LNM Radio Network – Spreaker Deletes LNM Radio Shows?

a-lnm-radio-network-michael-vara-internet-radio-troll-tactics-internet-troll-spreaker-ipredator-awareness-image

LNM Radio Network

Spreaker Deletes LNM Radio Shows?

LNM Radio Network (aka, Late Night in the Midlands) with host and owner, Michael Vara, has had their August 28th & 29th shows deleted by the radio and online media platform Spreaker. After requests by this writer to delete or edit these defamatory shows fell on deaf ears, Spreaker deleted both shows for breaching their Terms of Use and Community Guidelines. As LNM Radio Network, Michael Vara & their listeners will almost assuredly continue disseminating felonious and slanderous information, iPredator Inc., Spreaker and internet safety advocates will be closely watching. Spreaker is a premiere online media platform and describes their services as follows:

A web and mobile application that brings together audio creators and their fans with its sophisticated broadcasting tools and functioning social network.

iPredator Inc. Thanks Spreaker

iPredator Inc., this writer and our internet safety advocates express their appreciation to Spreaker for deleting these two shows for grossly breaching their Terms of Service and Community Guidelines. iPredator Thanks Spreaker for preventing these Internet Radio Trolls (LNM Radio Network, Michael Vara, Last Frequency, Ryan Gable, Secret Teachings) from using the good name of Spreaker and their online media platform to engage in internet defamation and slander.

a-lnm-radio-network-michael-vara-internet-radio-troll-tactics-internet-troll-spreaker-ipredator-awareness-image

Note to LNM & Secret Teachings: At any time, iPredator Inc., this writer and his associates are receptive to removing all their educational information identifying LNM Radio Network as Internet Radio Trolls from their blogs and in social sites. In return, Michael Vara, LNM Radio Network, Ryan Gable, Secret Teachings, Last Frequency & their listeners agree to cease and desist with their habitual attempts at defaming iPredator & this writer. As previously offered, Michael Vara is requested to make a quick announcement on air directing his listeners to refrain from further abuse.

As of the time this blog post was uploaded on September 14, 2014, this writer continues to find adolescent and defamatory comments within his blogs and social sites. Despite this writer having been a guest on LNM Radio Network and Secret Teachings, on many occasions, educating their listeners about cyberstalking, internet trolls, online sexual predation, psychopathy & disinformation, this writer has no doubt that LNM Radio Network, Secret Teachings, their hosts and listeners will castigate and defame this writer using these same terms.

This writer also predicts LNM Radio Network owner and host, Michael Vara, will escalate his disinformation by encouraging his listeners to continue their attacks using a plethora of manipulative techniques. He will focus on his listener’s paranoia by claiming iPredator and this writer is part of a group of government informants or what they call COINTELPRO. Needless to say, his listeners are unlikely to ever question his ludicrous assumptions. Provided here is a screen shot of a recent comment made by Mr. Vara & one of his listeners on iPredators internet safety educational wall. They are pasted as follows:

Michael Vara Comment

a-lnm-radio-network-michael-vara-internet-radio-troll-tactics-internet-troll-spreaker-ipredator-awareness-image

LNM Radio Network Listener iPredator Facebook Wall Comment

a-lnm-radio-network-michael-vara-internet-radio-troll-tactics-internet-troll-spreaker-ipredator-awareness-image

9-14-14 Vimeo Video Uploaded by Internet Radio Troll LMN Radio Network Host Michael Vara

Another Example of Internet Radio Troll Tactics. Please Note: Michael Vara, a 40+ year old adult male allegedly suffered a major heart attack, was hospitalized and then discharged within the last 72 hours of uploading this video. One would think his loved ones, dedicated listeners and co-hosts would admonish him for engaging in adolescent behaviors. This video was uploaded on September 14, 2014. For iPredator Inc. advocates, please do not flag this video or their August 28th & 29th videos.

UPDATE: 9-20-14 LNM Radio Network Vimeo Video Deleted

Vimeo Video Link: (Removed)

LNM Radio Network-Internet Radio Troll-Vimeo Video-Internet Troll Awareness Image

For those interested in listening to the August 28th & 29th LNM Radio Network shows, pasted below are their YouTube links. Now that Spreaker has deleted these two shows from their platform, and following legal counsel advice, it has been determined to not just refrain from having them removed, but to actually promote them as examples of how slander and defamation occurs in cyberspace. Although the shows are 3 hours long, LNM Radio Networks slander & defamation begins within the 1st 10-15 minutes of each show and continues for some time thereafter. If you have a problem locating these shows by clicking on the links pasted here, simply Google the titles of each show.

12-26-14 Good News Update

12-26-14 Good News Update: As of the last check on 12/25/14, these two defamation themed LNM shows have finally been removed. Thank you YouTube! Given Michael Vara’s entire YouTube Channel was recently deactivated due to multiple infractions of YouTube’s Terms of Service, there is a high probability that removing these shows were required in order to have his channel reactivated. Given Michael Vara regurgitates live on air that he’s always honest with his listeners and has nothing to hide, do you think he told his listeners the truth? All that matters is that cyber justice has caught up with Michael Vara and his juvenile tactics. Again, iPredator Inc. thanks YouTube.

Show I Title: Sailing Rocks & Underground Bases 8-28-14

YouTube Link: https://www.youtube.com/watch?v=MS54ky5YoYI (Removed)

Show II Title: Friday Night Round Table 8-29-14

YouTube Link: https://www.youtube.com/watch?v=aL2W76pgqU4 (Removed)

Thank you YouTube!

Help LNM Radio Network Stop Being Internet Radio Trolls

Internet Radio Troll: A variant of Internet Troll describing internet radio show hosts, their networks and listeners who use online media platforms and social sites to defame & humiliate a person, group, cause or belief. Unique to their profile is how they provoke and encourage their listeners to engage in the same vitriolic behaviors. Unlike Internet Trolls who act alone or in small groups, Internet Radio Trolls manipulate as many listeners as possible to join in their cyber-attacks.

a-lnm-radio-network-michael-vara-internet-radio-troll-tactics-internet-troll-spreaker-ipredator-awareness-image

Internet Troll Definition

Internet Troll: An Internet Troll is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to purposely and actively provoke, defame, anger, tease, flame, or incite other online users. More often than not, the Internet Troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet Trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions. When the Internet Trolls inflammatory statements and actions do not include a direct or implied physical threat to the target(s), their behavior is categorizes as cyber harassment. If the Trolls verbal assaults include direct or implied physical threats to their target(s), their actions are then defined as cyberstalking.

The motivations for an Internet Trolls provocative, and oftentimes, bizarre behaviors are numerous. Despite the variations in modus operandi, the vast majority of Trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice. Although there is no hard evidence or clinical research validating the psychology of the Internet Troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors. Those who have begun to investigate the etiology of the Troll suggest that the anonymity of the internet contributes to what has been called, disinhibition effect. It has been postulated that internet anonymity leads some to behave in asocial ways coupled with a lack of guilt or remorse for the harm they cause not being in the targets physical presence or even knowing their identity.

