Article Type: Cover story
Subject: Assisted suicide (Technology application)
Internet (Safety and security measures)
Internet (Management)
Author: Nuccitelli, Michael
Pub Date: 12/22/2011
Publication: Name: The Forensic Examiner Publisher: American College of Forensic Examiners Audience: Professional Format: Magazine/Journal Subject: Health; Law; Science and technology Copyright: COPYRIGHT 2011 American College of Forensic Examiners ISSN: 1084-5569
Issue: Date: Winter, 2011 Source Volume: 20 Source Issue: 3
Topic: Event Code: 200 Management dynamics Computer Subject: Internet security; Technology application; Company business management
Geographic: Geographic Scope: United States Geographic Code: 1USA United States
Accession Number: 275636298

On May 4, 2011, William Francis Melchert-Dinkel was convicted on two counts of aiding suicide in the death of 32-year-old Mark Drybrough, of Coventry, England, who hanged himself in 2005; and 18-year-old Nadia Kajouji, of Brampton, Ontario, who jumped into a frozen river in 2008. State prosecutors presented evidence he posed online as a 28-year-old, depressed female nurse engaged in encouraging, advising, and assisting young adults to commit Internet suicide. Melchert-Dinkel frequented suicide chat rooms under the names "Li Dao," "Cami D," and "Falcongirl." He is the first person charged and convicted of assisted suicide using the Internet.

Melchert-Dinkel was obsessed with hanging, suicide and searching out potential suicide victims online. Court documents said Melchert-Dinkel told police he did it for the "thrill of the chase." He acknowledged participating in online chats about suicide with an estimated 20 people, entered into felonious suicide pacts with 10 and five he believed succeeded. Central to his deviant obsession, Melchert-Dinkel encouraged his victims to stream their suicides live on webcam for him to watch.

Sentenced on May 4, 2011, Melchert-Dinkel is serving 320 days in jail and for 10 years thereafter, he will be incarcerated for two days per year on the anniversaries of the victim's deaths.


iPredator is a global term used to describe all online users who engage in criminal, deviant, or abusive behaviors using information and communications technology (hereafter known as ICT.) iPredator includes all online users engaged in nefarious and/or abusive online behaviors. Whether the offender is a cyber bully, cyberstalker, cybercriminal, online sexual predator, internet troll or cyber terrorist, they fall within the scope of iPredator.


The three measures used to define an iPredator include:

1. Self-awareness of causing harm

2. Intermittent to frequent usage of ICT to obtain, exchange, and deliver harmful information

3. A general understanding of cyberstealth used to stalk and engage a target

When an offender profile includes these three characteristics, they meet the definition of iPredator.

A fourth criterion, not included in the triad above, is what I've termed iVictim Intuition (IVI) and reserved for profiling advanced iPredators. IVI is the aptitude to sense a target's online vulnerabilities, weaknesses, and technological limitations increasing their success with minimal ramifications. In addition to having IV-I, the advanced iPredator is skilled in cyberstealth using multiple covert strategies.

Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategy by which iPredators are able to establish and sustain complete anonymity while they troll and stalk a target. In addition to a stratagem, cyberstealth is a reality of ICT, which humanity often fails to fathom. Given the Internet inherently affords everyone anonymity, cyberstealth used by iPredator ranges from negligible to highly complex and multi-faceted.

The rationale for using "stealth" in the suffix of this term, serves to remind online users the primary intent fueling iPredator. This intent is to hide their identity by designing false online profiles, identities, tactics, and methods to ensure their identities remain concealed reducing identification and punishment. Therefore, as the Internet naturally offers all online users anonymity if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

I. Stealth: According to the Merriam-Webster dictionary, stealth is "the act or action of proceeding furtively, secretly, or imperceptibly." Stealth as an adjective is, "intended not to attract attention." The American Heritage Dictionary defines stealth as "the act of moving, proceeding or acting in a covert way and the quality or characteristic of being furtive or covert."

Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in online activities planning their next assault, investigating innovative surveillance technologies, or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, the level of cyberstealth complexity and online footprint for identification and apprehension is used.

iPredator is a concept to define children, men, women and groups who use ICT to harm innocent, vulnerable and unsuspecting online users. The goal of the United States is to stop the growth of iPredator by educating its citizens on their tactics and strategies. From a profiling and investigation standpoint, assessment of their cyberstealth tactics and online footprint can assist in identification and apprehension of iPredators.


Technological advancements have changed the way humanity interacts, exchanges, and accesses information. Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It is often difficult to imagine that the Internet used by two billion people globally celebrated its 20th birthday in 2011.


As of March 2011, Nielsen Online, International Telecommunications Union, GfK, and World Population Stats estimate 2,095,006,005 people globally are Internet users having grown by 480% from 2000-2011. Despite its already significant impact, the pace of new-technology introductions and number of Internet users will continue to grow at an accelerated rate with access to and the exchange of information being a priori. The Cisco Visual Networking Index 2010-2015 Forecast predicts that the number of network-connected devices will be more than 15 billion, twice the world's population, by 2015.

Although information and communications technology (hereafter, ICT) benefits far outweigh detriments for society, humanity has been seduced by the notion that more technology translates into a better quality of life. Along with this distorted societal perception, humanity also fails to heed the warnings of prophetic authors of the past century that wrote about chilling glimpses of a dystopian society.


Dystopia in literature portrays a society on the edge of destruction and authoritarian control. Personal freedoms banished from society, leaving citizens at the mercy of the government's eccentric rules and demands. As seen at the individual level, the effects would be devastating and shocking. In such an atmosphere, citizens would become demoralized, conditioned in thoughts and actions to adhere to administrative goals, loss of independence, and forfeiture of self-reliance due to the constraints by governments placed on free will.

Dystopia is "the concept of humans abusing technology and humans individually and collectively coping, or not being able to properly cope with technology that has progressed far more rapidly than humanity's spiritual evolution. Dystopian societies are often imagined as police states, with unlimited power over the citizens" (Wikipedia).

Nowhere is the picture of dystopia more clearly depicted than through the literary genre of science fiction. Expressed in the literary works of writers such as Ray Bradbury, Aldous Huxley and George Orwell, humanity becomes increasingly separate from one another led by technology. If not addressed, some predict humanity will enter an age that is the embodiment of dystopia depicted in Ray Bradbury's novel Fahrenheit 451. The similarities between humanity's current condition and Ray Bradbury's well-crafted, cold, detached characters in Fahrenheit 451 are intriguing to say the least. Bradbury's depiction of a society in which technology has replaced human effort and thought, eerily parallels technological forecasts of contemporary culture.




The concept of being "connected" paradoxically makes us less connected to what is really happening globally. As ICT becomes increasingly widespread, the less we know our neighbors and the more we assume we know the people with whom we are "connected" to online. Humanity slowly separates isolates and disconnects from human contact on a real, human, and spiritual level.

Not only have we become disconnected from others, we are slowly disconnecting from ourselves.


By virtue of this proverbial cloak of anonymity so conveniently provided by ICT, iPredators troll cyberspace with a distinct advantage in that they may represent themselves in any way they choose. Furthermore, they can secretly stalk their prey by tracking the potential victim's path from an undetectable, safe distance. Not only can iPredators become anyone they choose to be, they can also become anyone their victim may subconsciously desire them to be.

The repercussions of the unrestricted latitude of iPredators will be catastrophic for not only the individual, but for society, and potentially, the world over. Therefore, before it is too late, we must re-examine the phenomenon of "social networking" via technology. We must become educated in the Dark Psychology of ICT and learn to respect the mighty potential for harm that lurks beneath its surface. Society has now become ripe for the birth and growth of a new human predator advanced in all things internet. This deviant's name is iPredator.


The arena iPredators stalk their targets is cyberspace with physical contact often a secondary objective. Cyberspace is a hypothetical environment involving all online users interconnected through computers, telecommunications and the Internet without regard to physical location. William Gibson invented the term cyberspace, which he used in his 1984 novel, Neuromancer.

In 2011, cyberspace describes the nonphysical terrain created by information and communications technology. In its advanced form, cyberspace has evolved into virtual reality. Online users presented with visual, auditory, and tactile feedback experience virtual reality in cyberspace as a realistic domain. Thus, virtual reality creates a perceptual illusion mimicking a realistic atmosphere.

