Dr. Nuccitelli has a high level of expertise in this area and this video is such a contribution to all audiences.
https://youtu.be/lkQMDpN0Nx4 – Please listen to Dr. Michael Nuccitelli talk about Ipredator and its construct.
Liz – handle @arguetron – just loves to argue on Twitter.
From everything to climate change to feminism, from Donald Trump to Julian Assange. Think of any controversial subject, and Liz has an opinion. And she’s not afraid to share it through a series of tweets that she posts every 10 minutes or so.
Tweets, just like these –
Liz isn’t aggressive. She isn’t malicious. She doesn’t engage in harassment. She doesn’t get heated. She doesn’t use curse words. But she can argue. For hours.
But there’s something not right with Liz… something we can’t quite put our finger on… something, almost… inhuman…
Well, Liz isn’t a human. She’s not real. In fact, she’s a computer, who may very well have a good chance of completing the famous Turing Test. She’s a Twitter bot (not the first, not the last) that uses an extensive library of statements and responses to bait a specific set of Twitter users into arguing with her.
Naturally, those Twitter users spending many of their computer hours arguing with Liz have no idea whatsoever they’re wasting their time on a robot. A robot that has no real capability of digesting their arguments or – as is often the case – abusive rants.
Liz is the creation of Sarah Nyberg, who was recently at the business end of an organised social media hate campaign relating to the 2014 “Gamergate” controversy that targeted a number of women involved in the video game culture.
Nyberg has said that the objective of Liz is to highlight the effects and consequences that social media sites like Twitter have concerning the subject of trolling, and online harassment. She puts it like this –
“I’d like the project to help people critically look at how toxic Twitter can be, especially for people expressing these kinds of opinions. That it also makes the people engaging in this sort of behavior looks ridiculous is a nice side effect.”
Perhaps what is most revealing is the simplicity of how Liz works and how – despite that simplicity – Liz still manages to fool so many other human Twitter users.
It works like this… Liz tweets an opinionated statement – every 10 minutes or so – that is likely to bait a certain number of other users into responding. From there, Liz essentially replies to any counter-tweets with completely generic responses that could fit into practically any Twitter argument ever – responses like “prove it to me”, “nope. wrong. wrong. wrong.” and “I’d be rooting for you if I liked being wrong.”
Those non-confrontational, almost passive aggressive responses seem to be more than enough to carry on the various “debates”, with many Twitter users soon becoming confrontational, aggressive, or sometimes just exasperated.
While Nyberg may be trying to highlight the potentially toxic consequences of Twitter debates, she’s also demonstrating the utter futility of them too. If Liz – a bot who posts content-generic replies – can fool humans and bait them into hours-long arguments, is there really any point to any of it?
Of course there is an element of mockery too. Even a cursory glance at the tweets published by Liz show that they are generally left-leaning, meaning Liz is designed to bait many who fall on the right-wing side of many issues. This includes users who believe climate change is a hoax, those who oppose feminism or gay marriage and – of course – Liz makes some digs at Fox News and the NRA.
Nyberg says –
“It also baits conspiracy theorists (like vaccination truthers, for example) because they also spend an odd amount of time searching for people to fight with.”
The media coverage of Liz now means most know that she’s just a bot, and her successful “hit rate” when it comes to baiting users into arguments has taken somewhat of a dive, but you can visit her history to uncover some pretty amusing “debates”.
Source: C. Charles
The Real Michael Nuccitelli, Psy.D.
Michael Nuccitelli, Psy.D. is a New York psychologist and cyber attack prevention expert. He’s also the author of an incredible cybercriminal concept called iPredator. I’m writing this post to let my readers know that any negative information published about him is false and bogus. Not only is Michael Nuccitelli, Psy.D. the future of internet safety and cybercrime prevention, he’s also a colleague and friend of mine.
Being a national expert on cyberbullying, cyberstalking and other types of online assailants, there are many trolls who spend their time trying to defame his stellar reputation. Like all online users, Dr. Nuccitelli is not immune from being cyber attacked.
