Matthew Berdyck – A Prime Predatory Troll Example

matthew-berdyck-predatory-troll-image

Matthew Berdyck

A Prime Predatory Troll Example

(Authored October 6, 2022 and Published December 7, 2022)

Mr. Matthew Berdyck is an online user I have never met, spoken to, or corresponded with. I’ve never mentioned his name in online content, nor have I attempted to disinform online users about him. However, Matthew Berdyck is the central character in a new documentary titled, “Social Media Monster”. Created by Peter John Ross, Social Media Monster educates viewers about internet trolls. Mr. Berdyck is the alleged online troll in this documentary. The reason for cyber-attacking me was because I retweeted the YouTube documentary trailer. Based on Mr. Berdyck’s threats of attacking my career as a psychologist, I thought it best to document his malevolent online activities. 

This blog post serves a two-fold purpose. The primary reason is to protect my license to practice in case he or those connected to him report bogus ethical violations to my state licensing boards. The secondary purpose is to illustrate how predatory trolls exploit all aspects of their target’s life. Other than having a private viewing of Social Media Monster, I know nothing about Mr. Berdyck.

Sent to me by an online safety educator is an October 3, 2022, audio clip by Mr. Berdyck. Within 15 seconds of whoever he is speaking to; he states that I am announcing he is on the verge of “snapping“, and he is a mass murderer. Before this post, I had never written about him or mentioned him in any online or offline forums. If you’d like to hear his bizarre allegations, click this audio file button. This is Mr. Berdyck in his own words.

matthew-berdyck-predatory-troll-audio file-button

A true example of Mr. Berdyck’s state of mind and psychological functioning can be summed up in this video clip from a court appearance on November 8, 2022. You will see and hear how a predatory troll threatens those he/she does not respect.

As the creator of the iPredator concept, Mr. Berdyck meets all three criteria to be defined as an iPredator. The three criteria are as follows:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of cyberstealth used to engage in criminal or deceptive activities or to profile, locate, stalk, and engage a target.

Social Media Monster

Social Media Monster is an important film because it addresses the growth of online assailants and how little is being done to hold what I call iPredators accountable.  Although I do not know this man, his rants in video conversations with himself alleging I have launched a disinformation and character assassination campaign against him.

Pasted below are a few of his threatening emails sent to me. In addition to his ridiculous allegations, Mr. Berdyck states that he is reporting to the state authorities that I am engaging in unethical and unprofessional activities by endorsing the documentary. It has come to my attention that recent cyber-attacks are because I recommended Ross, the Social Media Monster creator, to appear on the Causing the Effect Podcast.

Not only are his allegations preposterous but he resurrected the defamatory content from back when I was trolled from 2014-2017. I must assume he posted all that nonsense before he read my Troll Triad concept. At the time of writing this blog post it has been eight years since seeing the nonsensical Troll Triad content. Shadow Troll, Troll Triad, Media iPredators and LNM Trolls were all authored between 2014-2017. Despite some years having passed, these pages are still live because they are just as relevant today as they were then. In fact, Mr. Berdyck is engaging in many of the same disinformation and character assassination tactics as they did years ago. I kept these pages active because they are more relevant now given the growth of what I call the predatory troll.

Having never met or performed a psychological assessment on Mr. Berdyck, I cannot offer a diagnosis. However, his online actions have validated that he is both an iPredator and predatory troll. The definition of a predatory troll is as follows:

matthew-berdyck-predatory-troll-dark-tetrad

Predatory Troll

Predatory Trolls: Predatory trolls are a new breed of internet troll that evolved from the classic troll. They are online users who both choose online users randomly and intentionally. Just like classic trolls, predatory trolls can be ex-work associates, ex-partners and loved ones. They may also be unknown online users. Predatory trolls may target others alone, but increasingly work in groups (aka, Troll Triad). Like all trolls, predatory trolls are driven by needs for power, recognition, peer acceptance and control.

Different from classic trolls is that their primary goal is to destroy an online user’s reputation, online presence and trustworthiness. With the advancement of Information and Communications Technology (ICT), predatory trolls may be employed by groups and governments in covert operations to destroy a target’s reputation.

Predatory trolls seek to destroy their target’s reputation and the reputation of their family members, children, careers and loved ones. They always engage in defamation, slander, libel, disinformation campaigns and criminal defamation. All predatory trolls meet criteria for either iPredator or iPredator Bridge and are skilled in Cyberstealth. As the Information Age advances, predatory trolls will become increasingly problematic to all aspects of society.