Whereas virtual reality is positive and artificial, iPredator is both very real and potentially very dangerous. In all cases, iPredators exhibit minimal disquiet for the victim's psychological welfare by injecting fear, embarrassment and distress into their lives. As stated, iPredator is the antithesis to the positive environment created by virtual reality.

Unlike traditional human predators prior to the information age, iPredators rely on the multitude of benefits offered by ICT. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in an abstract electronic universe. Within the next three decades, iPredator's acts of theft, violence, abuse, cyber warfare, and cyberterrorism will grow into a global plague if not quashed and thwarted.

iPredators use a tactical weapon I have termed "cyberstealth" furnished by ICT. Cyberstealth is a method iPredators create and implement while they taunt, troll and stalk their prey. iPredators target online users and corporate entities oblivious, inexperienced, ill-informed or unaware they're covertly being evaluated as a potential target or cyber-attack.

The prime targets sought by iPredators are online users not intellectually, psychologically, and technologically equipped. Their targets lack ICT safety strategies and technology, heightened levels of awareness online, a healthy level of skepticism, comprehensive digital citizenship practices, and C3 (cyber safety, cyber security and cyber ethics) plans.


Using cyberstealth, iPredators have considerably lower probabilities of identification, legal ramifications or injury. Prior to ICT, assailants had to be far more creative in their methods. Now equipped with ICT and trained in cyberstealth, they can create counterfeit identities or manipulate others using embellished personas of who they envision themselves to be most influential to others.

Computer science experts, sociologists, and psychologists tend to describe ICT as beneficial tools for humanity. Based on my investigative findings, leading to the creation of iPredator defines this new dimension quite differently. Although I view the World Wide Web, Telecommunications, Digital Technology, and Mobile Educational Technology as highly beneficial tools and areas helpful to society, I do recognize tools have many different purposes. When chosen for nefarious reasons, ICT are tools that become weapons, iPredators primarily use ICT as weapons in their efforts to offend, dominate or steal.

Prior to ICT, all methods of communication involved some form of identification and response recognition skills using at least one of the five senses. Although deception, crime and immoral acts were committed, they entailed far more creativity, design and planning than what is required online. In cyberspace, our physical senses are relatively subdued as we exchange and/or verify information as valid in isolation from the source. The "veil of invisibility" the ICT offers has numerous benefits, but the detriments can far outweigh the assistances for the vulnerable or high-risk target.

iPredators use cyberstealth for vindictive, abusive, malevolent, or criminal pursuits. They purposely strategize and plan how they will use cyberstealth without the negative consequences of law enforcement or authority figure identification. The iPredator's energy involved in planning and designing cyberstealth strategies correlates with their perverse objectives. For the child cyberbully, they tend to practice minimal online deception given they are fueled by needs of recognition and peer acceptance. Depending on their strategy of taunting, their cyberstealth may range from non-existent to cyber bullying by proxy.

At the advanced end of the cyberstealth continuum are online sexual predators, cybercriminals and those seeking to target victims motivated by violent and/or sadistic intent. Although the majority of child sexual assaults take place offline by friends, family members and young adults close in age to the target child, there still are thousands of online sexual predators confirmed by the FBI online trolling for discouraged, easily manipulated children. The FBI recently released a s video reporting there are 750,000 child predators online at any given time.

As part of the human condition, we tend to embellish our attributes, both offline and online wanting to present ourselves as more successful, attractive and worldly. The purpose of embellishing our attributes is not to abuse or victimize the recipient, but to increase our perceived worth. If the person online does not meet the three criteria for defining iPredator, then their online embellishments and deceptions do not fit into the definition of cyberstealth. Cyberstealth are methods used by iPredator and a tactic with intent to harm as opposed to impress.

ICT can paralyze our innate evolutionary instinct for "survival of the species" and cause us to lose sight of being skeptical and wary of people we meet online.

Although federal, state, and local officials work diligently to combat iPredators, their endeavors are minimal at best given the size of the iPredator contingent, iPredators have the luxury of trolling for victims at a leisurely pace without fear of punishment.