Spreaker-Thank You from iPredator Inc. and All Internet Safety Advocates-LNM Radio Network

Cyber Harassment Definition

Cyber Harassment: Cyber Harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, Cyber Harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber Harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target.

Although Cyber Harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber Harassment differs from cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include a constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT users privacy and reputation becomes more vulnerable to corruption. As anonymity via the Internet becomes more feasible, Cyber Harassment continues to flourish. Cyber Harassment is the adult form of cyberbullying to a minor.

Online Deception Definition

Online Deception [aka, Disinformation, Cyberstealth]: Unlike classic deception used by traditional criminals and deviants, Disinformation [aka, Online Deception, Cyberstealth] completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Disinformation and Cyberstealth are the activities iPredators and ICT users engage in. In this writers construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Disinformation includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. Disinformation does not require an ICT user to engage in nefarious, deviant or malevolent activities.

Although all forms of deception are problematic, Disinformation can be as subtle of what many call a “white lie.” Another difference is when iPredators use Cyberstealth to hide their identity from victims. In general, iPredators use Cyberstealth when their actions involve illegal activities and hiding their identity is paramount to reduce being identified, apprehended and prosecuted. ICT users who evaluate their odds of being identified, develop tactics and strategies to minimize identification.

a-lnm-radio-network-michael-vara-internet-radio-troll-tactics-internet-troll-spreaker-ipredator-awareness-image

iPredator Definition

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer and distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

a-lnm-radio-network-michael-vara-internet-radio-troll-tactics-internet-troll-spreaker-ipredator-awareness-image

2014 Year End Note: As of December 2014, and assuredly moving into 2015, Michael Vara and his LNM Radio supporter’s defamation and slander continues, combined with inventing preposterous stories of nefarious campaigns, that I’m spearheading, to shut down their website and shows. Although I’ve compiled an enormous database of evidence all pointing to LNM Radio Network, Michael Vara and his associates as being the source of these attacks, I’m ethically bound to say the information contained herein are allegations until a court of law makes the final determination. Thanks to iPredator legal representatives who have reviewed my evidence, LNM Radio Network, Michael Vara & his associates documented ongoing attempts to change and alter my compiled evidence makes them even more culpable then if they did nothing at all.

Having absolutely no evidence of my involvement with his show, other than briefly allowing an associate to house his unfinished documentary in our Google Drive, I can only conclude their ongoing defamatory campaigns are designed to increase donations and listener support. I can only hope Mr. Vara and his associates bring in the New Year with a resolution focused on using ethical and honest marketing campaigns as opposed to defamation and paranoia filled nonsense.

lnm-radio-network-dark-psychology-michael-nuccitelli-ipredator

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

LNM Radio Network & Michael Vara – Internet Radio Trolls?

a-lnm-radio-network-michael-vara-internet-radio-trolls-internet-troll-awareness-image

LNM Radio Network & The Internet Radio Troll?

LNM Radio Network, with host Michael Vara, is the reason this writer must author this unfortunate post. The post and the series to follow are words in defense of his career and character. Despite respectful requests to LNM Radio Network and Michael Vara to delete his information pasted below, all requests fell on deaf ears. However, after conducting extensive research into the iPredator typology of Internet Trolls and comparing their profiles with recent interactions with LNM Radio Network & Michael Vara, this writer concluded there may exist a new form of Internet Troll called the Internet Radio Troll.

It is important to note that this writer does not view Michael Vara, LNM Radio Network or his listeners as malevolent or psychopathological. Sadly, the events that will be documented over the course of these educational posts will illustrate how a small time internet radio show host, who perceives himself as visionary, effectively manipulates his blind faith listeners into engaging in internet trolling, cyber harassment, cyberstalking, disinformation and pathological online deception. As melodramatic and seemingly preposterous as these accounts will sound, this writer can provide evidence of each and every claim presented. Over the course of these educational posts, this writer hopes his experiences will prevent others from suffering the same kind of disparagement.

a-lnm-radio-network-michael-vara-internet-radio-trolls-internet-troll-awareness-image

LNM Radio Network

LNM Radio Network, Michael Vara, Ryan Gable, Last Frequency, Secret Teachings and their listeners illustrate how the Darkside of Human Consciousness (Dark Psychology) is alive and well in the Information Age. For those interested in this writers work on developing Cybercriminal Psychology and the iPredator typologies of Cyber Harassment and Internet Trolls, these two LNM Radio Network shows, publically available at YouTube are provided here for your listening.

12-26-14 Good News Update

12-26-14 Good News Update: As of the last check on 12/25/14, these two defamation themed LNM shows have finally been removed. Thank you YouTube! Given Michael Vara’s entire YouTube Channel was recently deactivated due to multiple infractions of YouTube’s Terms of Service, there is a high probability that removing these shows were required in order to have his channel reactivated. Given Michael Vara regurgitates live on air that he’s always honest with his listeners and has nothing to hide, do you think he told his listeners the truth? All that matters is that cyber justice has caught up with Michael Vara and his juvenile tactics. Again, iPredator Inc. thanks YouTube.

Show I Title: Sailing Rocks & Underground Bases 8-28-14

YouTube Link: https://www.youtube.com/watch?v=MS54ky5YoYI (Removed)

Show II Title: Friday Night Round Table 8-29-14

YouTube Link: https://www.youtube.com/watch?v=aL2W76pgqU4 (Removed)

Thank you YouTube!

For interested parties who may listen, the first hour of each show is where LNM Radio Network and Michael Vara are in “rare form”. It is also important for the reader to know that, as advised by legal counsel, this writer attempted to contact Mr. Vara to respectfully remove these shows. His response was a resounding (No) in addition to a multitude of expletives. Not only did Mr. Vara refuse to delete or edit these LNM Radio Network episodes, he also proceeded to reach new adolescent heights by creating one of several images alleging this writer to either be a psychopath or pedophile. Pasted here is one of his images he created and published in his public Facebook Page.

a-lnm-radio-network-michael-vara-internet-radio-trolls-internet-troll-awareness-image

As of September 9th, 2014, anyone is welcomed to visit his page to view for yourself. Simply scroll down to September 6, 2014 to view his piece of art. Please note you must have a Facebook profile to view this post or any information published in Facebook. Link: https://www.facebook.com/latenightinthemidlands?fref=ts

a-lnm-radio-network-michael-vara-internet-radio-trolls-internet-troll-awareness-image

Over the course of the series of posts that will describe and profile the Internet Radio Troll, this writer provides here his first draft definition. In the next post, this writer will describe how the lead Internet Radio Troll, usually the show host, manipulates his listeners into becoming a mobilized force working to please their leader. The Internet Radio Troll is as follows:

Internet Radio Troll: A variant of Internet Troll describing internet radio show hosts and/or networks who use online media platforms and social media to defame a person, group, cause or belief. Unique to the Internet Radio Troll is how they incite and encourage their listeners to engage in the same vitriolic behaviors.