Many predatory trolls disguise their character assassination tactics and disinformation campaigns by claiming they are activists, whistleblowers and prosocial.”  Michael Nuccitelli, Psy.D. (2016)

Pasted here are seven exhibits and predatory troll examples involving Mr. Berdyck. They are four emails, a comment attached to one of his Twitter video monologues, an Instagram direct message to me and a blog post he authored. He will assuredly deny being the author, so I saved all of them if proof is requested. 

Predatory Troll Email Exhibit One

This first example is a prime predatory troll tactic. His message is addressed to Magistrate Griffin who I think may have been the Magistrate who heard a cyberstalking protection order case against Mr. Berdyck. He carbon-copied (cc) his email so that it would be sent to our MN Psychological Services, PLLC group practice email address. Mr. Berdyck was informing my associates and I that he reported me to my state licensing board for ethical violations. Please note that I simply retweeted the Social Media Monster YouTube trailer.     

On Sat, Jul 2, 2022 at 10:10 AM Matthew Berdyck <mberdyck@gmail.com> wrote:

Magistrate Griffin,

This is Dr. Nuccitelli, a psychologist from New York who I’ve never met or spoken with, who did not witness the court case, but is aware I’m at risk of suicide and that Peter’s film is a scam.
 
The doctor continually supports Peter and had indicated that he wants me to commit suicide and that he supports Peter’s efforts, including all the emails of slit throats, severed heads, threats of cannibalism, and threats to murder my mother.
 
The Dr. has celebrated Peter’s efforts to bully me until I commit suicide, even though you witnessed 8 hours of what Peter is really up to.
Even though the doctor is aware he’s been reported to the New York State licensing board, for attempting to diagnose and for encouraging suicide, he does not stop supporting Peter, and aide him in slowly torturing me until I finally take my own life.
 

Predatory Troll Email Exhibit Two

From: Matthew Berdyck <berdyck.matthew.a@gmail.com>

Sent: Sunday, October 2, 2022 1:53 AM

To: causingeffectpodcast@gmail.com <causingeffectpodcast@gmail.com>; Michael Nuccitelli, Psy.D. <drnucc@ipredator.org>

Subject: Mass Murder and Fame

Hi,

I want to remind both of you that I have civil rights and civil laws which protect me from your aggressive public attacks on my name and reputation.

  1. I do not want to be famous.
  2. I am, in fact, an ongoing anonymous source for New York Times, for military leaks, via the National Guard.
  3. Because of my work with New York Times it caused me to become affiliated with the NYC Terrorism Unit, last year. I’m going to have them reach out to both of you because not only do you claim I’m going to commit a murder or a terrorism incident, you both also keep publicly bullying me, ostensibly trying to trigger the mass murder you claim I’m going to commit.  It’s clear that you believe I’m a mass murderer and you’re acting in a way, according to your own logic, to cause me to snap and start slaughtering people. I think the terrorist unit needs to be aware of residents of New York who are making a self admitted attempt to bully a person into killing innocent people.  For that both of you deserve to be investigated and identified as a threat to the people of New York for making a concerted effort to cause a mass murder.

Predatory Troll Email Exhibit Three

On Sunday, October 2, 2022, Matthew Berdyck <berdyck.matthew.a@gmail.com> wrote:

Subject: Mass Murder and Fame

I’m the founder of ToxicWasteSites.org and if both of you don’t get the fuck out of my life and activism I’m going to mercilessly destroy you.

Here is a statement.  If both of you don’t walk away, I’m going to make a much, much stronger version of this and fucking devour you whole.

You will not cause harm to my causes or I will slaughter both of you publicly, with campaigns.

I travel.  New York is not far.

This is the only warning you get.

Ross is not the target.  You are.

Predatory Troll Email Exhibit Four

From: Vincent Valentine <ingeniawebsite@gmail.com>Sent: Sunday, October 2, 2022 8:14 PMCc: causingeffectpodcast@gmail.com <causingeffectpodcast@gmail.com>; Michael Nuccitelli, Psy.D. <drnucc@ipredator.org>Subject: Actual Malice

I can sue the shit out of both of you, right now.