Michael Nuccitelli’s Obsessed Troll
There are many trolls who target him and his theories, but there is one in particular that’s truly bizarre. His name is Todd M. Knisely. Todd Knisely has an extensive criminal history, but tries to promote himself as a cyber security expert and hacker. Not only is Mr. Knisely lying about his expertise, but he was recently arrested for a bizarre event. Provided here are a couple links to learn about this oddball who calls himself Shadow.
Somerset Fake Doctor
Somerset Man Impersonated Hospital Personnel
As bizarre as his recent arrest illustrates, Todd M. Knisely literally hides his identity behind the 1930’s super hero called the Shadow. Maybe he is trying to hide his past crimes and felony conviction? Who knows but he is as close to a psychopath as one can get. Want to learn about his obsession with Dr. Nuccitelli? Knisely has created an entire website dedicated to slandering Michael Nuccitelli, Psy.D. Although I didn’t want to promote his phony crap, Dr. Nuccitelli insisted I do so readers could witness Todd Knisely’s obsession with him. Click on this link to view his slanderous content.
April 2017 Update: Dr. Nuccitelli now owns MichaelNuccitelli.Net, which forwards to his new internet safety blog. I’m sure Mr. Knisely will find other ways to defame Dr. Nuccitelli’s reputation.
Mind you, most people would move mountains to try to stop others from spreading lies about them. Michael Nuccitelli, Psy.D. is not everyone. Dr. Nuccitelli uses Todd Knisely’s website to educate online users about cyber harassment, internet trolls and character assassination. In fact, Dr. Nuccitelli encourages everyone he helps to visit Knisely’s website. If you do visit, you’ll be amazed how much time and effort he’s put in to piecing together bits of information and content to create a fantastic fable.
Todd M. Knisely is an unemployed cybercriminal who deceives anyone who will listen that he is a hacker and information security professional. In a nutshell, Mr. Knisely is a sad young man with plenty of time on his hands to disparage Dr. Nuccitelli without being paid. Then again, I’m sure Knisely bullshit’s others by telling them he’s volunteering his time to make cyberspace a safer place. He must have a couple screws loose if he thinks anyone cares about his foolishness.
Michael Nuccitelli, Psy.D. “Cyber Sigmund Freud”
Michael Nuccitelli, Psy.D. is not only a nice man, but he is respectful, trustworthy and brilliant. I wonder if Todd M. Knisely volunteers his time 20-30 hours a week helping others for free. Dr. Nuccitelli’s concepts are all free to read and download at his internet safety website by clicking here. iPredator
You’ll be shocked to see all his content, which is completely free to download, save or share. Dr. Nuccitelli will be appearing in my cyberbullying documentary, as well as, my good friend’s soon to be released catfishing documentary. He really is what many are respectfully calling him the new “Cyber Sigmund Freud”. To prove his iPredator theory is gaining national attention, Dr. Nuccitelli will soon be the keynote presenter and all-day trainer for the Colorado Psychological Association on November 3, 2016. The title of his full-day training is “Dark Side of Cyberspace: iPredator”
I can’t tell you how proud I am to see his work grow throughout the United States. He won’t accept being called an Information Age visionary, but his work confirms this. In conclusion, Michael Nuccitelli, Psy.D. is one of the nicest men you will ever meet. I should know because he’s a good friend. I’m honored to know him and even more honored to be a volunteer in his internet safety communities. I guarantee a day will come when “Dr. Nucc” is a household name.
“As the Information Age evolves, trust has become a rare commodity and betrayal flows like water. It is never too late to inject mutual respect and common decency into the ass of cyberspace.” Michael Nuccitelli, Psy.D. (2016)
Question & Answer Section for Blog with Guest Blogger:
Brian-White Knight -Williams
September 4, 2016
1) Can you tell me a little bit about what you do for iPredator?
As a social I try to assess a profiles intent. I get alerted when other members inform me of an account who added them or if an account requests to join a community.