Late Night in the Midlands

Internet Radio Troll is an umbrella term describing any internet radio show or online media venue that engages in similar deceptive behaviors that LNM Radio Network, Michael Vara & his listeners have exhibited by singling out and targeting the his chosen victim. Working as a group, these entities use cyberspace and Information and Communications Technology to deprecate and defame a past guest, chosen individual or group using a variety of nefarious tactics. Working as an individual or group, Internet Radio Trolls engage in exhaustive research attempting to locate any past, present or historical information that can be used to defame their target. As the target, this writer presently experiences defamation by LNM Radio Network, Michael Vara & his listeners.

Unlike a functional and ethical media professional, the Internet Radio Troll also represents the host who incites his/her listeners and disseminates a plethora of felonious information about the target. Instead of focusing on the topic of the show, the lead Internet Radio Troll host spends on air time deprecating the target. Most disconcerting is that the Internet Radio Troll target is never given an on air forum to debate the accuser.

2014 Year End Note: As of December 2014, and assuredly moving into 2015, Michael Vara and his LNM Radio supporter’s defamation and slander continues, combined with inventing preposterous stories of nefarious campaigns, that I’m spearheading, to shut down their website and shows. Although I’ve compiled an enormous database of evidence all pointing to LNM Radio Network, Michael Vara and his associates as being the source of these attacks, I’m ethically bound to say the information contained herein are allegations until a court of law makes the final determination. Thanks to iPredator legal representatives who have reviewed my evidence, LNM Radio Network, Michael Vara & his associates documented ongoing attempts to change and alter my compiled evidence makes them even more culpable then if they did nothing at all.

Having absolutely no evidence of my involvement with his show, other than briefly allowing an associate to house his unfinished documentary in our Google Drive, I can only conclude their ongoing defamatory campaigns are designed to increase donations and listener support. I can only hope Mr. Vara and his associates bring in the New Year with a resolution focused on using ethical and honest marketing campaigns as opposed to defamation and paranoia filled nonsense.

a-lnm-radio-network-michael-vara-internet-radio-trolls-internet-troll-awareness-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

a-lnm-radio-network-michael-vara-internet-radio-trolls-internet-troll-awareness-image

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Cyber Harassment: Deception, iPredator & Internet Trolls

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

Cyber Harassment

Visit iPredator Inc.’s “Cyber Harassment” page to review or download, at no cost, information on cyber harassment, cyber abuse, defamation and trolls. If preferring not to visit the iPredator parent site, below are definitions for Cyber Harassment, Online Deception, iPredator, iPredator Bridge & Internet Trolls.

“Cyberstealth is defined as a method and/or strategy by which a child, adult, group or nation uses Information and Communications Technology (ICT) to establish and sustain complete anonymity while they troll, stalk and attack their target(s). To ensure successful anonymity, Cyberstealth employs Online Deception, Social Engineering and Disinformation to distract and confuse their target(s). Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators (aka, Online Assailants) range from negligible to highly complex and multi-faceted.” Michael Nuccitelli, Psy.D. (2014)

Cyber Harassment:Cyber Harassment is defined as the use of Information and Communications Technology (ICT) to harass, control, manipulate or habitually disparage a child, adult, business or group without a credible or implied threat of harm. Unlike physical harassment requiring physical contact, Cyber Harassment occurs in cyberspace using ICT and is verbal, emotional or social abuse of a person based on their race, gender, religion, socio-economic status, physical attributes, sexual orientation or beliefs. Cyber Harassment is a tactic used by an ICT assailant that may or may not be rooted in an attempt to control, dominate or manipulate their target.

Although Cyber Harassment pertains to unrelenting taunting and disparaging information directed at a child, adult, public figure, group or business using ICT, the motivations of the assailant may be rooted in their own pathological drives and motivations. Cyber Harassment differs from cyberstalking in that it is generally does not involve a credible or implied physical threat. Harassment does not include a constitutionally protected activity or conduct that serves a legitimate purpose. In a rapidly expanding digital world, an ICT user’s privacy and reputation becomes more vulnerable to corruption. As anonymity via the Internet becomes more feasible, Cyber Harassment continues to flourish. Cyber Harassment is the adult form of cyberbullying to a minor.

Internet Troll

Internet Troll: An Internet Troll is a colloquial expression used to define an online user who uses Information and Communications Technology (ICT) to purposely and actively provoke, defame, anger, tease, flame, or incite other online users. More often than not, the Internet Troll does not know the target recipient(s) of their vitriolic statements and behaviors. Internet Trolls regularly appear in all forms of online mediums ranging from online video gaming gatherings to chatroom and forum discussions. When the Internet Troll’s inflammatory statements and actions do not include a direct or implied physical threat to the target(s), their behavior is categorizes as cyber harassment. If the Troll’s verbal assaults include direct or implied physical threats to their target(s), their actions are then defined as cyberstalking.

The motivations for an Internet Troll’s provocative, and often times, bizarre behaviors are numerous. Despite the variations in modus operandi, the vast majority of Trolls are seeking attention, recognition, stimulation pseudo-notoriety and retribution for some unknown perceived injustice. Although there is no hard evidence or clinical research validating the psychology of the Internet Troll, it is commonly believed that the “Veil of Anonymity” afforded to every online user inspires some to engage in egregious behaviors. Those who have begun to investigate the etiology of the Troll suggest that the anonymity of the internet contributes to what has been called, disinhibition effect. It has been postulated that internet anonymity leads some to behave in asocial ways coupled with a lack of guilt or remorse for the harm they cause not being in the target’s physical presence or even knowing their identity.

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer/distributor or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT.
II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

iPredator Bridge

iPredator Bridge: iPredator Bridge is a theoretical tenet of iPredator representing the psychological, perceptual & behavioral trajectory of people who use Information and Communications Technology [ICT] to harm others motivate by self-righteousness, moral turpitude, religious/political/philosophical convictions and pro-social perceptual distortions. Not initially driven by criminal, malevolent or deviant endeavors, iPredator Bridge seeks to define why some people approach the nefarious and malevolent realm of iPredator, decide to proceed, and then continue along a trajectory where their cognitive, affective, behavioral and perceptual actions harm others or societies. Similar to the iPredator, they are motivated by personal convictions, greed, power, control, narcissism or psychopathology. Different from the iPredator, they have yet to engage in criminal/deviant activities using ICT or use complex perceptual distortions to validate the harm they cause. iPredator Bridge investigates why some people draw near to this realm and either proceed in their maladaptive trajectory or cease and desist.

Hidden in cyberspace, and through ICT, they contemplate the benefits and detriments, proceed, and then continue a path where their cognitive and perceptual processes are focused upon directly or indirectly harming others. For those who cross this proverbial bridge, they enter a world where their choices are increasingly governed by criminal, deviant, immoral and maladaptive processes.

