Total Pageviews

Sunday 27 December 2015

Internet Trolls Are Narcissists, Psychopaths, and Sadists

Jennifer Golbeck Ph.D.


In this month's issue of Personality and Individual Differencesa study was published(link is external)that confirms what we all suspected: Internet trolls are horrible people. 
Let's start by getting our definitions straight: An Internet troll is someone who comes into a discussion and posts comments designed to upset or disrupt the conversation. Often, in fact, it seems like there is no real purpose behind their comments except to upset everyone else involved. Trolls will lie, exaggerate, and offend to get a response. 
What kind of person would do this? Some Canadian researchers decided to find out.
They conducted two online studies with over 1,200 people, giving personality tests to each subject along with a survey about their Internet commenting behavior. They were looking for evidence that linked trolling with the "Dark Tetrad" of personality traits:narcissism, Machiavellianism, psychopathy, and sadism. 

They found that Dark Tetrad scores were highest among people who said trolling was their favorite Internet activity. To get an idea of how much more prevalent these traits were among Internet trolls, see this figure from the paper:
Look at how low the Dark Tetrad scores are for everyone except the trolls! Their scores for all four traits soar on the chart. The relationship between trolling and the Dark Tetrad is so significant that the authors write in their paper:
"... the associations between sadism and GAIT (Global Assessment of Internet Trolling) scores were so strong that it might be said that online trolls are prototypical everyday sadists." [emphasis added]
Trolls truly enjoy making you feel bad. To quote the authors once more (because this is a truly quotable article): "Both trolls and sadists feel sadistic glee at the distress of others. Sadists just want to have fun ... and the Internet is their playground!"
The next time you encounter a troll online, remember:
  1. These trolls are some truly difficult people.
  2. It is your suffering that brings them pleasure, so the best thing you can do is ignore them.
     
References
Buckels, Erin E., Paul D. Trapnell, and Delroy L. Paulhus. "Trolls just want to have fun."Personality and Individual Differences67 (2014): 97-102.

https://www.psychologytoday.com/blog/your-online-secrets/201409/internet-trolls-are-narcissists-psychopaths-and-sadists


Tuesday 15 December 2015

Cyberstalking Facts, Types of Cyberstalkers

cyberstalking-facts-types-of-cyberstalkers-ipredator-inc.-michael-nuccitelli-psy.d.-new-york

Cyberstalking Facts, Types of Cyberstalkers

iPredator Inc.

Welcome to iPredator Inc.’s cyberstalking facts & cyberstalking identification, prevention and education page. The stalker & cyberstalker profile involves multiple descriptions, definitions and dimensions. With the advent of the Information and Communications Technology, cyber stalking has gradually grown to become a serious concern for law enforcement and anyone engaged in online activities.
The typologies of stalkers are theoretical descriptions shared by both the cyber and physical stalkers. The goal of victim prevention is to first understand their rationale for acting as a predator and then developing strategies to prevent becoming a victim. Learning to profile and predict the stalker & cyberstalker greatly reduces the predator’s objective of causing you or your loved ones psychological and physical harm.
Stalking is a behavior wherein a person willfully and repeatedly engages in conduct directed towards another person who, if known by the victim, causes significant concern and fear. The predator that initiates and sustains the stalking behavior(s) may or may not recognize he/she is causing their victim serious alarm, perceptual torment and the unfortunate experience of being terrorized.
Stalking involves one person’s obsessive behavior toward another person. Initially, stalking usually takes the form of annoying, threatening or obscene telephone calls, emails or letters. During this period, the victim views the stalker’s actions as more of a form of harassment as opposed to an escalating dangerous situation. Once the harassment stage has been established, it is during this period the potential victim needs to contact law enforcement. It is also crucial to begin keeping a written log documenting each time the stalker makes contact.
Psychiatrists, psychologists, and other mental health professionals view most stalkers as suffering from a psychiatric illness(s) causing them to be psychotic or delusional. When not deemed as psychotic, stalkers are considered plagued by some type of personality disorder or fueled by unique psychological factors. In the most severe cases, the stalker is defined as a predatory stalker or sociopath.
cyberstalking-facts-types-of-cyberstalkers-ipredator-inc.-michael-nuccitelli-psy.d.-new-york
Whatever the psychological rationale may be, the stalker rarely comprehends the fear he/she is causing the other person. Blinded by his/her motivations to be stalking someone in the first place causes them to lose sight of the fear and terror they are causing. When anger, rage and hostility towards the victim are involved, the stalker is fully aware of the anguish he/she is causing, but feels the victim is deserving of the fear or simply does not care. In 1999, Australian stalking expert, Dr. Paul Mullen, and a group of investigators identified five types of stalkers, which, remains applicable today for stalkers and Cyberstalkers and as follows:

Stalker Typologies

I. Rejected Stalkers: This type of stalker is motivated to pursue their victim in attempt to reverse what they perceive as a wrongful set of circumstances causing a prior divorce, separation or termination of a relationship. These offenders either feel misunderstood hoping to reverse the break up or feel angry and seeking revenge because their attempts at reconciliation with the victim has failed in the past.
II. Resentful Stalkers: This type of stalker can be dangerous given their perceived motivation for stalking. Resentful stalkers are fully aware the victim is cognizant of the stalking, but continues to fulfill a distorted vendetta he/she feels is warranted. Fear and distress experienced by the victim are the goals of this type of stalker. For this type of profile, the stalker believes the victim both deserves and requires being frightened because they have caused them and/or others anguish and distress.
IIIIntimacy Seekers: This type of stalker does not have ill will towards their victim and simply wants to engage in a loving relationship with them. Intimacy seekers view their victims as their soul mate destined to be together at all costs. Within their mind, they believe it is their job and purpose to make sure destiny of a loving relationship is fulfilled. Intimacy seeker stalkers are often the segment of men or women who harass celebrities and public figures. Blinded by their distorted perceptions of a destined love, they lose sight of the distress and fear they are causing the person they stalk.
IV. Incompetent Suitors: These people who fit this profile are stalkers deeply enamored with their victim. Their interest for the victim at times can reach a state of fixation whereby their entire waking life is focused on the endeavor of one day becoming a couple. They tend to lack social, communication or courting skills and may feel entitled that their fantasy of a loving relationship is inevitable. Feeling entitled and/or deserving of a relationship with the victim inspires the stalker to gradually increase their frequency of contact. Although similar to the Intimacy Seeker stalker, incompetent suitors are more gradual in their means and methods of contact.
V. Predatory Stalkers: Of the five types, the predatory stalker is by far the most dangerous and determined. This type of stalker is motivated by a perverted sexual need. They engage in actively planning an attack and premeditation as the predator how he will go about engaging in a sexual act(s) with his victim. They do not have feelings of love for their victim nor motivated by a belief of predestination. Their fuel to dominate and victimize resembles the sociopath experiencing little to no remorse for the welfare of their victim.
Understanding the types of stalker and what motivates them is the first step in reducing the probability of becoming one of their victims. Unfortunately, many men, women and society in general minimize the stalker profile and mistakenly view these people as “unfortunate souls looking for love.” What people fail to understand is most of these predators engaged in stalking suffer troublesome psychiatric illnesses, psychological issues, or motivated by urges to sexually dominate their victim(s).
“Cyberstalking and online predators are new dangers since the birth of the Internet. People ranging in age from children to seniors now use the Internet for a multitude of reasons. As millions of people use Information and Communications Technology (ICT), millions more will become victims.”  Michael Nuccitelli, Psy.D. (2014)
Most states have cyber stalking, cyber harassment and cyber bullying laws and/or include Information and Communications Technology within their traditional stalking or harassment laws. Protecting minors from online bullying and harassment have led states to enact cyber bullying laws. Cyberstalking is the use of Information and Communications Technology to stalk and refers to a pattern of threatening or malicious behaviors. Cyberstalking may be considered the most dangerous of the three types of information and communications technology harassment, based on posing a credible threat of harm. Legal sanctions range from misdemeanors to felonies and vary by state.
Cyber Harassment differs from Cyberstalking in that it is not involving a credible physical threat. Cyber harassment usually pertains to threatening or harassing messages using Information and Communications Technology to torment an individual, group or organization. Some states approach cyber harassment by including language addressing electronic communications in general harassment laws, while others have created stand-alone cyber harassment statutes.
Cyberbullying and cyber harassment are sometimes used interchangeably, but cyber bullying is used for electronic harassment or bullying among minors. Recent cyber bullying legislation reflects a trend of making school districts the policy enforcers of cyber bullying. As a result, statutes establish the infrastructure for schools to handle this issue by amending existing school anti-bullying policies to include cyber bullying and cyber harassment among school age children. The majority of these state laws establish sanctions for all forms of cyber bullying on school property, school buses and official school functions.
However, some have also extended sanctions to include cyber bullying activities that originate off-campus, believing that activities off-campus can have a detrimental and disruptive effect on a child’s learning environment. The legal sanctions for cyber bullying range from misdemeanors to felonies with detention, suspension and expulsion from school.
cyberstalking-facts-types-of-cyberstalkers-ipredator-inc.-michael-nuccitelli-psy.d.-new-york
Cyber bullying is a generic term used to define harmful, repeated and hostile online behavior intended to deprecate a targeted online user. Cyber bullying describes threatening or disparaging communications delivered through ICT. Whereas classic bullying typically involves face-to-face interactions and non-digital forms of communication, cyber bullying consists of information exchanged via ICT and may never involve face-to-face encounters.
Bullying or classic bullying is a term used to define recurrent and sustained verbal and/or physical attacks by a child, adolescent or adult towards others who are unable or unwilling to deescalate the engagement. It may involve verbal harassment, physical assault, coercion, intimidation, humiliation and taunting. Bullying is composed of a combination of four basic types of abuse: emotional, social, verbal and physical abuse. Despite variants in definition, bullying always involves the use of harassment, force or coercion to affect a targeted victim. Classic bullying requires face-to-face interactions within the repertoire of behaviors.
Among the billions of online users, lurks a dangerous element the unsuspecting person may fall victim to. Cyberstalkers and online predators are two groups who access the Internet seeking harmful interactions. In most Cyberstalking events, the assailant is termed an iPredator defined by this writer as follows:
cyberstalking-facts-types-of-cyberstalkers-ipredator-inc.-michael-nuccitelli-psy.d.-new-york