The facts are that I do not want to be famous, I am who I say I am, both of you are more aware that I’m activist, journalist, and filmmaker, and neither one of you have any right to diagnose or make declarative statements about my mental health, especially Dr. ImAPredator, who has basically diagnosed me, made libelous statements that I’m going to commit a murder, and has engaged in a legal concept called negligent endorsement.

Both of you aware I have a job, that I support all of my children and grandchildren, and that based on the ways you’re aiding and enabling Ross, that you have reached into the area of conspiracy against rights by targeting ToxicWasteSites.org.

I’m not playing when I say that if you don’t get out of my life I’m going to wipe you out.  The court ruling dated August 19th clearly states that I am who I say I  am, that I did get famous, and that I was directly involved in blowing the whistle on Flint, undeniably.

Under deposition you’d be forced to admit that you never witnessed my activism career, that all activists do not get media, that you’d have no basis for your false claims about what I did in Flint, that neither of you have ever met me, and that you’re aware Ross is a pathological liar.

I do have PTSD, your actions are inflicting severe emotional distress.

I suggest you start really listening because I take the health and safety of American citizens very seriously and if you’re going to smear my name, you become inhuman collateral damage, and I don’t care if someone kills you if it saves a million lives from your unwarranted attacks.

Maybe you can’t process that but millions of people are simply more important than your life.  You get in bed with Ross, you’re the enemy, and you lose my empathy and sympathy.

I’m a militant activist.  Period.  It’s people like you that have taken me from a peaceful guy to turning me into a vicious animal who will devour anyone who gets in my way.

Why?

Would you feel empathy for environmental Adolf Hitler?

Nope.

So this is your last warning. Get the fuck out of my life and cased and if you don’t, that’s your personal invitation to me that you want a fight.

Predatory Troll Caption Exhibit Five

matthew-berdyck-predatory-troll-exhibit five

This @TheiPredator guy is in for a big surprise. The New York state psych board is opening an investigation into him, over alleged ethical violations.

Predatory Troll Instagram Message Exhibit Six

If you’ve convinced yourself you’re not being sued and can’t be held liable, I look forward to dragging you into a California Superior court, where personal jurisdiction exists.

The only way to deal with a predator like you is to sink the allegations into court records.

Based on your expertise, you couldn’t argue you weren’t aware of your actions and extreme and malicious infliction of emotional distress.

Matthew Berdyck’s Blog Post – Exhibit Seven

Based on his content with two of them having the subject being “Mass Murder and Fame”, I felt it necessary to file a police report. As mentioned above, I have never spoken to Mr. Berdyck nor mentioned his name in any of my educational materials. I was not going to mention his name in the title of this blog post but included it after I read his bizarre blog post. 

Just as I did with the Troll Triad and the Shadow Troll, it is necessary to document being targeted. Like the Troll Triad did years ago, Mr. Berdyck may in fact contact state authorities offering preposterous allegations. This blog post was authored to protect my reputation and professionalism. This post also serves as an educational tool to illustrate how predatory trolls attempt to destroy their target’s reputation and livelihood.

Matthew Berdyck is but one of thousands of predatory trolls infesting the internet. Predatory trolls target online users from all levels of society. Unfortunately, little can be done to force them to stop their cyber-attacks at this time Some predatory trolls suffer from a mental illness, some are internet addicted, some are online psychopaths, and some are just mean people. For the time being, documenting their attacks is the only course of action.

The unseen benefit to his cyber-attacks is the same as the Troll Triad. His episodes of targeting me and my associates validate the concepts of iPredator and predatory trolls. I hope Mr. Berdyck will stop his online antics, but I think they will continue in both quantity and vitriol. Like most predatory trolls, he will justify his defamatory campaigns as proper because he is an activist, whistleblower and/or victim.

Causing the Effect Webcast

Causing the Effect Podcast 

Causing the Effect Podcast (Part II)

matthew-berdyck-predatory-troll-ipredator-symbol

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychologist and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

ipredator-website-home-button

 

Examples of Cyberbullying Images – iPredator

examples-of-cyberbullying-images-ipredator

Educational Examples of Cyberbullying Images
by Michael Nuccitelli, Psy.D.

Examples of cyberbullying describe the variety of techniques cyberbullies use to taunt, threaten, humiliate and deprecate their target. The primary goal for the reader is to become familiar with the strategies children use to mistreat other children.