Although it is assumed all humanity, has residing deep in their psyche, the potential & Dark Psychology for behaving in harmful and malevolent ways they rarely or never activate, ICT and cyberspace offers a direct connection and psychological route to the dark side. Just as ICT and cyberspace is incredibly pro-social and beneficial to humanity, these same technological advancements can lead humanity to diabolical and sinister endeavors.

iPredator Bridge is a symbolic representation of the approach, route and initial crossing into the realm of the iPredator. In a rudimentary and abstract way, it is posited that cyberspace, ICT and all future technological advancements, related to information technology, is an extension of the mind and the instinctual drives of the collective brain to replicate itself outside a human organism. Related to this postulate are the theoretical tenets of Carl Jung [1875-1961] and his construct of the Collective Unconscious.

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

“The Information Age technocentric concept of being “connected” is actually a paradox of disconnection causing us to lose our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology [ICT] grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than realty based relationships.” Michael Nuccitelli, Psy.D. (2014)

Cyberstealth

Cyberstealth: Cyberstealth is a concept formulated along with iPredator and is a term used to define a method and/or strategy by which iPredators use Information and Communications Technology (ICT) , if they so choose, to establish and sustain complete anonymity while they troll and stalk a target. Cyberstealth is a methodology entrenched in Information Age Deception or also called online deception. Given the Internet inherently affords everyone anonymity, Cyberstealth used by iPredators range from negligible to highly complex and multi-faceted. The rationale for using “stealth” in the suffix of this term, serves to remind ICT users the primary intent fueling iPredators. This intent is to hide their identity by designing false online profiles, identities, covert tactics and methods to ensure their identities remain concealed reducing their probability of identification, apprehension and punishment.

Unlike classic deception used by traditional criminals and deviants, Online Deception completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Information Age Deception and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Information Age Deception includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others.

Online Deception

Online Deception, [aka, Cyberstealth, Disinformation]: Unlike classic deception used by traditional criminals and deviants, Disinformation [aka, Online Deception, Cyberstealth] completely relies on the anonymity and “veil of invisibility” available to all ICT users. The primary difference between Disinformation and Cyberstealth are the activities iPredators and ICT users engage in. In this writer’s construct, Cyberstealth is reserved for iPredators who actively plan a strategy that have criminal, deviant and harmful implications to targeted victims. Disinformation includes all forms of Cyberstealth, but also includes deceptive practices that do not have elements of crime, defiance or harm against others. Disinformation does not require an ICT user to engage in nefarious, deviant or malevolent activities. Although all forms of deception are problematic, Disinformation can be as subtle of what many call a “white lie.”

Another difference is when iPredators use Cyberstealth to hide their identity from victims. In general, iPredators use Cyberstealth when their actions involve illegal activities and hiding their identity is paramount to reduce being identified, apprehended and prosecuted. ICT users who evaluate their odds of being identified, develop tactics and strategies to minimize identification are motivated by criminal, deviant & harmful causes are iPredators using Cyberstealth.

“Whether used to influence the masses or in cyberspace to persuade others into divulging confidential or sensitive information, social engineering requires psychological manipulation to control a person, group or nation. In the Information Age, children can be just as effective at social engineering as adults and cause driven groups.” Michael Nuccitelli, Psy.D. (2014)

cyber-harassment-harassment-online-harassment-internet-harassment-ipredator-internet-safety-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dark-psychology-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Cyber Deception – Cyber Deception Warning Signs Checklist

cyber-deception-cyber-deception-warning-signs-checklist-michael nuccitelli, psy.d.-dark-psychology-ipredator

Cyber Deception

Cyber Deception Warning Signs Checklist

Visit iPredator’s Cyber Deception page to download, at no cost, their free cyber deception warning signs checklist for assessing deceptive activities. IBWSC Link

Cyber Deception Warning Signs Checklist (IBWSC): Based on the iPredator Bridge construct, the Cyber Deception Warning Signs Checklist is a 50 item checklist designed to investigate if a loved one, colleague or peer is participating in or close to participating in harmful online and/or ICT activities towards others. Multiple affirmative responses to IBWSC statements suggests the person being queried exhibits patterned and/or observable behavioral patterns indicating they may be engaged in online deceptive activities. The IBWSC focuses on confirmed behavioral observations and not upon personal convictions and/or philosophical reasons for harming others online or using ICT.

Based on iPredator Bridge construct, the IBWSC assumes there are both people engaged in nefarious and malevolent activities and those engaged in harming others driven by distorted beliefs they are doing so for righteous and/or morally supported reasons. The common thread identical in both segments is the victims they target suffer from their attacks. The IBWSC has not been validated by clinical research, a governing body or academic institution. It has been compiled and published to be a point of reference to educate and assist anyone who is concerned that they, their children, business or community are in the presence of an iPredator or someone in transit to becoming an iPredator.

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer and distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

cyber-deception-cyber-deception-warning-signs-checklist-michael nuccitelli, psy.d.-dark-psychology-ipredator

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

home-button-dark psychology-darkside of human consciousness-michael nuccitelli, psy.d.-ipredator

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Online Psychopathy List Released by Dr. Nuccitelli

online-psychopaths-michael-nuccitelli-dark-psychology-ipredator-psychopathy

Online Psychopathy List Released

by

Dr. Nuccitelli

Online Psychopaths [aka, iPredopaths] is an Information Age criminology and human consciousness construct replacing classic sociopathy and psychopathy. Online Psychopaths [aka, iPredopaths] is a severe personality disorder describing anyone who skillfully uses cyberspace to troll, identify, control and manipulate others. Driven by grandiosity or sexual perversion, they experience no remorse or guilt. Many iPredators and iPredopaths do not break the law and live unscathed by law enforcement, fraternal organizations, religious institutions and the legal system.

Provided in this article is this writer’s checklist of online psychopathic traits and tactics they use in cyberspace. At the base of the article is the link to the iPredator Internet Safety website where you can review or download, at no cost, the Dr. Nuccitelli’s Online Psychopath checklist, along with, his fully formatted PDF article.

Online Psychopath iPredator Link: https://www.ipredator.co/online-psychopaths/

Online Psychopaths | iPsychopath

Online Psychopaths [aka, iPredopaths]: iPredopathy is an Information Age criminology and human consciousness construct replacing the pre-Information Age profiles of sociopathy and psychopathy. iPredopathy is an advanced stage personality disorder describing any adolescent to adult male or female who skillfully uses Information and Communications Technology [ICT] to troll, identify, control and manipulate their human targets. Driven by grandiosity, sexual perversion or perceptual distortion, Online Psychopaths and iPredopaths experience no remorse or shame for the harm they cause others. Just as iPredators, many iPredopaths do not break the law and live unscathed by law enforcement, fraternal organizations, religious institutions and the legal system.