iPredator

iPredator: A person, group or nation who, directly or indirectly, engages in exploitation, victimization, coercion, stalking, theft or disparagement of others using Information and Communications Technology [ICT]. iPredators are driven by deviant fantasies, desires for power and control, retribution, religious fanaticism, political reprisal, psychiatric illness, perceptual distortions, peer acceptance or personal and financial gain. iPredators can be any age or gender and are not bound by economic status, race, religion or national heritage. iPredator is a global term used to distinguish anyone who engages in criminal, coercive, deviant or abusive behaviors using ICT. Central to the construct is the premise thatInformation Age criminals, deviants and the violently disturbed are psychopathological classifications new to humanity.
Whether the offender is a cyberstalker, cyber harasser, cybercriminal, online sexual predator,internet troll, cyber terrorist, cyberbully, online child pornography consumer/distributor or engaged in internet defamation or nefarious online deception, they fall within the scope of iPredator. The three criteria used to define an iPredator include:
  • A self-awareness of causing harm to others, directly or indirectly, using ICT.
  • The usage of ICT to obtain, exchange and deliver harmful information.
  • A general understanding of Cyberstealth used to engage in criminal or deviant activities or to profile, identify, locate, stalk and engage a target.
Unlike human predators prior to the Information Age, iPredators rely upon the multitude of benefits offered by Information and Communications Technology [ICT]. These assistances include exchange of information over long distances, rapidity of information exchanged and the seemingly infinite access to data available. Malevolent in intent, iPredators habitually deceive others using ICT in the abstract and artificial electronic universe known ascyberspace. Therefore, as the internet naturally offers all ICT users anonymity, if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Cyberstealth, a sub-tenet of iPredator, is a covert method by which iPredators attempt to establish and sustain complete anonymity while they engage in ICT activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. Concurrent with the concept of Cyberstealth is iPredator Victim Intuition [IVI], an iPredator’s IVI is their aptitude to sense a target’s ODDOR [Offline Distress Dictates Online Response], online & offline vulnerabilities, psychological weaknesses, technological limitations, increasing their success of a cyber-attack with minimal ramifications.
cyberstalking-facts-types-of-cyberstalkers-ipredator-inc.-michael-nuccitelli-psy.d.-new-york
Stalking and Cyberstalking also falls under the theoretical construct of Dark Psychology, coined by this writer. Dark Psychology is the study of the human condition as it relates to the psychological nature of people to prey upon others. All of humanity has this potential to victimize other humans & living creatures. While many restrain or sublimate this tendency, some act upon these impulses.
Dark Psychology seeks to understand those thoughts, feelings and perceptions that lead to predatory behavior. Dark Psychology assumes that this production is purposive and has some rational, goal-oriented motivation 99% of the time. The remaining 1%, under Dark Psychology, is the brutal victimization of others without purposive intent or reasonably defined by evolutionary science or religious dogma.
With the advent of the internet, a new environment now exists for Cyberstalkers and online predators. Millions of children, teens and adults create billions of internet exchanges daily. With the addition of cell phone and text messaging, the daily exchange number reaches the billions. Digital technology, telecommunications and the cyberspace environment are now hunting grounds for online predators and iPredators.
Cyberstalking was predicted as inevitable for 15 years, but only recently have parents, young people and community agencies started to focus on this growing problem. To exemplify how this warning has been explained for well over a decade, the Department of Justice (DOJ) authored and released the 1999 Report On Cyberstalking: A New Challenge For Law Enforcement And Industry 12 years ago and is a report defining cyber stalking, the dangers to children and cyber stalking resources. In this report, the DOJ is not only thorough, but prophetic as well. They clearly stated the problems of cyber stalking and predicted the number of online predators would increase with each passing year.
It is 12 years later, and the DOJ was correct in their predictions. Although the resources they provide are all highly reputable with excellent information, Working to Halt Online Abuse (WHOA), National Center for Victims of Crime, Cyber Angels and National Cybercrime Training Partnership are four organizations with incredible resources and educational tools.
cyberstalking-facts-types-of-cyberstalkers-ipredator-inc.-michael-nuccitelli-psy.d.-new-york
For those interested in furthering their knowledge base on Cyberstalkers and online predators, the International Association of Computer Investigation (IACIS) is a reputable organization. Their mission as stated at their web site is “IACIS® is an international volunteer non-profit corporation composed of law enforcement professionals dedicated to education in the field of forensic computer science. IACIS members represent Federal, State, Local and International Law Enforcement professionals. Regular IACIS members have been trained in the forensic science of seizing and processing computer systems.”
Although expert associations like the DOJ and IACIS work to apprehend online predators, the number of cyber stalkers will continue to grow and it must be the citizens themselves to learn how to reduce their potential for becoming a future victim. The cyber stalker refers to a male, female or group of people who use the internet, e-mail, or any other electronic communications device to stalk another person. Stalking is defined as a behavior wherein a person willfully and repeatedly engages in conduct directed towards another person who, if known by the victim, can cause significant concern and fear.