Many of these tactics are also made use of by adult online users engaged in cyber harassment, cyberstalking and predatory trolling. As humanity increasingly becomes dependent upon mobile device technology, virtual reality and artificial intelligence; the range and complexity of cyber-attacks will assuredly grow.

Provided are examples of cyberbullying in image form. As with all the content on this website, they are free to download, share and use for informational and educational purposes. All images are 1080×1080 compressed JPEG files 

Cyberbullying

Using Information and Communication Technology (ICT), cyberbullying is recurrent and sustained threats and taunts by one or more children towards another child who is unable or unwilling to deescalate the engagement. Cyberbullying is harmful, repeated and hostile behavior intended to deprecate a targeted minor.

Cyberbullying describes threatening or disparaging communications delivered through ICT. Whereas classic bullying typically involves face-to-face interactions and non-digital forms of communication, cyberbullying consists of information exchanged via ICT and may never involve face-to-face encounters.
.

Examples of Cyberbullying Images

Bash Boards: Defamatory content a cyberbully posts in chat rooms, online forums and message boards.

michael-nuccitelli-cyberbullying-bash-boards

BlogoBullying: A cyberbully creates a blog and then makes their target the central character and topic of defamatory posts.

michael-nuccitelli-cyberbullying-blogobullying

Cyberbullying by Proxy: Using deception, encouragement or manipulation; a cyberbully persuades other online users to harass their target.

michael-nuccitelli-cyberbullying-by-proxy

Cyberstalking: When a cyberbully uses intimidation and persistent taunting that frightens their target

michael-nuccitelli-cyberbullying-cyberstalking

Cyber Drama: When a cyberbully posts melodramatic content to alarm or defame their target.

michael-nuccitelli-cyberbullying-cyber-drama

Cyber Harassment: When a cyberbully repeatedly contacts and sends defamatory messages to their target.

michael-nuccitelli-cyberbullying-cyber-harassment

Cyber Threats: When a cyberbully falsely implies their target is in danger from unknown or nefarious assailants, which causes the target distress.

michael-nuccitelli-cyberbullying-cyber-threats

Denigration: When a cyberbully sends or publishes cruel rumors, gossip and false assertions about a target; trying to damage their reputation or friendships.

michael-nuccitelli-cyberbullying-denigration

Digital Piracy Inclusion: When a cyberbully persuades their target to engage in illegal digital piracy and then reports them to the authorities, their parents or educators.

michael-nuccitelli-cyberbullying-digital-piracy

eIntimidation: A colloquial expression that describes when a cyberbully attempts to control their target using emails to manipulate them.

michael-nuccitelli-cyberbullying-eintimidation

Exclusion: When a cyberbully informs their target that they are not invited to a social activity that other peers will be attending.

michael-nuccitelli-cyberbullying-exclusion

Exposure: Using social media, a cyberbully posts private communications, images or video about their target that is private and embarrassing.

michael-nuccitelli-cyberbullying-exposure

Flaming: Using social media, a cyberbully provokes an argument with their target that includes profane and vulgar terminology.

michael-nuccitelli-cyberbullying-flaming

Griefing: When a cyberbully frequents online gaming environments and frustrates their target by intentionally not following the rules.

michael-nuccitelli-cyberbullying-griefing

Happy Slapping: While the target is physically attacked and simultaneously recorded; the images and video are posted online by the cyberbully.

michael-nuccitelli-cyberbullying-happy-slapping

Impersonation: The cyberbully mimics their target and posts defamatory comments on social networking sites and in chat rooms.

michael-nuccitelli-cyberbullying-impersonation

Instant Messaging Attacks: Using an instant messaging account, the cyberbully bombards the target with harassing and threatening text messages.

michael-nuccitelli-cyberbullying-instant-messaging-attacks

Interactive Gaming Harassment: Having the ability to exchange information with online gaming opponents; cyberbullies verbally abuse their targets and lock them out of games.

michael-nuccitelli-cyberbullying-interactive-gaming-harassment

Malicious Code Dissemination: When a cyberbully sends malicious information like viruses, malware, spyware and ransomware to their target.

michael-nuccitelli-cyberbullying-malicious-code-dissemination

Micro-Visual Bullying: When a cyberbully creates and posts short videos to character assassinate their target.

michael-nuccitelli-cyberbullying-micro-visual-bullying

Mobile Device Image Sharing: When a cyberbully sends sexually suggestive or embarrassing images of the target to peer mobile devices.