Using cyberspace [aka, Internet, Darknet, Usenet] and electronic devices, Online Psychopaths [aka, iPredopaths] design and implement their criminal, deviant, violent, deceptive and cyberstalking tactics. Their human quarries are  unsuspecting, vulnerable, submissive and internet safety ignorant children, older adults, unprepared businesses and psychologically distressed adults. Unlike the psychologically dysfunctional, developmentally immature and minimal to moderate anti-social personality disordered iPredator, iPredopaths do not experience guilt, remorse, shame or fear before, during or after their offline and online conquests and/or manipulative interpersonal dynamic strategies.

In addition to being devoid of remorse and shame, iPredopaths are extremely grandiose, habitually deceptive and highly dependent upon ICT to fuel, define and justify their dissociative perceptual fantasies. iPredopaths are similar in core beliefs to pre-Information Age psychopaths, but differ in behavioral signatures, stalking methodologies, choice of hunting environments, and psychodynamic faculties. Although at much higher rates of engaging in violent, sadistic and severely depraved behaviors than the general population, most iPredopaths are not homicidal, sexually perverted or overtly violent. In fact, using the persuasive and deceptive power of cyberspace, iPredopaths are capable of embarking upon offline opportunities endeavoring to become heads of state, corporate and community leaders, successful religious zealots and members of the political elite.

Given most cyberspace, social media and mobile device communications are primarily non-physical contact involved, physical interactions may or may not be the iPredopath’s modus operandi. Within the next century, the Online Psychopath will become the predominant form of apex human predator as pre-Information Age psychopaths extinguish, replaced by iPredopaths who are ICT, social media and internet savvy. Lying upon a spectrum of dexterity, proficiency and ICT skills, the segment of iPredopath most difficult to locate, identify and apprehend is Doctus iPredopath. Unlike the less advanced iPredopath, who is reliant upon ICT and cyberspace, Doctus iPredopath is proficient and manipulative in both offline and online environments.

Although Doctus iPredopath is habitually driven by perceptual distortions and grandiose fantasies, they are skilled at preventing their grandiosity from becoming a means leading to their identification and apprehension. The theoretical triad of Information Age darkside of human consciousness is iPredator, iPredopath and Doctus iPredopath [IP3].

In addition to being devoid of remorse and shame, iPredopaths are extremely grandiose, habitually deceptive and dependent upon ICT to fuel, define and justify their dissociative perceptual fantasies. iPredopaths are similar in core beliefs to pre-Information Age psychopaths, but differ in behavioral signatures, stalking methodologies, choice of hunting environments, and psychodynamic faculties. Although at much higher rates of engaging in violent, sadistic and severely depraved behaviors than the general population, most iPredopaths are not homicidal, sexually perverted or overtly violent.

In fact, using the persuasive and deceptive power of the internet, iPredopaths are capable of embarking upon offline opportunities endeavoring to become heads of state, corporate and community leaders, successful religious zealots and members of the political elite. Given most cyberspace, social media and mobile device communications are primarily non-physical contact involved, physical interactions may or may not be the iPredopath’s modus operandi. Within the next century, the iPredopath will become the predominant form of apex human predator as pre-Information Age psychopaths extinguish replaced by Online Psychopaths [aka, iPredopaths and Doctus iPredopaths] who are ICT and internet savvy.

“It is the individual who is not interested in his fellow men who has the greatest difficulties in life and provides the greatest injury to others. It is from among such individuals that all human failures spring.” Alfred Adler [1870-1937]

an-online-psychopath-ipsychopath-cyberstealth-ipredator-michael-nuccitelli-dr-internet-safety-and-dark-psychology-authored-internet-safety-image

Doctus iPredopath | Apex Online Psychopaths

Doctus iPredopath [aka, Apex Online Psychopaths]: Doctus iPredopath is an Information Age theoretical criminology concept replacing the most successful of all pre-Information Age psychopaths [aka, traditional psychopathy]. Doctus iPredopaths are apex human predators who are Information and Communications Technology [ICT] skilled, highly intelligent, perceptually sadistic, remorseless and  masters of deception. Doctus iPredopathy defines the most proficient, elusive and skilled online psychopaths. iPredopathy is a severe form of characterological personality disorder defining  ICT skilled or reliant adults who engage in criminal, deviant and habitually deceptive online practices targeting vulnerable men, women, children and unsuspecting groups.

Unlike Online Psychopaths and iPredopaths, Doctus iPredopaths are commanders of identity cloaking, if they decide, combined with being proficient at exploiting and victimizing their human prey in both online and offline environments. Doctus iPredopaths do not fall upon a disorganized and primitive to organized and advanced continuum, as Online Psychopaths do, as their criminal acumen, ICT aptitude and sadistic appetites put them in a league of their own. All Doctus iPredopaths are highly skilled in the iPredator themed construct of Cyberstealth, as well as, the art and science of deception and calculating proficiency in manipulating their human prey. Doctus iPredopaths are capable of cloaking their true modus operandi by initially presenting themselves as harbingers of peace and social awareness.

Doctus iPredopaths [aka, Apex Online Psychopaths] can ascend to levels of becoming pillars of their communities, corporate and organizational leaders, heads of state and persuasive religious zealots. Although all iPredopaths are much more likely to implement sinister, vicious and diabolical online endeavors than iPredators, Doctus iPredopaths and Doctus iPredopath led groups are guaranteed  to methodically plot and implement their fiendish, malignant and deadly fantasies.

an-online-psychopath-ipsychopath-cyberstealth-ipredator-michael-nuccitelli-dr-internet-safety-and-dark-psychology-authored-internet-safety-image

Online Psychopath & iPredopath [iP3] Core Assumptions

I. iPredopathy  is a characterological personality disorder describing any male or female who uses Information and Communications Technology [ICT] to engage in criminal, deviant, deceptive or cyberstalking themed behaviors for the purpose of violent, criminal, deviant and deceptive offline interactions. Unlike many iPredators, iPredopaths do not experience guilt, remorse, shame or fear before, during or after their cyber attacks.

II. Although all iPredopaths meet criteria for iPredator, most iPredators are not iPredopaths.

III. To meet criteria for iPredator and iPredopath, online users must meet the three criteria of iPredator  as follows:  1. A self-awareness of causing harm to others, directly or indirectly, using ICT. 2. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. 3. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

IV.  Doctus iPredopath’s are the most elusive, ICT savvy, and criminally versatile within the Online Psychopath and iPredopath Group.

V. Unlike iPredopaths requiring ICT, Doctus iPredopaths are equally adept at targeting and manipulating their victims in online and offline environments.

VI. iPredopath and Doctus iPredopath share similar traits, modus operandi and developmental histories to classic psychopaths and sociopaths, but differ significantly in their preferred arenas for hunting targets and manipulating their support system.

VII. Online Psychopaths [aka, iPredopath & Doctus iPredopath] are more likely to engage in perceptual fantasy and dissociative experiences influenced by their habitual use of Information and Communications Technology.

VIII. Given the “veil of anonymity” afforded to all online users in cyberspace, online psychopaths seek out other online users who will conform and validate their perceptual distortions and bizarre fantasies.

IX. Most, if not all, of an online psychopath’s feelings of grandiosity and narcissism are fueled by Information and Communications Technology.

