

As presented in my Troll Triad paper, Michael Vara fits the Crier Troll Triad archetype perfectly. To support my belief he serves as the Crier in this construct, provided here is a brief explanation for your review.

lnm-radio-network-michael-vara-late-night-in-the-midlands-defamation-exposed-ipredator

Michael Vara, LNM Radio Network & Hypocrisy

Michael Vara and LNM Radio Network has been key in disseminating and encouraging his internet radio listeners and social media account associates to support and disseminate Dr. Leonard Horowitz and Sherri Kane’s NYS Education Department complaint. As stated above, this felonious document was authored to revoke my license and allege I was involved in serious criminal activities. Given Michael Vara pontificates to his listeners about being truthful, his hypocrisy is pathetic having extensive evidence of his nefarious online activities he engages in between shows. Although Horowitz’s working knowledge of how to properly compose a legal document is amateur at best, he is proficient enough to lead the untrained eye to think his documents are legitimate.

With Michael Vara fitting the Troll Triad Crier archetype, iPredator Inc. has compiled many exhibits verifying he uses his social networking accounts and LNM Radio Network to spread their felonious accusations.

It has become clear that Michael Vara is clueless about his unprofessionalism by using airtime to spread the Triad’s defamatory information about their targets. In my long history of being a guest expert for print, radio and television, Michael Vara is the first to use airtime as his pulpit for spewing hatred and disinformation. With help from Len Horowitz and Sherri Kane, Michael Vara portrays himself as being both the victim and socially aware activist.

What he fails to include in his diatribes is admitting his accusations and farcical allegations are empty and devoid of due diligence. Why he continues to engage in his childish behaviors instead of moving on, cannot be answered by outside observers such as myself, iPredator team members and the many other targets he and the Horokane have slandered.

iPredator Inc. associates, supporters and myself only present evidence in our blog posts and pages that have been investigated with due diligence. Every exhibit, observation and hypothesis we publish has been verified as being highly probable. Having learned about the unethical, felonious and defamatory practices used by Dr. Leonard Horowitz, Sherri Kane and Michael Vara

The amount of evidence that has been compiled confirming Michael Vara, Leonard Horowitz, Cheri Cain, Late Night in the Midlands and a choice selection of their supporters is extensive. What has been published to date in our online pages and posts is approximately 30-40% of evidentiary data. Although I am their primary target and their noise has only created more support from the online community, I would still prefer they move on so I may get back to the business at hand of why iPredator Inc. was established. Unfortunately, the Troll Triad and their parasitic goals are not likely to terminate for the foreseeable future.

It is only a matter of time before they launch their defamation campaigns, which will accuse those of us who are intolerant to their rubbish as co-conspirators. When that time arrives, we will respond accordingly. Presented here are iPredator related definitions relevant to understanding the Troll Triad construct and three sad examples of Information Age adults known as Leonard Horowitz, Sherri Kane and Michael Vara of Late Night in the Midlands.

Troll Triad – Cyber Social Psychology Concept

Troll Triad is a cyber social psychology concept describing how groups of online users use Information and Communications Technology to manipulate, slander, defame and character assassinate their targets. Troll Triad posits that members within these groups assume archetypal roles and functions in their internet defamation and denigration campaigns.

Images, links and all Troll Triad themed posts in Google+ and other social networking sites serve as an internet safety alert and historical record documenting recent character assassination attacks by Leonard Horowitz, Sherri Kane, Michael Vara and Late Night in the Midlands internet radio show listeners. All pages, images and content are free to download and disseminate for educational, legal and investigative purposes. At the base of our iPredator, Dark Psychology, and Dr. Internet Safety web pages, interested parties can direct download the Troll Triad paper in PDF. No personal information whatsoever is required to download.

“In cyberspace, disinformation is the art and science of effectively mixing truth, observation and generally accepted assumptions with felonious conclusions, illusions and lies. When combined with the veil of anonymity in cyberspace, the final preparation becomes a dish impossible to refuse by the growing population of information addicted gluttons called humanity.” Michael Nuccitelli, Psy.D. (2014)

lnm-radio-network-michael-vara-late-night-in-the-midlands-defamation-exposed-ipredator

Note: Troll Triad page content at the iPredator, Dark Psychology & Dr. Internet Safety sites is mostly the same. They are slightly formatted and designed differently. To direct download my formal PDF paper, simply scroll to the base of any of these three pages and click on the blue and yellow three-triangle image. Please share, “like” or “+1” if you find the information useful. Constructive criticism is always welcomed. If you prefer to download my paper from alternative sources, you can visit the links here to my Academia.edu account.