michael-nuccitelli-cyberbullying-mobile-device-image-sharing

Non-Consensual Multimedia Bullying: The target does not know that embarrassing content is being disseminated by the cyberbully using various media formats.

michael-nuccitelli-cyberbullying-non-consensual-multimedia-bullying

Password Theft & Lockout: After a cyberbully steals & changes their target’s password, they impersonate them online and lock them out of their account.

michael-nuccitelli-cyberbullying-password-theft-and-lockout

Phishing: A cyberbully manipulates their target into revealing financial information and then purchases unauthorized items with their credit cards.

michael-nuccitelli-cyberbullying-phishing

Porn & Marketing List Insertion: Using confidential online sign-up forms, the cyberbully signs their target up to multiple pornography and junk lists.

michael-nuccitelli-cyberbullying-porn-marketing-list-insertion

Pseudonym Stealth: Cyberbullies secretly change their online usernames and begin to taunt, tease and humiliate their target while hiding their identity.

michael-nuccitelli-cyberbullying-pseudonym-stealth

Screen Name Mirroring: Similar to impersonation, the cyberbully uses screen names almost identical to the target and then posts provocative content.

michael-nuccitelli-cyberbullying-screen-name-mirroring

Sexting: The cyberbully text messages sexually themed information about their target that is embarrassing and hurtful.

michael-nuccitelli-cyberbullying-sexting

Sextortion: Using threats of revealing sexually themed content about their target, the cyberbully extorts them in exchange for not revealing the information.

michael-nuccitelli-cyberbullying-sextortion

Slut Shaming: The cyberbully records sexually suggestive images or videos of their target and distributes them throughout their school and online.

michael-nuccitelli-cyberbullying-slut-shaming

Social Media Bullying: The cyberbully persuades the target to include them in their “friends” or “buddy” lists, and then contacts their followers with derisive information.

michael-nuccitelli-cyberbullying-social-media-bullying

Text Wars and Text Attacks: The cyberbully and accomplices engage their target in a series of provocative text messages using a cellular phone service.

michael-nuccitelli-cyberbullying-text-wars-text-attacks

Tragedy News Mirroring: The cyberbully announces that their target is planning to engage in a violent activity soon after a similar regional or national tragedy.

michael-nuccitelli-cyberbullying-tragedy-news-mirroring

Trickery: The target is mistakenly led to believe that the sensitive information they share with the cyberbully will not be used for nefarious reasons.

michael-nuccitelli-cyberbullying-trickery

Trolling: The cyberbully repeatedly taunts their target across multiple online environments ranging from online gaming to chat rooms.

michael-nuccitelli-cyberbullying-trolling

Twitter Pooping: The cyberbully repeatedly tweets harmful and provocative insults about the target using current “net lingo” terms.

michael-nuccitelli-cyberbullying-twitter-pooping

Voting & Polling Booth Bullying: The cyberbully creates web pages that allow others to vote for categories deemed highly embarrassing to their target.

michael-nuccitelli-cyberbullying-voting-and-polling-booth-bullying

Warning Wars: The cyberbully makes frequent false allegations to an ISP seeking their target’s profile or account to be suspended.

Web Page Assassination: The cyberbully designs, and then posts web pages specifically intended to insult the target, their peers or loved ones.

michael-nuccitelli-cyberbullying-web-page-assassination

VLE Bullying: In Virtual Learning Environments (VLE), cyberbullies use VLE message boards, chat rooms and instant messaging functions to ridicule their target.

michael-nuccitelli-cyberbullying-vle-bullying

Virtual World Bullying: Using their avatar in 3D websites and virtual worlds, the cyberbully taunts and teases their target by using their avatar as the assailant or provocateur.

michael-nuccitelli-cyberbullying-vistual-world-bullying

YouTube Channeling: The cyberbully makes their target the principal character in a YouTube channel and publishes denigrating and disinformation-themed videos.

michael-nuccitelli-cyberbullying-youtube-channeling

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychologist and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

ipredator-website-home-button

 

 

 

 

Michael Nuccitelli, Psy.D. Thanks Action Against Stalking

michael-nuccitelli-thanks-action-against-stalking

Michael Nuccitelli, Psy.D.

