ipredator-cyberstalker-identification-interview 3


Cyberstalker Identification Interview



The Cyberstalker Identification Interview [CSII] is an internet safety tool and cyberstalker identification assessment authored by Michael Nuccitelli, Psy.D., a New York State licensed psychologist, forensic psychology consultant and iPredator Inc. founder. The Cyberstalker Identification Interview [CSII] helps an online user to assess his/her online risk activities, cyber-attack vulnerabilities and the identity of a cyberstalker if being targeted.

Designed to be multi-functional, the Cyberstalker Identification Interview [CSII] is a structured identification interview for education, investigation and data collection. The CSII can also be used for compiling evidentiary information for law enforcement, Internet Service Providers and the legal system if the online user is seeking to identify a cyberstalker.

A cyberstalker is a criminal, deviant, severely disturbed or disgruntled ex-partner that uses Information and Communications Technology to taunt, harm, manipulate and control other online users using threats of physical harm. To prevent cyberstalking victimization and identification if the assailant is unknown, Dr. Nuccitelli created the Cyber Stalker Identification Interview [CSII.]

ipredator-cyberstalker-identification-interview 4

Cyber Stalker Identification Interview


Cyber Stalker Identification Interview [CSII]: The Cyber Stalker Identification Interview [CSII] is a 75-question diagnostic and data collection tool designed to meet a three-fold purpose. The three functions include A. Assess the vulnerability and preparedness of a child, adolescent, adult, business or public figure of being cyber stalked, internet trolled or cyber harassed. B. Assist law enforcement, legal professionals, parents, adults and businesses in collecting data on the identity of an unknown cyber stalker. C. Assess the extent and skills of the cyber stalker’s tactics and the target’s Information and Communications Technology [ICT] weaknesses and high-risk behaviors the cyber stalker is attacking.

For purposes of the target vulnerability estimate, the CSII has been formatted to investigate aspects of cyberstalking, cyber harassment and cyberbullying if the target is a minor. Provided below is a sample of the CSII questions. Based on the rationale for completing the CSII, the person conducting or completing the interview is advised to interpret the questions as follows: I. If the cyber stalker is known or his/her identity is suspected, the questions are straight forward and formatted for this event. II. If the identity of the cyberstalker is unknown, the questions should be premised with, “If the cyber stalker were known” and then read the question and note responses accordingly.

CSII Term Acronyms

I. CS: A suspected, alleged, confirmed or unknown person or group engaged in cyberstalking another person, group or organization using information and communications technology.

II. Target: A person, group or organization that is being taunted, harassed, disparaged or abused using Information and Communications Technology [ICT] by a suspected, alleged, confirmed or unknown person or group.

  • Does the CS have a motive or suspected motive? [Note examples whether factual or alleged.]
  • Are the harassing threats or central themes sexual, obsessive or violent in nature or a combination of the three? [Note examples whether factual or alleged.]
  • Has the CS posted and/or disclosed personal information about the target that the target is unable to understand how the CS obtained the personal information? [Note examples.]
  • Has the CS ever followed or suspected of after the target appearing in their home or place of business? [Note when, where, how often and last reported incident.]
  • Has the CS persuaded other ICT users into harassing or threatening the target by utilizing online bulletin boards or chat rooms? [Note examples and/or names of websites.]

ipredator-cyberstalker-identification-interview 1

Internet Safety Inventory

Please note that all iPredator Inc. checklist & inventory tools have been formatted and designed to work as data collection, assessment, educational and internet safety monitoring tools. Of the 26 checklists & inventories offered, the IISC tools [14 Checklists] are formatted for verification and initial screening for internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] weaknesses. The IPI tools [12 Inventories] are designed for inquiry, open discussion and inspection of internet safety, cyber-attack preparedness and Information and Communications Technology [ICT] vulnerabilities.


Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.



Pin It on Pinterest

Share This