Unassuming online users are easily lulled into complacency because they are either ignorant to iPredator cyberstealth practices, seeking social acceptance by someone they think will "like them," or engaging in high-risk online behaviors. The reasons for online users engaging in high-risk behaviors are multi-faceted, but relied upon by iPredators in order for their cyberstealth to be effective. Cyberstealth is iPredator's most powerful weapon in their strategy of hunting online human quarry. Fueled by anger, depression, greed, narcissism, and/or sociopathy, many iPredators revel in their ICT anonymity, become grandiose from their criminal and abusive triumphs and feel galvanized knowing they can freely troll for potential victims, seemingly immune from law enforcement identification or apprehension. Depending on their relationship to the victim, iPredators have the freedom to preserve or divulge their identity at will. Without fearing reprimand, iPredators participate in creative design and focused purpose in their line of attack.


Within the next five years, smartphones will surpass personal computers for connecting to the Internet. By the end of 2012, there will be one trillion network devices worldwide and 217 million internet users in the United States alone. Given the obvious benefits ICT offers, time spent interacting online will increasingly become commonplace for all humanity. The new dimension of cyberspace is unchartered territory filled with opportunity and hope. The antithesis to these opportunities is iPredator.

Without strict penal regulations, a sustained law enforcement presence and structured educational methods, cyberspace will become a prime hunting environment for iPredator's abusive, criminal, or sexually deviant pursuits.


5PV is a five factor theoretic model used to conceptualize all interactions between people who use information and communications technology for benevolent reasons and iPredatots who use ICT for selfish and/or malevolent reasons. The five terms pertaining to 5PV are iPredator, iPrey, iPrevention, iPreservation, and iVictim. The 5PV Model is a representation of the five elements involved in all ICT and criminal/deviant interactions.

The primary difference between this model and other criminal and deviant victimization dynamics is the environment in which offender and victim interact. This environment, which benefits iPredator, is the Geosocial Universe. Unlike any other territory, cyberspace is a frontier where the potential victim has little authority to evaluate social exchanges in a realistic way.

ICT and cyberstealth have afforded the criminal, deviant and sociopath pristine anonymity in their hunt for target victims. It's in this realm that they are able to create a persona judged effective in their tactical strategy to achieve success in stalking. Without fear of identification, many iPredators have free reign to behave, interact, and personify what they believe to be their most successful scheme.

For example, a 50-year-old man can create an online social profile exactly how he feels will be viewed as most favorable by his target. If his prey is a 14-year-old female, he can download adolescent images, develop a creative teen background and interact with his adolescent target as someone close to her age and stage in life. Cyberspace and the online world provide iPredators a forum for pristine virtual reality.

Virtual reality is a term that applies to computer-simulated environments that can simulate physical presence in places in the real world, as well as in imaginary worlds. iPredators no longer have to hide behind the proverbial bushes and can skulk about in the dimension of cyberspace undetected, hidden and cloaked to perfection. Some iPredators evaluate their targeted quarry first to assess if they are exercising personal security, harm reduction or victim prevention measures.

The concept that I've termed iPrevention, describes the practice of internet safety, cyber security and self-awareness, iPrevention is a strategy, practice, and conscious-sustained approach to reducing the probability of becoming an online victim. These strategies involve a concerted effort to learn personal aspects and relevant demographic information about ourselves that would increase our chances of becoming a target.

As ICT will always advance, iPrevention as well must be a proactive and progressive activity. This is not to say that iPrevention requires advanced training in ICT, but a sustained effort to learn and evolve given its rapid expansion. What is required is a willingness to exercise diligent awareness and confirmed acceptance that some iPredators will always be one-step ahead in technological acumen.

Under the theory of iPrevention, the goal is not to be a step ahead of iPredators, but to be keenly aware that they are always on the prowl and are using creative and cyberstealth methods to find and stalk their prey. Online users can reduce the probability of becoming a victim while accessing ICT by practicing effective iPrevention. In doing so, the online user is exhibiting iPreservation. I've defined iPreservation as an innate state of self-survival in an ICT environment. The symbolic visual equation illustrating this correlation is as follows:


This simple equation represents a basic formula for all cyber protection and online safety initiatives supporting our inherent survival instincts. In addition to the time spent and information shared while in cyberspace, advanced online safety skills also includes awareness of how offline behavior and lifestyle can modify online behavior. Far too many adults and parents of children fail to be cognizant that offline circumstances and psychological stressors dictate and govern online behaviors.