Any profile who hides its followers and has no posts showing in the stream is likely a troll account. Same thing with an account with a small number of followers with very few posts. Some troll accounts have very few posts which may date back to several years.
I also track pedophiles. When a pedophile community is uncovered, I do more than report it. The first thing I do is infiltrate it then start recording profile links of the members. This can take several hours maybe more depending on how many members there are. The reason I do this is so I can profile index their accounts and they will unwittingly lead me or other pedo hunts to other pedos or pedo communities. It’s a continuous pattern that never stops.
The last thing I do is bring awareness to people about trolls and pedophiles.
2) You are a very well-known Troll Hunter – can you please explain the difference between a “good” troll vs. a “bad” troll on the internet.
Sometimes blocking and reporting is not enough since Google pretty much cares less what is going on in Google Plus. So a few intelligent people who fight back against predatory trolls developed our own methods of Defensive or Reverse Trolling.
Reverse Trolls are not predatory and do not troll just anyone they go after the most ruthless trolls on G+. A victim like Shannon West can not block the Predatory Puritan trolls, because even if they get their accounts deleted or banned they will create a new profile within minutes and go back to where they left off. It is the same with their Pro Animal Abuse Communities (PAAS). One gets deleted they create a new one and upload posts likely saved in an offline storage site like Google Drive, Dropbox etc. For the record I think the Puritans are on there 12 Pro Animal Abuse community. Sometime last year the Game Playness created three PAAS communities at the same time. One was the main and the other two were backups. The CAINp community changed strategy and multiple reported all three at the same time and caused those communities to get banned.
3) How do you handle internet bullies? I mean it does really get frustrating to be trying to do good when there is always someone knocking you down who sits behind their keyboard, I like to refer to these people as keyboard cowards.
The first thing to remember when engaging a predatory troll is to remember yes they are cowards hiding behind a fake name and fake profile pic, thus they do not deserve respect. Never respect a troll or give validation of their opinions. Never give a troll an ounce of credibility or respect. Once a troll knows you respect it’s opinion then they have you. It is all about psychological warfare. 99% of people engaged by trolls take their comments as serious. They will call you a ni..er if you are black , honky/ hillbilly if you are white a femnazi if you are feminist, a communist if you are democrat, etc. They themselves are likely not racist or support the extreme right wing. Most of the time it is just an act to get inside their victim’s head. Predatory trolls are the ultimate losers in life. Often stuck in some dead end job like McDonalds or Walmart stressed out over bills or solely dependent on disability. Thus they troll to relieve stress. Rob a troll of their credibility you rob them of their power.
If someone fights back at a troll never get angry at their defamatory comments. Again you are robbing them of their power.
4) Social Media my example will be Twitter, they as a whole refuse to take Bullying and cyber harassment seriously if you are just a everyday citizen. Take Leslie Jones for example who is a very outspoken celebrity who was harassed and bullied via Twitter. Twitter acted upon her account within a few days of it being reported. However, to the everyday user this is not the case, we are harassed every time we go to this social media venue. What changes do you think need to be made overall for the safety of all social media users?
Well first off you have to understand why social media doesn’t want to regulate their platforms. It is all about money. A minority of people see the implementations of these regulations as tyranny. Thus no company wants to be the first to implement regulations out of fear that they will chase off users. Second these companies make fortunes selling our emails in batches to advertisers. Social media platforms start permanently banning predatory trolls then they lose ad revenue
5) Your work with Troll hunting has lead you to some pretty sketchy people on the internet, what is your advice to the blog readers if they feel they are being stalked, harassed etc and the social media site they use isn’t responding to their complaints?
I will just post an article I wrote last year which details how trolls harass, and dox unsuspecting victims and how victims can protect themselves.
The following is a short article I wrote sometime last year.
How to assess an accounts intent.
A clue to an accounts intent is that a new account vs a troll account will not be target specific. What that is an ordinary user account will not seek out communities belonging to anti troll members and ask to join, vs a troll account with very few followers below 20 and posts dating back only a few hours or days asking to join.