Not being 100% sure of their guidelines for download, you may or may not need an account with them to download the paper there. The third option is to Google “Troll Triad” and you should see first page direct downloads from our Google Drive accounts requiring no personal information either. For Troll Triad, Dr. Leonard Horowitz, Sherri Kane, Horokane, Michael Vara and LNM Radio Network images, feel free to visit our Pinterest or Flickr links provided.

Freedom of Speech ≠ Freedom to Slander!

With the help of iPredator associates, we were able to locate and verify “www dot Paul Sulla Censured dot com” as the starting point for the Troll Triad’s noxious content. This website is owned by two members of the Troll Triad, Leonard G. Horowitz and Sherri Kane. Hidden among their pages of paranoid themed and felonious content, we located the original copy of Horowitz’s delusional file sent to the NYS Education Department urgently requesting they revoke my license to practice in New York.

Although their “Paul Sulla Censured” domain is hosted by a company in the Bahamas and privately registered, iPredator Inc. was still successful in confirming Leonard Horowitz and Sherri Kane as the domain owners and authors of their off the wall allegations.

iPredator Inc. does not intend to help their page ranking by publishing the direct link. You are welcomed to review or download our secured copy. Within one minute, you’ll see why a Hawaiian judge called their civil suit and accusations “Delusional“. In his own words and available to read his words by clicking on the next, Leonard Horowitz unsuccessfully attempts to martyr himself by documenting a federal judge defined his legal filings as delusional. Help iPredator Inc. confront these geriatric trolls, LNM Radio Network and all iPredators who engage in deviant online activities. Our Google URL Shortened link is as follows:

Google URL Shortened Link: http://goo.gl/VRuHzr

lnm-radio-network-michael-vara-late-night-in-the-midlands-defamation-exposed

Internet Defamation

Internet Defamation (aka, Online Defamation): Internet Defamation is a felonious statement of fact using Information and Communications Technology (ICT) that is published or disseminated to a third party in a careless or intentional manner and causes injury or damage to the subject of the statement. Internet Libel and Slander are different types of Defamation. Libel is a written defamatory statement, and slander is an oral defamatory statement.

“Whether used to influence the masses or in cyberspace to persuade others into divulging confidential or sensitive information, social engineering requires psychological manipulation to control a person, group or nation. In the Information Age, children can be just as effective at social engineering as adults and cause driven groups.” Michael Nuccitelli, Psy.D. (2014)

lnm-radio-network-michael-vara-online-late-night-in-the-midlands-defamation-exposed

Internet Troll

Internet Troll: An Internet Troll is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to purposely and actively provoke, defame, anger, tease, flame, or incite other online users. More often than not, the Internet Troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet Trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions. When the Internet Troll’s inflammatory statements and actions do not include a direct or implied physical threat to the target(s), their behavior is categorizes as cyber harassment. If the Troll’s verbal assaults include direct or implied physical threats to their target(s), their actions are then defined as cyberstalking.

The motivations for an Internet Troll’s provocative, and oftentimes, bizarre behaviors are numerous. Despite the variations in modus operandi, the vast majority of Trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice. Although there is no hard evidence or clinical research validating the psychology of the Internet Troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors.

Those who have begun to investigate the etiology of the Troll suggest that the anonymity of the internet contributes to what has been called, disinhibition effect. It has been postulated that internet anonymity leads some to behave in asocial ways coupled with a lack of guilt or remorse for the harm they cause not being in the target’s physical presence or even knowing their identity.

iPredator

iPredator: iPredator is a person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  1. A self-awareness of causing harm to others, directly or indirectly, using ICT.
  2. The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  3. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe of cyberspace. iPredators rejoice when they identify vulnerable online users and those who are not aware of basic internet safety principles.

lnm-radio-network-michael-vara-late-night-in-the-midlands-defamation-exposed-ipredator

Cyberstealth

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT), if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called online deception. Given the internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted.