X. Although the vast majority of online psychopaths do not engage in violence and sexual perversion, for those who do, Information and Communications Technology and social networking sites are the prime tools and arenas used to troll, locate, and ensure physical contact.

XI. Unlike Doctus iPredopaths, iPredopaths are dependent upon Information and Communications Technology to manipulate, deceive and victimize others.

XII.  Just as classic psychopaths, Online Psychopaths & iPredopaths vary in dexterity, typologies, existence of mental illness, intelligence and quantity of victims.

Dark Psychology

Dark Psychology: Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon other people motivated by criminal and/or deviant drives that lack purpose and general assumptions of instinctual drives and social sciences theory. All of humanity has the potentiality to victimize humans and other living creatures. While many restrain or sublimate this tendency, some act upon these impulses. Dark Psychology seeks to understand those thoughts, feelings, perceptions and subjective processing systems that lead to predatory behavior that is antithetical to contemporary understandings of human behavior.

Dark Psychology assumes that criminal, deviant and abusive behaviors are purposive and have some rational, goal-oriented motivation 99% of the time. It is the remaining 1%, Dark Psychology parts from Adlerian theory and Teleology. Dark Psychology encompasses all that makes us who we are in relationship to our dark side. All cultures, faiths and humanity have this proverbial cancer. From the moment we are born to the time of death, there is a side hidden within us that some have called “Evil” and others have defined as criminal, deviant or psychopathic.

Dark Psychology posits there are people who commit these same acts and do so not for power, money, sex, retribution or any other known purpose. They commit horrid acts without a goal. Simplified, their ends do not justify their means. There are people who violate and injure others for the sake of doing so. Within in all of us is this potential. A potential to harm others without cause, explanation, or purpose is the area explored. Dark Psychology assumes this dark potential is incredibly complex and even more difficult to define.

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.

Whether the offender is a cyberbully, cyberstalker, cyber harasser, internet troll, cybercriminal, online sexual predator, cyber terrorist, online child pornography consumer and distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators include the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI]. An iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Just as pre-Information Age criminals, deviants and aggressors, most iPredators have the capacity to experience remorse, guilt and shame, even if these traits are imperceptible at best. iPredators include the largest segment of humanity who engage in malevolent and deceptive online practices. They can be technologically skilled or unskilled, functional or dysfunctional, destructive or self-destructive and covert or overt in disclosing their identity. A sub-tenet of iPredator is iPredator Bridge defining online users who engage in the same aggressive and harmful online activities as iPredators, but are motivated by distorted beliefs of moral conviction. The definitions of iPredator Bridge & Cyberstealth is as follows:

online-psychopath-dark-psychology-michael-nuccitelli-ipredator

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

HOME BUTTON FOR IPEDATOR-DARK PSYCHOLOGY-DR INTERNET SAFETY-SITES

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Internet Safety Tips for Parents and Educators

internet-safety-tips-parents-educators-ipredator-michael-nuccitelli-psy.d.-dark-psychology

Internet Safety Tips for Parents and Educators

Parent and Teacher Internet Safety

“Internet Safety Tips for Parents and Educators” is an article for parents, primary caregivers and educators addressing cyber attack prevention and internet safety. Authored by Michael Nuccitelli Psy.D., a New York State licensed psychologist and the author of iPredator, a new Information Age forensic construct. Dr. Nuccitelli provides internet safety tips and cyber attack prevention strategies to help insulate children from being cyber attacked by peers and adults engaged in online sexual predation.

Back to School Internet Safety Tips for Year Round Application

Online Sexual Predators (aka iPredators) habitually prepare for children and teens, around the country, returning to school looking to the internet for their academic, social networking and developmental needs. The beginning of a new school year guarantees a significant increase in online usage, and most important to online sexual predators, patterned and predictable times of online usage. Now that children will be back to school, their time spent online significantly increases along with patterned and predictable times they access the internet. Online sexual predators, cyberbullies, cyber criminals and cyberstalkers ready themselves for another year of unsuspecting and ignorant groups of vulnerable, discouraged and online high risk taking children.

Provided below are 14 internet safety tips compiled by Michael Nuccitelli, Psy.D, a New York State licensed psychologist and author of the new Information Age forensics construct, iPredator. The internet safety tips and recommendations were compiled to assist adults insulate children from being cyber attacked and targeted by iPredators. Dr. Nuccitelli’s definition of iPredator is as follows:

Internet Safety Tips

internet-safety-tips-parents-educators-ipredator-michael-nuccitelli-psy.d.-dark-psychology

Internet Safety Tips and iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT.

Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tampers with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

internet-safety-tips-parents-educators-ipredator-michael-nuccitelli-psy.d.-dark-psychology

Internet Safety Tips and Cyberstealth

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

“Malevolent in intent, iPredators rely on their capacity to deceive others using information technology in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.” Michael Nuccitelli Psy.D. C.F.C., iPredator Inc. (2013)

For proactive parents who plan to practice and institute internet safety, we have compiled a quick checklist of internet safety tips to help ensure your bases are covered. We hope this checklist helps insulate your child from abuse and leads to a safe and enjoyable school year.

internet-safety-tips-parents-educators-ipredator-michael-nuccitelli-psy.d.-dark-psychology

FBI’s Parents Internet Safety Guide

1. FBI’s Parents Internet Safety Guide: Visit the FBI’s website and thoroughly read their excellent overview called “A Parent’s Guide to Internet Safety”. Before moving on to the next step, make sure you have written down and have easy access to your local police department’s phone numbers. To download online, enter into Google or your favorite search engine the term “FBI Parents Guide”. On the first page will be the link to read or download.

FBI Parent Guide PDF Link

internet-safety-tips-parents-educators-ipredator-michael-nuccitelli-psy.d.-dark-psychology

Offline Distress Dictates Online Response

2. Offline Distress Dictates Online Response: A child is particularly prone to engage in high-risk behaviors online if he/she is feeling discouraged, angry or distressed. Do not move on to the next step until you are confident your child is feeling encouraged, stable or being monitored by a professional or trusted loved one. Of the many articles and studies we have researched, a child’s psychological status highly correlates with their online behaviors. If there are ongoing conflicts at home, recent traumatic events or any other anxiety and/or distressing events in the home, it is very important to monitor your child’s online usage.

Just as important as your child’s home environment is your child’s school environment. Given you cannot be with your child when they are at school, it is important to maintain regular contacts with school officials regarding your child’s attitudes and behaviors on school grounds. Although academics in school are a priority, your child’s demeanor with teachers and fellow students speaks to their psychological and emotional welfare. Research has directly linked a child’s school and home environments to their online activities.

internet-safety-tips-parents-educators-ipredator-michael-nuccitelli-psy.d.-dark-psychology

Personal Information Prevention Planning

3. Personal Information Prevention Planning: The number one and most important issue to address with your child is the amount of personal information they share online. Getting your child to practice minimal release of their name, contact information, photographs and passwords to their social sites is highly desirable. If we were to make an approximation of the articles, we have read on Internet safety and cyber security, 99% percent of them list restriction of sharing personal information online being vital to Internet safety. It cannot be emphasized enough, but children who disclose their contact information, personal information and images freely are at a much higher risk of being targeted by a iPredator. The goal as an internet safety proactive parent is not to totally restrict or forbade your child from sharing personal information, but to educate them on being highly cautious and consistently aware when, why and what they disclose to others.