Thanks

Action Against Stalking

This writer would like to thank Action Against Stalking (AAS) for the opportunity to educate online users about stalking, cyberstalking and his iPredator concept. Pasted below is their YouTube discussion. AAS is the premiere organization for addressing stalking, online stalking and victimization. In addition to education, their help and support to victims is exceptional. Not only should there be a Centre for Action Against Stalking throughout Europe but in every county of the United States. I am honored to be involved with this organization. Provided here is our educational session hosted on YouTube. Also provided are this writer’s iPredator and cyberstalking definitions.

 

I’d like to give a special thanks to the professionals who participated in our educational discussion and work tirelessly to help the victims of stalking and cyberstalking.

  • Ann Moulds, Action Against Stalking Founder and CEO
  • Amanda Morrison, Throughcare Practitioner
  • Gin Lowdean, Throughcare Service Manager
  • Richard Fodor, Community Engagement and Communications Officer

action-against-stalking-michael-nuccitelli-cyberstalking

Cyberstalking Definition

Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both a tactic used by an ICT assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.

To meet the criteria of cyber stalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. These threats cause the target to become frightened.

An example of physical threat involves bodily harm to the target or their loved ones using ICT. Examples of psychological threats involve using disparagement, humiliation, disinformation dissemination and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyber stalker’s demands.

Action Against Stalking Website

michael-nuccitelli-action-against-stalking-stop-cyberstalking

iPredator Definition

iPredator: iPredator is a person, group, or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft, or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power, control, and retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance, or personal and financial gain. They can be any age or gender and are not bound by economic status, race, religion, or national heritage. Their sole requirement to get started in this dark dimension is an internet connection.

Central to the concept is the premise that information age criminals, deviants, and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cybercriminal, online sexual predator, cyberterrorist, internet troll, online child pornography consumer/distributor, or a person engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of cyberstealth used to engage in criminal or deviant activities or to profile, locate, stalk, and engage a target.

Unlike human predators prior to the information age, iPredators rely on the multitude of benefits offered by ICT. The primary differentiators of this very modern kind of predation are also threefold: the unlimited distance over which data can be conveyed, the immediacy with which the data can be conveyed, and the unlimited scope of data that can be conveyed. The importance of these three vectors of capability cannot be overstated. In pre-information age societies, by contrast, a predator’s malicious activity was local, slow-moving, and technologically constrained; the predator was limited to the area he could cover by car, to use an emblematic example, needed careful wooing or “casing” of his victim, and was restricted by the limitations of crude technologies like the telephone.

In the abstract and artificial electronic universe known as cyberspace, none of these restrictive qualifiers obtain. Furthermore, there is a fourth advantage that ICT offers iPredators: anonymity. On the internet it is easy for iPredators to actively design online profiles and diversionary tactics to remain undetected and untraceable.

Free Cyberstalking Assessment Links

Cyberstalking Prevention Checklist [CSPC]

iPredator Probability Inventory – Cyberstalking [IPI-CS]

Cyberstalker Identification Interview [CSII]

ipredator-michael-nuccitelli-action-against-stalking

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

action-against-stalking-domain-michael-nuccitelli-cyberstalking

Donate to Action Against Stalking

Action Against Stalking is a Scottish Charitable Incorporated Organization (SCIO No: SC044905)

ipredator-website-home-button

 

 

Unraveled: The Stalker’s Web by Michael Nuccitelli, Psy.D.

unraveled-the-stalkers-web-michael-nuccitelli-image

 

UNRAVELED

The Stalker’s Web

by Michael Nuccitelli, Psy.D.

For true crime enthusiasts, cyberpsychology students and those fascinated by cybercriminal minds, I strongly recommend listening to the podcast series titled “The Stalker’s Web” In addition to this excellent podcast, interested parties can watch the televised documentary on Discovery+, which premiers August 10, 2021. To listen to the podcasts, links have been provided or simply click on the episode image.

Hosted by Billy Jensen and Alexis Linkletter, “Unraveled: The Stalker’s Web” profiles one of the most notorious Information Age cyberstalkers, Jason Christopher Hughes. The podcast and documentary do an exceptional job profiling Mr. Hughes and his many victims. Given that the cyberstalker is one of the eight types of iPredator, provided here is my cyberstalking and iPredator definitions.

unraveled-the-stalkers-web-michael-nuccitelli-ipredator-symbol

iPredator Defined

 iPredator: A person, group, or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft, or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power, control, and retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance, or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion, or national heritage. Their sole requirement to get started in this dark dimension is an internet connection.

