Cyber Attack Prevention for Students, Parents and Educators

Aug 19, 2013 by

Dr. Michael Nuccitelli is a New York State licensed psychologist and certified forensic consultant.

Dr. Michael Nuccitelli is a New York State licensed psychologist and certified forensic consultant.

Cyber attack prevention is addressed by Delia Stafford, president of the Haberman Educational Foundation, who interviews the author of a new Information Age forensics construct called iPredator. Michael Nuccitelli Psy.D. C.F.C. is a NYS licensed psychologist, certified forensic consultant and author of iPredator recognized by the American College of Forensic Examiners Institute, law enforcement agencies, information security professionals and a growing number of educational professionals.

It does not require a plethora of statistics, articles or research to confirm that Information Age humanity is becoming enveloped by information technology. The Information Age represents the evolution, emergence, consumption of and reliance upon Information and Communications Technology (ICT). In a mere four decades, the importance of ICT has led many to surmise that the planet and its human inhabitants are amidst an Information Revolution. Mobile device technology, telecommunications, social media and cyberspace are just a few examples of humanities newest forms of communication.

The Information Revolution marks another major turning point in history, following the Industrial Revolution and changing every aspect of daily life unlike ever before. Smartphones, mobile devices and social media are the latest in a succession of advancements growing at a feverish pace. It is often hard to fathom that the Internet, used by two billion plus people globally and rapidly growing, celebrated its 20th birthday in 2011.

As information technology continues to expand at a feverish pace, coupled with seemingly daily introductions of new technology, ever-increasing obstacles challenge students, educators and all humanity. Another challenge, that includes the dark side of humanity, is the usage of ICT and cyberspace to harm others inflicting psychological, physical and/or societal damage. Terms such as cyberbullying, cyberstalking, cybercrime and online sexual predation are arenas causing harm to children, parents and all online users.

To enlighten Education Views readers, Delia Stafford, president of the Haberman Educational Foundation, offers her transcribed interview with the author of a new Information Age forensics construct called iPredator. Michael Nuccitelli Psy.D. C.F.C. is a NYS licensed psychologist, certified forensic consultant and author of iPredator. Recognized by the American College of Forensic Examiners Institute, law enforcement agencies, information security professionals and a growing number of educational professionals, Dr. Nuccitelli and iPredator Inc.’s mission is to slow the rapidly growing rates of online victimization and theft.

Delia: Good Morning Dr. Nuccitelli and Thank You for helping to enlighten the readers of Education Views. Could you tell me about your construct and what the definition of iPredator is?

Dr. Nuccitelli: Certainly Delia and here for Education News readers is my recently updated definition of iPredator. It is as follows:

iPredator: iPredator is a person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology (ICT). iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage.

iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise that Information Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity. Whether the offender is a cyberbully, cyberstalker, cyber harasser, cyber criminal, online sexual predator, cyber terrorist or engaged in internet defamation or nefarious cyber deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:

I. A self-awareness of causing harm to others, directly or indirectly, using ICT. II. The usage of ICT to obtain, tamper with, exchange and deliver harmful information. III. A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.

Unlike human predators prior to the Information Age, iPredators rely on the multitude of benefits offered by Information and Communications Technology (ICT). These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators rely on their capacity to deceive others using ICT in the abstract and artificial electronic universe known as cyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.

Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition (IVI). An iPredator’s IVI is their aptitude to sense a target’s ODDOR (Offline Distress Dictates Online Response), online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.

Delia: So doctor, what are the greatest concerns for educators as we start the school year and approach 2014?

Dr. Nuccitelli: That’s a big question and I wish I could simply answer “Anything Tech-Centric.” The unfortunate reality is that cyberbullying, cyber harassment, cyberstalking, cybercrime and online sexual predation are areas causing harm to children, parents, educators and all online users. Throw in “sexting” and the new concerns about internet addiction and now we have a country dealing with the sharp end of the proverbial “double-edged sword”. Not to sound alarmist and I hope I’m wrong, but “student on student abuse” and “student on teacher abuse” are dynamics not in the too distant future for your Education Views readers. Not just teachers and educational systems, but all institutions and professionals deemed, authority by minors, must be prepared.

Delia: Do you have any final comments helpful to Education Views readers?

Dr. Nuccitelli: …I would be more than willing to consultant for Education Views, conducting cyber attack prevention webinars for their readers, regularly authoring articles/blog posts and actively advising school officials and that still would not reduce a student, teacher or educational system’s probability of being targeted by iPredators. Educators and educational systems, like all Americans, must wake up to the reality of three issues I have concluded are a priority. I. We live in the Information Age. II. Children, their parents and all online users are rapidly becoming enveloped by information technology. III. Mobile device technology, social media and the “Dark Side of Cyberspace” are here to stay. Stopping the rapid growth of online victimization starts with the understanding that it is no longer categorized, in our minds, as a social issue in the distant future. It is here now and educators must learn about the pitfalls. Not just for their students, but for themselves, their colleagues and loved ones as well.

Delia: Thank you Dr. Nuccitelli and I’m sure your information will motivate teachers and school systems to contact iPredator Inc. If Education Views readers want to visit your internet safety website or contact you for consultation or student/teacher training, could you provide your contact information?

Dr. Nuccitelli: Of course Delia and please give my thanks to the folks at Education Views. All the information at (no “m” after .co) is cost free, does not require having to sign up using personal information or an email address. If there is information of interest, simply go to the base of any web page and click on the green pdf/print button. For educators and school systems interested in comprehensive diagnostic and educational tools, I’ve authored 26 Internet Safety checklists and inventories, (IISC and IPI Collection) that can be purchased in both full and abridged versions (IISC-ABR Collection). And although some may view me as being old fashioned, anyone can call me directly, here in New York, at 347-871-2416 or via email at

About Michael Nuccitelli, Psy.D.

Dr. Michael Nuccitelli is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in clinical psychology in 1994 from the Adler School of Professional Psychology in Chicago, Illinois. In 1997, Dr. Nuccitelli became a licensed psychologist in New York State (License # 013009.) In 2006, he received the Certified Forensic Consultant designation from the American College of Forensic Examiners (Identification # 103110.) As author of the theoretical construct termed iPredator, Dr. Nuccitelli is a Cyberbullying, Internet Safety, Cybercrime, Online Sexual Predator and Digital Forensic Psychology Educator & Investigator. In September 2011, Dr. Nuccitelli established iPredator Inc. offering educational, investigation and advisory services regarding internet predators, cybercrime & digital forensic psychology. In May 2013, Dr. Nuccitelli and iPredator launched their website offering site visitors an incredible amount of information, services and tools on internet safety, cyber attack risk prevention and the field Dr. Nuccitelli and his colleagues are pioneering termed, Information Age Forensics.


Print Friendly, PDF & Email

Related Posts


Share This

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.