The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment. Unlike classic deception used by traditional criminals and deviants, Online Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users.

The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age Deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

“In nature, wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, Cyberstealth, to stalk online users increasing the probability of achieving their aims, while decreasing their potential of identification and punishment.” Michael Nuccitelli, Psy.D. (2012)

lnm-radio-network-michael-vara-late-night-in-the-midlands-defamation-exposed

Horowitz, Kane & Vara, The HoroDefame

In conclusion, Michael Vara, Leonard G. Horowitz and Sherri Kane (aka, “Horokane“, “War on We the People”), Ryan Gable and some of their blind faith listeners of the LNM Radio Network (aka, Late Night in the Midlands) are a group of adults who have been targeting iPredator Inc. and myself since late August 2014. I’ve come to learn there are many others as well before we came along. These people use internet radio, defamation, disinformation, slander, plagiarism and litigation threats to control, manipulate and subjugate those they fear.

If they’re not driven by fear or an undetermined psychopathology, then they must be engaging in anti-social online activities to personally or financially benefit by creating “us vs. them” adversarial relationships. Although I’m positive their shenanigans will continue, I’m thankful to all of them for serving as realistic examples of the Cerebral, Provocateur and Crier archetypes forming the Troll Triad construct.

lnm-radio-network-michael-vara-late-night-in-the-midlands-defamation-exposed-ipredator

Leonard G. Horowitz & Sherri Kane

2/3 of Troll Triad

As a sub construct of iPredator, members of the Troll Triad are heavily dependent upon finding targets that will have a low probability of exposing their defamatory campaigns and ludicrous accusations using material evidence and exhibits that would be evidentiary in any trial settings. Although I’m a forensic psychologist who has learned to compile evidence and author forensic evaluations that must stand cross-examination by opposing counsel in a potential trial settings, my investigational methods can be learned by any potential target and summarized by two words. These two words and term is “Due Diligence”. Due Diligence as defined by Merriam-Webster is as follows:

  1. The care that a reasonable person exercises to avoid harm to other persons or their property
  2. Research and analysis of a company or organization done in preparation for a business transaction.

Due Diligence is what Leonard Horowitz, Sherri Kane, Michael Vara and their supporters do not practice nor fathomed that iPredator Inc. associates and myself live by the edict of Due Diligence. If you take anything from this blog post, I cannot emphasize the importance of practicing due diligence when using information online that you want to be a statement of fact as opposed to, what the Troll Triad habitually disseminates, a false statement of fact.

As the founder of iPredator Inc. and author of this post, I hope this will be the last time I’m having to author a post defending our reputation related to Michael Vara and his associates.

lnm-radio-network-michael-vara-online-late-night-in-the-midlands-defamation-exposed

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

pdf-paper-article-ipredator-internet-safety-direct-download-dark-psychology-image

click-2-listen-image-ipredator-michael-nuccitelli-psy.d.

dark-psychology-home-button

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and forensic psychology consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

 

Types of Cyberbullying Sought for 2015 PSA Article

Cyberbullying Tactics & Types of Cyberbullying Sought for 2015 PSA Educational Article-iPredator Image

Cyberbullying Tactics & Types of Cyberbullying Sought

for

2015 PSA Educational Article

Cyberbullying Tactics and Types of Cyberbullying Sought for 2015 PSA Educational Article. 38 2014 Tactics Pasted Below. Below I’ve pasted 38 Cyberbullying Tactics from 2014 and I’m now compiling iPredator’s Cyberbullying Tactics for 2015. Please scan the short definitions list below and comment to this post with new tactics not listed. My goal is to have the “2015 Cyberbullying Tactics” internet safety article available by Thanksgiving.