In the entire file of research and hours of investigation that I've engaged in to formulate my structured construct of iPredator, the one theme emphasized throughout its entire philosophical framework is, Offline Distress Dictates Online Response (ODDOR.) Both a child's and adult's response to their offline environment is directly correlated to how they behave online. When home, school, work, finances or other offline factors are causing significant distress, research has proven online users of all ages are more apt to be less vigilant in internet safety tactics and more likely to engage in higher risk online behaviors. Online users that have been highly stressed offline are profiles the iPredator seeks to target.

iPreservation is defined as an innate reservoir of fuel or drive for lowering our probability of becoming a victim at the hands of iPredator. This concept is an active "state of awareness" consistently observed by online users recognizing cyberspace is always an abstract concept and not a real dimension of space or reality. The innate need for survival should become pronounced in all of us in the digital world given that iPredators are protected by cyberstealth, guided by conquest and domination and growing in numbers as ICT evolves and spreads.

iPreservation is also defined as an urge and/ or motivation to institute a set of behavioral goals in order to lower the probability of becoming a victim of iPredator, iPreservation is both a state of being and a diligent practice. If someone is consciously aware that iPredators spend a considerable amount of time and energy trolling for vulnerable targets, that individual experiences a sense of need to preserve their safety.

The motivation for iPreservation is not based in fear of iPredator, but rather, in the awareness they exist.

The ideal iPredator target does not take the necessary steps required to reduce their probability for becoming a mark. They tend to practice denial, view themselves as too technologically advanced or outside the purview of iPredator. When one or more of these elements are evident and/or perceived by online users, they are in the arena of iPredator.

iPredator's antisocial pursuits are fueled by their distorted perceptions of self-preservation. For many of these miscreants, they believe they must victimize others in order to thrive, sometimes to survive, to feel socially accepted and often for a sense of accomplishment, right or vindication. Their motivations to hurt others are not restrained by guilt or remorse, because they perceive their actions towards a victim is deserved and the person should have expected it given their attitude, actions or ignorance. Perceiving their actions in this way, iPredators justify the purpose of their behaviors allowing them to harm others without feeling remorse.

Given that the concept of iPredator includes all people, who attempt to taunt, victimize, or abuse others using ICT, the easiest way to define the cornucopia of assailants and their core constructs is defined as lacking social interest. Social Interest was postulated and defined by a turn of the century Austrian physician and psychologist Alfred Adler.

In the simplest form, Social Interest, as defined by Alfred Adler, is an attitude or macroscopic outlook towards being charitable, helpful and interested in the personal pursuit of furthering the welfare of others. Adler went on to theorize that these elements of the human psyche, which inspired people to help others, are central to a person's sense of wellbeing, stable mental health and functional adaptability.

From this thesis, Adler strongly believed people with low Social Interest were discouraged, angry and enveloped by a sense of inferiority or by what he termed an Inferiority Complex. Although Adler never experienced internet technology and the advent of iPredators, his theory of Social Interest conceived 85 plus years ago certainly defines what appears to be iPredator's proclivity to behave in an abusive, hostile, aggressive or criminal/ deviant manner.

As cost decreases with ICT, the population of online users will steadily increase. Once again, iPredators use the same methodologies wild predators use in their hunt for food. The only difference being iPredators do not stalk for survival, procreation and/or territory. They stalk their quarry for deviant sexual needs distorted sociopathic endeavors, criminal intentions, immature developmental needs to be accepted, or psychological/psychiatric issues.

iPredators tend to be male, but female iPredators are growing steadily as ICT becomes more commonplace in daily living. The population of online users in the 5PV model, called iPrey, represents all the potential targets in an iPredator's reservoir of possible choices.

iPrey can be low, medium or high probability targets for iPredator. Low probability targets are online users who are consciously aware there are malevolent people online who will attempt to victimize them if they let their guard down. Medium probability targets are as aware as low probability targets, yet are more susceptible given their age, gender or mental acumen. This is not to say that children, females or senior citizens cannot practice internet safety or insulate themselves from victimization, but certain factors, age and gender, outside of their control place them in preferred target populations of iPredator.