**Research has demonstrated that the vast majority of taunting, abuse, cybercrime and sexual assault that children endure is most likely coming from their peers and/or known adults rather than unknown adult online sexual predators.*

internet-safety-tips-parents-educators-ipredator-michael-nuccitelli-psy.d.-dark-psychology

Peers, Parents and the PTA

4. Peers, Parents and the PTA: Given that, you cannot monitor your child’s online activities when they are not in your presence; it is paramount to access those people who are expected to be. Your child’s friends, their parents and school are the three prime social targets you should be contacting. The goal is to initiate and sustain open communication with your child’s friends and their parents regarding internet safety expectations. Just because you have restricted your child from certain online activities does not mean your child’s friends are restricted or their parents have online house rules.

Using your capacity to be cordial and polite, maintain a consistent open dialogue with your child’s social circles. Regarding your child’s school environment, it is important to have an open conversation with school officials and/or the PTA to ensure that Internet safety and cyber security mechanisms are in place. Before the school year begins, contact school officials and investigate their internet safety measures, educational emphasis on Internet security and procedures for cyberbullying, cyberstalking, sexting, mobile device usage during school hours and cybercrime related to adolescent life.

internet-safety-tips-parents-educators-ipredator-michael-nuccitelli-psy.d.-dark-psychology

Know Your Child’s Social Networking Sites

5. Know Your Child’s Social Networking Sites: As of 2013, Facebook, Twitter, MySpace, Tagged and MyYearbook are among the most popular social networking sites children and teens look to for their cyber identity, digital reputation and online social relationships. Thanks to the internet and digital technology, many children and teens look to the digital universe for their self-esteem. Unfortunately, iPredators also choose these sites as their most favored websites spending most of their free time trolling for unsuspecting, naive, discouraged or high-risk children. Given there are 400-500 popular global social sites, and growing, it is of the utmost importance to spend time with your child discussing digital citizenship and cautious online communications.

internet-safety-tips-parents-educators-ipredator-michael-nuccitelli-psy.d.-dark-psychology

Smartphones and Cellphones Need More Smarts

6. Smartphones and Cellphones Need More Smarts: A smartphone is a wireless phone with voice, messaging, scheduling, e-mail and internet capabilities. Research and marketing trend experts’ project sales of smartphones will exceed personal computers by 2014. In 2012, 697 million smartphones were sold. Despite the benefits of mobile digital technology, children and teens are becoming dependent on their mobile phones more than ever before. Recent studies have suggested children who are depressed, anxious and/or discouraged spend more time interacting with their mobile devices and less time being typical children.

It is vital that as a parent, you monitor the amount of time your child spends on their mobile phone and contact your phone carrier about additional security features that they may offer. If a cellphone or smartphone is in your child’s future, be sure to have the store you purchase the phone from install or set up all the necessary safety and filtering devices and software.

internet-safety-tips-parents-educators-ipredator-michael-nuccitelli-psy.d.-dark-psychology

Weekly Digital Dinner

7. Weekly Digital Dinner: The term may sound absurd, but making it a habit to discuss the family’s digital habits at least once weekly during dinner is both proactive and helpful. With today’s dual parent working families and single parent households, dinnertime is one of the few weekly events that are consistent, predictable and social. By all family members discussing their internet activities, children will feel more comfortable to disclose information relevant to Internet safety and their online activities. During these weekly discussions, always make sure to discuss the importance of being highly cautious of sharing personal information online.

It is also highly recommended to discuss positive, beneficial aspects and stories about online usage to make the weekly discussions fair and balanced. Prior to every weekly digital dinner discussion, it is highly recommended to announce, to all involved, that any information shared regarding online activities will not cause punishment, retribution or embarrassment. This weekly announcement may be redundant, but it reaffirms to your children that they will not be punished for their mistakes or irresponsible online behaviors.

A Parent Internet Safety and Back to School Internet Safety Tips-Dark Psychology Image

House Rules Include Online Rules

8. House Rules Include Online Rules: Just as children have curfews, responsibilities and chores, they also should have online rules and regulations. Based on our findings, there are no universal online rules that can be applied to children of all ages. The three that these writers feel are most relevant to children of all ages and at all times are as follows: 1. Cautious disclosure of sharing personal information online. 2. Never meeting someone met online without supervision. 3. Never share passwords to anyone other than parents. Other than this triad, parents should establish house online rules based on their child’s age, developmental maturity, knowledge and persistence of Internet safety.

In addition to the trifecta of obvious rules mentioned, research has led these writers to conclude that nighttime online usage and time patterns should be considered when negotiating or designing online rules. Research on iPredators have concluded that they prefer to troll for their victims during evening hours and at time intervals when the child or children they are targeting typically log on to the internet. The iPredator learns online log on habits and set their schedule to match the child they are targeting.

A Parent Internet Safety and Back to School Internet Safety Tips-Dark Psychology Image

Emphasize the Child’s Developmental Achilles Heel

9. Emphasize the Child’s Developmental Achilles Heel: Part of being an effective parent is being a creative parent. All children, starting anywhere from 7-10 years of age, develop an accentuated self-awareness. Once this self-awareness begins, the child begins to worry how their peers perceive them. As they continue physical and psychological maturation, this strong focus on self-image, popularity and peer acceptance becomes their primary driving forces until they have finished college. Knowing your child will probably be experiencing these highly dramatic and emotions, you can use them advantageously regarding their online activities.

Instead of telling your child “NO”, educate them on how images and information we share online can last for years. Just as rumors of friends spread, online rumors and embarrassing images can go “viral”. Directly connecting your child’s developmental fears to their online behaviors of disclosing information is an effective and natural internet safety tip. When done in a considerate, respectful way, this method for teaching your child to be cautious of sharing personal information can be highly effective.

A Parent Internet Safety and Back to School Internet Safety Tips-Dark Psychology Image

Online Parental Control? No Such Thing

10. Online Parental Control? No Such Thing: With the trends of today’s online community and technological advancements, insulating your child from iPredators and keeping them safe online has been ever more challenging. Ranging from home computers to mobile digital technology, children have access and exposure to multiple forms of online activities and devices. Even if you use content blockers, filters, trackers or parental control software, children have ways to get around these if their heart and minds are set on engaging in high-risk online activities. Before purchasing security software or hardware, contact a trusted source. In every community, someone, your friends or a colleague knows a digital technology expert. Given that the market is flooded with hundreds of products, services and methods contact your local expert source and rely on their recommendations. Secondly, contact your phone and Internet Service Provider (ISP) for what they recommend to protect your child.