  1. Exclusion: Exclusion is a cyberbullying tactic that is highly effective and directly targets a minor’s developmental need to feel accepted and part of a social construct.
  2. Flaming: Flaming is a cyberbullying tactic defined as an online passionate argument that frequently includes profane or vulgar language.
  3. Exposure: Exposure is a cyberbullying tactic that includes the public display, posting or forwarding of personal communication, images or video by the cyberbully personal to the target minor.
  4. eIntimidation: This is a cyberbully tactic used to inspire fear in the target minor by communicating threats that may be direct or implied using email as the vehicle of communication.
  5. Cyber Harassment: Harassment is sending hurtful messages to the target minor that is worded in a severe, persistent or pervasive manner causing the respondent undue concern.
  6. Phishing: Phishing is a cyberbully tactic that requires tricking, persuading or manipulating the target minor into revealing personal and/or financial information about themselves and/or their loved ones.
  7. Impersonation: Impersonation or “imping” as a tactic in cyberbullying can only occur with the “veil of anonymity” offered by Information and Communications Technology.
  8. Denigration: Used in both classic and cyberbullying, denigration is a term used to describe when cyberbullies send, post, or publish cruel rumors, gossip and untrue statements about a target minor to intentionally damage their reputation or friendships.
  9. Mobile Device Image Sharing: Not only a tactic used in cyberbullying, but a form of information exchange that can be a criminal act if the images are pornographic or graphic enough depicting under aged minors.
  10. Non-Consensual Image and Video Dissemination: The usage of images and video as a cyberbullying tactic has become a growing concern that many communities, law enforcement agencies, and schools are taking seriously.
  11. Interactive Gaming Harassment: Interactive games on online gaming devices allow minors to communicate by chat and live Internet phone with others they are matched with online.
  12. Pornography and Marketing List Insertion: A frustrating and embarrassing tactic committed by cyberbullies is signing the target minor up to numerous pornography and/or junk marketing e-mailing and instant messaging marketing lists.
  13. Cyberstalking: Cyberstalking includes threats of harm, intimidation, and/or offensive comments sent through Information and Communications Technology channels.
  14. Griefing: Griefing is a term used to describe when a cyberbully habitually and chronically causes frustration to the target minor and his/her peers by not following the rules of an interactive online video game and intentionally disrupting the immersion of another player in their gameplay.
  15. Password Theft & Lockout: A cyberbully steals the target minor’s password and begins to chat with other people, pretending to be the target minor (a.k.a. Impersonation.)
  16. Web Page Assassination: This is a tactic whereby the cyberbully creates websites that insult or endanger the target minor.
  17. Voting & Polling Booth Degradation: Some websites offer online users the opportunity to create online polling/voting booths that are free of charge and easy to post.
  18. Bash Boards: Bash Boards are online bulletin boards where minors post anything they choose and frequented by both the cyberbully and target minor’s peer groups and school acquaintances.
  19. Trickery: Trickery is a tactic similar to phishing in that a cyberbully purposely tricks a target minor into divulging secrets, private information, and/or embarrassing information about themselves and then publishes that information online.
  20. Happy Slapping: Happy Slapping is a relatively new type of cyberbullying that integrates the rapid growth of video online and classic bullying.
  21. Text Wars and Text Attacks: Text Wars and Text Attacks are cyberbullying tactics when the cyberbully and a group of his/her accomplices’ gang up on the target minor by sending hundreds of emails or text messages.
  22. Malicious Code Dissemination: Sending malicious code is a cyberbullying tactic whereby malicious information is sent intentionally to a target minor to damage or harm their ICT.
  23. Warning Wars: Internet Service Providers (ISP) offers a way for consumers to report an online user who is posting inappropriate or abusive information.
  24. Screen Name Mirroring: Screen Name Mirroring is a cyberbullying tactic used against a target minor by constructing a screen name or user name that is very similar to the target minor’s name.
  25. Cyber Drama: Cyber Drama is a cyberbullying tactic that is a lot more common than extreme cases of cyberbullying. Cyber Drama tends to be gossip that was not supposed to be shared on a blog or a “flame war” that ends after a few messages.
  26. Sexting: Sexting is the slang term for the use of a cell phone or other Information and Communications Technologies to distribute images or videos of a sexually explicit nature.
  27. Pseudonym Stealth: A pseudonym is a nickname cyberbullies use when they are online as opposed to when offline. They do this to keep their real identity a secret from the target minor.
  28. Instant Messaging Attacks: Instant Messaging is a type of communications service that enables online users to create a private chat room with another individual.
  29. Cyberbullying by Proxy: Cyberbullying by Proxy is a tactic when a cyberbully encourages or persuades others to engage in deprecating and harassing a target minor.
  30. Social Media Cyberbullying: Social Media Cyberbullying is a tactic used by which the cyberbully persuades the target minor to include them in their “friends” or “buddy” lists and then begins to contact the target minor’s friends, peers and loved ones disseminating disparaging information about the target minor.
  31. Digital Piracy Inclusion: Digital or Internet Piracy is broadly defined as the illegal reproduction and distribution of copyrighted material on the internet using Information and Communications Technology.
  32. Tragedy News Mirroring: Local/National Tragedy Mirroring is a cyberbullying tactic whereby a cyberbully threatens a target minor that he/she will allege that the target minor is planning and preparing to engage in a violent activity directed at the targeted minor’s school or community.
  33. Slut Shaming: Slut Shaming is a cyberbullying tactic primarily targeting a female. A form of sexual cyberbullying, Slut Shaming occurs when a cyberbully records images or videos of the target minor that can easily be construed as sexually provocative.
  34. Cyber Threats: Cyber Threats is a cyberbullying tactic whereby a cyberbully actively engaged in passive aggressive strategies of informing the target minor that he or she is in danger from unknown or felonious assailants.
  35. Trolling: Trolling is the pediatric cyberbullying method of what has been termed, Internet Troll. Internet Trolls are often adults who disparage and harass unidentified online users, but the cyberbullying troll knows the identity of the target minor.
  36. Sextortion: Sextortion is a cyberbullying tactic by which minors exploit other minors for sex and/or sexually themed activities in exchange for not disclosing embarrassing and humiliating information about the target minor.
  37. Twitter Pooping: Twitter Pooping is a colloquial expression used to define the cyberbullying tactic of using Tweets to disparage and humiliate a target minor.
  38. Micro-Visual Cyberbullying: Micro-Visual Cyberbullying is a communication channel that is a future cyberbullying tactic trend.