Central to the concept is the premise that information age criminals, deviants, and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cybercriminal, online sexual predator, cyberterrorist, internet troll, online child pornography consumer/distributor, or a person engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, tamper with, exchange and deliver harmful information.
  • A general understanding of cyberstealth used to engage in criminal or deviant activities or to profile, locate, stalk, and engage a target.

Unlike human predators prior to the information age, iPredators rely on the multitude of benefits offered by ICT. The primary differentiators of this very modern kind of predation are also threefold: the unlimited distance over which data can be conveyed, the immediacy with which the data can be conveyed, and the unlimited scope of data that can be conveyed.

Cyberstalking Defined

Cyberstalking: Cyberstalking is the use of Information and Communications Technology (ICT) to stalk, control, manipulate or habitually threaten a child, adult, business or group. Cyberstalking is both a tactic used by an online assailant and typology of pathological ICT user. Cyberstalking tactics include false accusations, threats of harm, habitual monitoring, surveillance, implied threats, identity theft, damage to property and gathering information to manipulate and control their target.

To meet the criteria of cyberstalking, the information and tactics used must involve a credible or implied physical and psychological threat to the target. An example of physical threat involves bodily harm to the target or their loved ones using ICT. Examples of psychological threats involve using disparagement, humiliation, disinformation and environmental damage to the target’s reputation, credibility or financial status if the target does not acquiesce to the cyber stalker’s demands. Cyberstalking is one category of iPredator that will continue to grow with the expansion of Information and Communications Technology.

Unraveled Podcast Links

(Links Provided or Click on Images for Podcast Episode)

unraveled-the-stalkers-web-antisense-michael-nuccitelli-ipredator

Episode 1: “Antisense” Podcast Link: https://play.acast.com/s/unraveled/s2ep.1-antisense

unraveled-the stalkers web-rachel-michael nuccitelli-ipredator

Episode 2: “Rachel” Podcast Link: https://play.acast.com/s/unraveled/s2ep.2-rachel

unraveled-the stalkers web-the extinct marsupial-michael nuccitelli-ipredator

Episode 3: “The Extinct Marsupial” Podcast Link: https://play.acast.com/s/unraveled/s2ep.3-theextinctmarsupial

unraveled-the stalkers web-mother-michael nuccitelli-ipredator

Episode 4: “Mother” Podcast Link: https://play.acast.com/s/unraveled/s2ep.4-mother 

unraveled-the stalkers web-the devils web-michael nuccitelli-ipredator

Episode 5: “The Devil’s Web” Podcast Link: https://play.acast.com/s/unraveled/s2ep.5-thedevilsweb 

unraveled-the-stalkers-web-podcast-michael-nuccitelli

Episode 6: “Hiding Out” Podcast Link: https://play.acast.com/s/unraveled/s2ep.6-hidingout

 

Educational Cyberstalking Assessment Links

Cyberstalking Prevention Checklist [CSPC]

iPredator Probability Inventory – Cyberstalking [IPI-CS]

Cyberstalker Identification Interview [CSII]

unraveled-ipredator-michael nuccitelli-image

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

mn-psychological-services-home-button

Internet Addiction Factors, Types & Awareness Images

michael-nuccitelli-internet-addiction-factors

Internet Addiction Factors, Types

&

Awareness Images

This blog post presents a list of factors and types related to Internet Addiction (aka, Internet Use Disorder). Like this entire website, all the images and content are public domain, educational and free to download, share or print. In addition to factors and types, the definition for internet addiction is provided.

It is important to note that internet addiction remains a controversial subject. Some feel it is not a true behavioral addiction like compulsive gambling, pornography and sex addiction. This writer is in the camp that views internet addiction as real, with all the trappings of other behavioral addictions.

Internet Addiction Defined

Internet Addiction: Internet Addiction (aka Internet Abuse, Internet Dependence & Internet Gaming Disorder) is an umbrella concept defining a child or adult’s compulsive and progressive abuse of Information and Communications Technology (ICT). Although the internet is the predominate arena in which the compulsive dependency takes place, electronic devices and communications channels not internet enabled are also included in the definition.