A troll accounts intent is to infiltrate the community become a dutiful member and get promoted to moderator. In private communities it is of the utmost importance for a troll to obtain the rank of moderator to invite in their friends and take over their communities. Pending on the threat the community poses to trolls they will likely remove all members below the rank of moderator. If a Community is of an extreme threat the infiltrator troll my try to obtain ownership status and delete the community.
Section 2 harassment/ doxing/Ip address/ Hacking/extortion.
A Troll’s main goal is notoriety and fame. They want to become infamous through the use of manipulation of Information Communication Technology (See Ipredator)
to successfully harangue their target under a veil of anonymity without being discovered .
The troll package includes doxing taken from docs the extension filename of documents listing information, and using a person’s information for the purposes of extortion. Doxing includes not only the listed home address and phone number and name of the victim but also a list of relatives, names home address, phone numbers. This is meant as a tactic to drive the victim into submission. If a troll is unable to find the information listed , they will resort to using link loggers to get an Ip address What a link logger is a shortened url or web link to most often a fake article and occasionally a real article. Link loggers record anyone’s Ip address once they clicked on the link. The troll will have a code he must enter on the link logger website in order to view and watch the ip addresses get listed from people clicking on their loaded link. Once the troll has the IP address of his victim they then proceed to an Ip Tracker Website and run the Ip address into a search. The results will show the victim’s City with a reverse DNS look up, latitude /longitude, weather conditions coordinates for city and state. Once the troll has the coordinates they will then venture into a Map utility and run the coordinates thus zeroing in on the victim’s street address. From their the troll will venture into several online data broker websites. These are websites that require money to search for a person’s phone, address , criminal background , relatives etc. These websites or the owners of these websites gather this information themselves by either paying social media sites or employing web crawlers. A web crawler is a program that seeks out information on a subject and creates files of that person or thing searched. Kali Linux has two programs associated with this tactic One is Patverna which is the computer version and case files the mobile version. Trolls determining their level of technological know how, may employ the use of webcrawler, thus foregoing the aforementioned steps of getting their victims information.
Once the troll has the information on their target they will most likely extort or coerce their victim to get what they want in exchange of not releasing the victims information to the public.
How to protect yourself.
There is only one simple solution that is to never list your address publicly.If you do delete that info from any and all social media sites.
In terms of link loggers a link logger will have a suspicious extension on the end of it that does not match up to the site that the troll will tell you to go. Installing a Virtual Private Network ( VPN) reroutes your Ip address through a proxy server network thus encrypting and giving out a useless Ip address. There are many VPNs to choose from this day and age and can be used with any Information Communication Technology in the modern day. A simple search of a computer or device +vpn will give you directions on where to find and install.
The last resort of a troll is hacking. Regardless of how it sounds is very simplistic. All a troll needs to hack a social media account is the email and password of the target. Trolls will often claim they hacked their system to obtain the victim’s email. This is a bogus lie meant to psychologically inflate the troll as some terrifying hacker. In reality they gained the info as discussed earlier via info broker or the use of a webcrawler or a snapcapture packet. Capture packets are Trojan Horses where they capture the info of the user and encrypt it. The troll will have to use a computer program to decrypt the data in order to use it. To learn more about capture packets Google Wireshark.
There are methods to protect your accounts from hacking. 1 use a long string of random numbers and letters mixed for passwords. I recommend using Google Keep to store these passwords. 2. For Google Plus and Facebook these social sites offer secondary encryption Google Authenticator is the best. Google authenticator (both mobile and computer accessible)will require the user to paste a code to gain access to their account. The code changes every 30 seconds thus making it impossible to hack.
Following these steps means protecting your anonymity and safeguarding your information.
6) What is your favorite part of working with iPredator?
Helping people and taking out pedophiles.
Thank you for allowing me the chance to explain what we do.
Brian White Knight Williams