High probability targets are online users who do not practice online safety for various reasons. These reasons include ignorance to Internet safety and security, thinking they are irrelevant, simply not caring, and/or knowingly engaging in high-risk online activities. Online users who are high probability targets are at an increased risk for becoming a member of the unfortunate group called iVictim.

The concept of iVictim, victimology and development of victimization reduction strategies are all crucial to anyone who plans to be an active online user either for personal or professional use. Even when a person is a proactive online user, engaged in a healthy offline lifestyle, skilled at practicing Internet safety and cyber security and diligent in their practices, it is still very important to regularly investigate the field of victimology. The understanding of the 5PV Model and its philosophical underpinnings are extraordinarily important for children, adults and parents.


iPredator seeks out and stalks those evaluated to be lax in practicing iPrevention while traveling through cyberspace. Everyone using ICT is a potential victim of an iPredator.

Just as wild animals stalk their prey for food, iPredators seek people they have deemed approachable. In the wild, predators stalk and hunt prey they have evaluated to be a highly favorable target, the weakest and least intimidating. The most vulnerable targets for the animal predator and iPredators are the young, the old and/or the feeble. Given that the vast majority of iPredators tend to be males, they often target females due to their distorted perception that females are weaker and/or less clever. This rule does not apply to cyber bullying, as this segment of iPredators are primarily same gender.

Ignorance, discouragement, psychologically compromised, lack of skepticism, isolative tendencies and curiosity are but a few traits an iPredator looks for in hunting for an iVictim. In addition to being adept at practicing cyberstealth, iPredators are trained at sensing the qualities that they deem advantageous to initiate the hunt. By utilizing iPrevention tactics, an individual reduces their potential to become a victim while utilizing digital technology.


Internet users have grown by 480% from 2000-2011

1.2 billion

By the end of 2012, digital technology trend forecasters project 1.2 billion people will interface with mobile digital technology daily.


Society is being lulled into a false sense of trust and reliance on technology, taking information and "connection', to others in cyberspace at face value. Like the child in the fairy tale "Little Red Riding Hood," innocently wandering through the forest, we erroneously believe that the "Wolf" is whoever he appears or claims to be. Just as Little Red Riding Hood, we are in danger of falling prey to iPredator.

Although disguised, Little Red Riding could see her predator, whereas we cannot thanks to cyberstealth and the inherent anonymity provided by ICT. It is amazing how this: fairy tale, created centuries ago, evolved to become a story about a child that resembles the tactics of impersonation used in cyber bullying and online sexual predator stalking. Unfortunately, the theme of a predator disguised as someone else is exactly what occurs now in cyberspace.

IN NATURE wild animals stalk and measure their prey using stealth and tactical strategies increasing their probability of success while decreasing potential for injury. iPredators also use stealth, cyberstealth, to stalk online users to increase the probability of achieving their aims while decreasing potential of identification and punishment. As I illustrate in my theoretical report, Dark Psychology, humans are the only living organisms that stalk, attack, and victimize their own species without the primary instinctual drives of procreation, survival, or food.



As a forensic psychologist with expertise in theoretical criminology and abnormal psychology, I've formulated a psychological, sociological & criminological construct for the growing dimension known as cyberspace. In the pages that follow, I introduce my theoretical paradigm and profile, iPredator, who I believe to be the modern-day criminal and psychological reprobate. This new breed of human predator uses information and communications technology (hereafter, ICT) to locate, track and victimize their prey.


I have begun to assemble a group of colleagues, and proactive organizations to help alert both the public and professional sectors to what I have called the "Impending iPredator Plague." Although millions, and soon billions, of people use and rely on the Internet daily, few acknowledge the "cancer" iPredators bring to humanity if not identified and stopped.