a-dark-psychology-internet-safety-404-education-page-ipredator-dr-internet-safety-dark-psychology-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dark-psychology-home-button

iPredator Inc. is a NYS based Information Age Forensics Company founded to provide educational and advisory products & services to online users on cyberbullying, cyber harassment, cyberstalking, cybercrime, internet defamation, cyber terrorism, online sexual predation and cyber deception. Created by a NYS licensed psychologist and forensic psychology consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants. In addition to assisting citizens, iPredator Inc.’s mission is to initiate a nationally sustained internet safety and cyber attack prevention educational & awareness campaign with the help of private, state and federal agencies.
New York, New York
US
Phone: 347-871-2416

Dark Psychology – Definition of the Psychological Construct

a-dark-psychology-darkside-of-cyberspace-criminal-minds-digital-forensics-dr-internet-safety-michael nuccitelli authored-ipredator-image

Dark Psychology Definition & Review

Visit iPredator’s Dark Psychology webpage to review or download, at no cost, the darkside of human consciousness construct and conceptual framework authored by iPredator Inc. founder, Michael Nuccitelli, Psy.D. If not interested in clicking to another site, provided below are useful concept definitions.

a-dark-psychology-darkside-of-cyberspace-criminal-minds-digital-forensics-dr-internet-safety-michael nuccitelli authored-ipredator-image

Dark Psychology: Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior. Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time. It is the remaining 1%, Dark Psychology parts from Teleology.

Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic. Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.

a-dark-psychology-darkside-of-cyberspace-criminal-minds-digital-forensics-dr-internet-safety-michael nuccitelli authored-ipredator-image

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor, online psychopath or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  1. A self-awareness of causing harm to others, directly or indirectly, using ICT.
  2. The usages of ICT to obtain, exchange, deliver and tamper with harmful information.
  3. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

a-dark-psychology-darkside-of-cyberspace-criminal-minds-digital-forensics-dr-internet-safety-michael nuccitelli authored-ipredator-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

a-dark-psychology-darkside-of-cyberspace-criminal-minds-digital-forensics-dr-internet-safety-michael nuccitelli authored-ipredator-image

dark-psychology-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Pin It on Pinterest