Internet Addiction causes dysfunctional cognitive, affective, behavioral & perceptual intrapersonal consequences accompanied with employment, academic, familial, peer & intimate partner interpersonal consequences. On a continuum of severity, ranging from absent to mild, cessation of internet and/or electronic device usage causes withdrawal symptomatology, psychological and/or physiological, combined with perceptual tolerance. Also, on a continuum of severity, internet abusive online users engage in criminal, deviant and/or deceptive online activities ranging from absent to severe.

The chronic and more debilitating condition, Internet Dependence, is more severe and self-destructive. Internet addiction is segmented into six typologies as follows: Cyber Sex Fixated, Cyber Relationship Fixated, Internet Gaming & Online Commerce Fixated, Information Implosion Fixated, Dark Side Fixated and NOS (Not Otherwise Specified) Fixated. The NOS Fixated typology applies to internet abusing online users who share more than one typology, has a co-existing mental illness or medical condition causing psychiatric dysfunction.

michael-nuccitelli-ipredator-internet-addiction-factors

INTERNET ADDICTION FACTORS

michael-nuccitelli-internet-addiction-factor-anonymity

Anonymity

(internet addiction factor)

Online anonymity allows the internet addicted to obtain, exchange, and disseminate information without their identity being revealed.

michael-nuccitelli-internet-addiction-factor-accessibility

Accessibility  

(internet addiction factor)

Cyberspace provides unrestricted access to the information, materials & social contacts that meet whatever the internet addicted preoccupation may be.

michael-nuccitelli-internet-addiction-factors-isolation

Isolation

(internet addiction factor)

The ability to research, discover and engage online users who share the same fixation in an isolated environment; allowing the internet addict to engage in high-risk online activities.

michael-nuccitelli-internet-addiction-factor-inexpensive

Inexpensive

(internet addiction factor)

Other than the cost of the devices, utility bills and software, the internet addicted can access untold number of websites, social contacts and organizations all specific to their chosen fixate.

michael-nuccitelli-internet-addiction-factor-fantasy

Fantasy 

(internet addiction factor)

Cyberspace for the internet addicted is home to an entire universe; designed by them, and themed with their fixation.

michael-nuccitelli-internet-addiction-factor-disconnection

Disconnection

(internet addiction factor)

Synonymous with detachment, the internet addicted gradually disconnects from their real friends, family and associates.

michael-nuccitelli-ipredator-internet-addiction-factors-types

TYPES OF INTERNET ADDICTION

michael-nuccitelli-internet-addiction-type-cyber-sex-fixated

Cyber Sex Fixated

(internet addiction type)

Obsessed with internet pornography, adult chat rooms, adult fantasy role-play websites, sexually themed social networking sites and texting like-minded online users.

michael-nuccitelli-internet-addiction-type-cyber-relationship-fixated

Cyber Relationship Fixated

(internet addiction type)

Fueled by the compulsive need to be accepted; online dating sites, chat rooms and social networking sites becomes the habitual repertoire for all online activities.

michael-nuccitelli-internet-addiction-gaming-online-commerce-fixated

Gaming & Online Commerce Fixated

(internet addiction type)

Fixated on browsing, purchasing, competing and betting at websites involving shopping, online gaming, casinos and auctions.

michael-nuccitelli-internet-addiction-information-implosion-fixated

Information Implosion Fixated

(internet addiction type)

Terms best describing this internet addicted type include “information addicts,” “dataholics” or suffering from “infobesity.”  

michael-nuccitelli-internet-addiction-dark-side-fixated

Dark Side Fixated 

(internet addiction type)

Fixated on all things macabre, violent, criminal, deviant and bizarre. Gravitates to obscene material and fascinated by all things dark themed. (Similar to Doomscrolling)

iPredator Internet Addiction Page

Internet Addiction Risk Checklist (IARC)

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a NYS licensed psychologist, cyberpsychology researcher and online safety educator. In 2009, Dr. Nuccitelli finalized his dark side of cyberspace concept called iPredator. Since 2010, he has advised those seeking information about cyberbullying, cyberstalking, cybercriminal minds, internet addiction and his Dark Psychology concept. By day Dr. Nuccitelli is a practicing psychologist, clinical supervisor and owner of MN Psychological Services, PLLC. After work and on the weekends, he volunteers helping online users who have been cyber-attacked. Dr. Nuccitelli’s is always available to interested parties and the media at no cost. This website and everything created by Dr. Nuccitelli is educational, free and public domain.

internet-addiction-factors-home-button

 
 
 
 
 
 
 
 
 
 
 

Pin It on Pinterest

Share This