As ICT continues to expand at a feverish pace coupled with seemingly daily introductions of new technology, ever-increasing obstacles will challenge humanity. Already, online users are being confronted by the ever-increasing detriments of having incredible amounts of information, which can be obtained, exchanged and spread at incredible speed. Terms such as Digital Reputation, Digital Footprint, Digital Citizenship, and other similar concepts are now part of our social media interactions and concerns.

Adults, businesses, children, celebrities, politicians, and every other facet of our communities must now be wary. Online users now have to be concerned about what information they have shared online in the past and what information they have never disclosed but now accessible to others. In addition to personal information being disclosed, online users and businesses must now become educated and cautious about social engineering, social intelligence, and Internet libel.

From a nationalistic perspective, industrialized nations must now allocate increasing amounts of time, money, work force, and strategic planning to address the growing concerns of homeland security, cyber terrorism and cyber warfare all due to social media, the speed and magnitude of ICT. In addition to these threats to our national security, it is fair to assume iPredators and groups of iPredators will become willing activists attempting to access and design larger and more deadly forms of cyber aggression.

Social science experts and educators have attempted to enlighten and warn the global community, but their impact to date pales in comparison to the wrath and inevitable growth of the threat of iPredators and the growing number of iPredator groups. This writer and his future proactive associates and organizations will attempt to motivate society before iPredators become a common fixture in the fast growing internet global community. Cyberspace represents a new dimension and a new territory for social exploration. Unfortunately, iPredators patiently wait in the shadows of this dimension with baited breath.

If you agree there needs to be a national and/or global effort to stop iPredators, simply pass this document on to members of your community. If you are a parent, talk to your children about their online activities and teach them to become vigilant about watching out for iPredators. The digital universe is filled with opportunity, knowledge and global connections. My goal is not to shut down, regulate, or restrict children, adults or ICT expansion. My goal is to educate others on practicing online awareness and safety.


To learn more about identifying, preventing, and intervening acts of sabotage, including monitoring behaviors and methods of sabotage-prevention, become Anti-Sabotage Certified (ASC). For more information on the program and to enroll, go to www.acfei.com or call (800) 423-9737.

By Michael Nuccitelli PsyD, CFC


NYS Licensed Psychologist

Email: drnucc@hotmail.com

Blog: www.DarkPsychology.co

Scribd: www.scribd.comlipredator

Facebook: The iPredator

Dr. Michael Nuccitelli, PsyD, CFC, is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois.

In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners (Identification # 103110.)

In September 2011, Dr. Nuccitelli established iPredator Inc. offering the private & public sectors educational and advisory services regarding internet predators, cybercrime & digital forensic psychology.

Over the last 25 years, Dr. Nuccitelli has worked in the mental health field in a variety of capacities with various clinical populations.

Concurrent with his employment in mental health, Dr. Nuccitelli was a practicing psychologist for 10 years and worked in the field of forensic psychology conducting evaluations and consultation for attorneys and court systems.

Dr. Nuccitelli has extensive career and academic experiences. His areas of expertise include forensic psychology, criminal psychology, theoretical criminology, digital/computer forensic psychology, human sexuality, psychiatric illness, psychological issues and developmental psychology. He is an avid follower of national & criminal news and enjoys educating the public by interacting with the media.

Dr. Nuccitelli continues to investigate and expand his construct he has designed and trademarked called iPredator. He presently consults with the American College of Forensic Examiners to become the resource and hub for Americans seeking information on digital/computer forensics, Internet predators, cyber security and training programs for the professional sector and law enforcement.

1. United States of America      23%

2. China                          9%

3. Germany                        6%

4. Britain                        5%

5. Brazil                         4%

6. Spain                          4%

7. Italy                          3%

8. France                         3%

9. Turkey                         3%

10. Poland                        3%

11. India                         3%

12. Russia                        2%

13. Canada                        2%

14. South Korea                   2%

15. Taiwan                        2%

16. Japan                         2%

17. Mexico                        2%

18. Argentina                     1%

19. Australia                     1%

20. Israel                        1%

SOURCE: http://www.enigrnasoftware.com/wp-content/themes/

Note: Table made from pie chart.
Gale Copyright: Copyright 2011 Gale, Cengage Learning. All rights reserved.