A Parent Internet Safety and Back to School Internet Safety Tips-Dark Psychology Image

iPredator Inc.’s Parent Internet Safety Guide

11. iPredator Inc.’s Parent Internet Safety Guide: The iPredator Inc. Parent Internet Safety Guide is a web page and online article available for download, at no cost, at iPredator Inc.’s internet safety website. Regularly updated, the web article is monitored for accuracy and relevance as the Information Age continues to evolve. To assist parents, primary caregivers and educators, the article provides internet safety tips, online sexual predator prevention tips, iPredator target factors and cyberbullying tactics.

As Information and Communications Technology (ICT) becomes widespread, cyber attack prevention, education and protection are areas that will require immediate attention. The Information Age has many benefits to humanity, but it is vital to identify and prevent the malevolent and nefarious elements that exist in cyberspace. Click on the link here to direct download in PDF: Parents Internet Safety Packet | iPredator

A Parent Internet Safety and Back to School Internet Safety Tips-Dark Psychology Image

Mobile Devices, Mobile Children, Focused Parents

12. Mobile Devices, Mobile Children, Focused Parents: It is not hard to conclude that protecting children from the growing number of cyber attack avenues is daunting at best. Mobile Device Technology and Smartphones is quickly becoming the tool of choice for accessing and interacting in cyberspace. The trend projections of mobile device usage are astounding in which children will be a large mobile user demographic. With this inevitability, children will be left to defend themselves interacting with cyberspace for increasing periods without adult supervision. Making matters worse, online sexual predators, cyber criminals and iPredators who target children are gleefully preparing for this shift in pediatric mobile device usage.

It is crucial for all parents and adults to take the active role in ensuring the mobile device(s) given to children are purchased with the most advanced security and parental controls available. These writers cannot not emphasize enough how important it is to, not just verify the child’s mobile device is secure, but regularly monitored and habitually checked to make sure the child’s device has not been compromised.

Cisco Global Cloud Index: Forecast and Methodology, 2011–2016

A Parent Internet Safety and Back to School Internet Safety Tips-Dark Psychology Image

Internet Addiction

13. Internet Addiction: Not that it has recently materialized without notice, but Internet Use Disorder, Internet Use Gaming Disorder and Internet Addiction are all synonymous terms defining the same growing trend of pathological usage of Information and Communications Technology (ICT). Although a persistent controversy exists regarding Internet Addiction being a formal mental illness, the reality is there are thousands of online users, child and adult, who report experiencing signs and symptoms quite similar to the hallmark elements of a compulsive dependency. Contemporary Information Age society has now been introduced to Internet Addiction.

Internet Addiction and its psychopathology underpinnings is a new mental illness for a new societal paradigm. Until a final determination is made on whether Internet Addiction is an actual diagnosis, potentially taking years of debate, available to parents, at no cost, is this writer’s risk assessment available for download called the Internet Addiction Risk Checklist (IARC). The link is provided here, scroll to the base of the web page and click on the green pdf/print button. To download online, enter into Google or your favorite search engine the term “Internet Addiction Risk Checklist (IARC)”. Interested parties can download the web page article and no personal information is required for download.

Internet Addiction Risk Checklist

“Every form of addiction is bad, no matter whether the narcotic be alcohol or morphine or idealism.” Carl Jung (1871-1961)

A Parent Internet Safety and Back to School Internet Safety Tips-Dark Psychology Image

The Cyberbullying Reich

14. The Cyberbullying Reich: As defined by Wikipedia, “Reich” is defined as a German word that roughly is translated to mean “nation” or “realm”. Given this form of pediatric abuse occur in the abstract artificial realm of cyberspace and growing at an alarming rate, the use of “Reich” seems apropos. Cyberbullying and both child aggressor and victim are new to humanity. Unknown to humanity is the impact of cyberbullying on future humanity. Although traditional bullying has existed since the inception of human civilization, the Information Revolution has made this form of “child on child abuse” just beginning to be addressed by contemporary society.

What has to be experienced is the inevitable reality of cyberbully aggressors and victims growing into adults armed with years of experience in the realm of cyber abuse. Unlike traditional bullying, occurring prior to the Information Age at schools, playgrounds and sports fields, cyberbullying is a 24/7/365 phenomenon leaving no respite for the child victim. Information technology has many benefits to humanity, but it is vital to identify and prevent the malevolent and nefarious elements that exist in cyberspace.

Note to Reader

Dr. Nuccitelli has provided you with a comprehensive and effective internet safety tips checklist to help reduce the chances a child becomes a target of online sexual predators, cyberbullies and/or cyberstalkers. The internet, digital technology and mobile devices will continue to influence all children, as their peers, advertising and cultural trends place pressure upon them to have the latest trending technology and access to the most popular social networking sites. If it has not happened already, it is likely your child will approach you, on numerous occasions, pleading for the newest digital technology and/or wanting to join the growing number of social sites that will be in fashion in the future. The key to being a proactive parent is making the effort to learn about iPredators, Internet Safety, Cyber Attack Prevention and signs of Internet Addiction. The most important Internet safety advice to protect your child can be summed up in one statement:

“An iPredator will always move on to other victims when a parent takes the time to be involved, preventative and protective. Being an internet safety savvy and iPredator aware parent does not guarantee absolute online safety for your child, but it certainly reduces the odds. Not being a gambling man, I will always bet on the parent winning who makes the effort to protect their child as they travel the growing cyber universe.” Michael Nuccitelli, Psy.D. iPredator Inc. (2013)

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist and cyber criminology consultant. He completed his doctoral degree in clinical psychology from Adler University in 1994. In 2010, Dr. Nuccitelli authored the dark side of cyberspace concept known as “iPredator.” In November 2011, he established iPredator Inc., offering educational, investigative, and advisory services involving criminal psychology, cyberstalking, online predators, internet trolls, the dark side of cyberspace and internet safety. Dr. Nuccitelli has worked in the mental health field over the last thirty-plus years and he has volunteered his time helping cyber-attacked victims since 2010. His goal is to reduce victimization, theft, and disparagement from iPredators.

In addition to aiding citizens & disseminating educational content, Dr. Nuccitelli’s mission is to initiate a sustained national educational and awareness internet safety campaign with the help of private, state, and federal agencies. He is always available, at no cost, to interact with online users, professionals, and the media. To invite Dr. Nuccitelli to conduct training, media engagements, educational services, or consultation, please call him at (347) 871-2416 or via email at drnucc@ipredatorinc.com.

dark-psychology-home-button

Founded by Michael Nuccitelli, Psy.D., iPredator Inc. is a NYC Internet Safety Company founded to offer educational and advisory products and services to online users and organizations on cyberbullying, cyberstalking, cybercrime, internet defamation and online sexual predation. iPredator Inc.’s goal is to reduce victimization, theft, and disparagement from online perpetrators.
New York City, New York
US
Phone: 347-871-2416

Pin It on Pinterest