Cyberstalking Examples

Stalking generally involves harassing or threatening behavior that an individual or group engages in repeatedly targeting a victim(s). Cyberstalking is the same, but includes the methods of intimidation and harassment via information and communications technology. Cyberstalking consists of harassing and/or tormenting behaviors in the form of:
I. Electronic messaging such as classic emails, text messages and Twitter.
II. Spamming and/or sending threatening emails to the victim or victim’s family, friends or co-workers.
III. Posting the victim’s personal information such as name, address, phone numbers, and e-mail address online.
IV. Posting offensive comments in the victim’s name.
V. Creating and posting sexually explicit images of the victim or victim’s loved ones.
VI. Hacking into the victim’s computer, accounts and mobile devices.
VII. Subscribing the victim to pornography sites and unwanted advertising.
VIII. Attaching spyware to emails or installing it on the computer.
IX. Setting up websites that threaten the victim or encourage others to contact, harass or harm them.
X. Computer Monitoring Software, or “SpyWare,” allows a cyberstalker to monitor computer and Internet activities and discover a victim’s efforts to escape or access help. This software can be installed remotely or by physically accessing the victim’s computer.

cyberstalking-facts-types-of-cyberstalkers-ipredator-inc.-michael-nuccitelli-psy.d.-new-york

Most stalking laws in the United States require the offender(s) to make a credible threat of violence against the victim. In addition to directly threatening the victim with harm, family members who are threatened may also be grounds for arrest. Depending on state laws, the alleged stalker’s course of conduct can constitute an implied threat. The National Center for Victims of Crime is a dedicated association, which can assist locating and defining state stalking laws and how to proceed.
While some stalking and cyberstalking conduct involving annoying or bothersome behavior falls short of illegal stalking, these behaviors may be a prelude to more intense stalking and violence. The goal is to treat these actions as serious and not to minimize. Although these behaviors could be defined as harassment, the time to become proactive is when knowledge of these actions becomes apparent.
Cyberstalkers are often motivated by negative emotions or serious psychological factors. Psychiatric illness, obsession fixations, revenge, hate, anger and jealousy are common affective states fueling the cyber stalker. At times, the victim may not even know or ever met the cyberstalker indicating another red flag of alert. Once aware of any indication of harassment or stalking has been initiated, the immediate next step is contacting local authorities. Although contacting local authorities may sound overblown or drastic, the potential outcome of not doing so may be far worse.
The methods the cyberstalker engages in ranges from novice to advanced. The more advanced they are in new electronic technology, the more proficient they become at targeting their victim. One of the methods few victims are aware of used by the cyberstalker is called cyber or digital surveillance. Cyber surveillance has both positive and negative applications. In the wrong hands, cyber surveillance can be deadly.
Also called Digitally Mediated Surveillance (DMS), this advanced technology is becoming increasingly prevalent and more accessible by those seeking to secure their environment and those seeking to spy on others. Each time a person goes online, text messages, or uses anything else involving electronic communications, they produce a growing stream of personal digital data of interest to unseen others. As DMS becomes more accessible to the general population, the more careful unsuspecting victims will have to be.
A cyberstalker using cyber surveillance initially does not present a direct physical threat to his/her potential victim, but follows the victim’s online activity to gather information on their personal habits and contacts. After sufficient data is compiled, he/she begins to make threats and other forms of verbal intimidation. The anonymity provided to the cyberstalker by online interactions greatly reduces the probability of identification.

Cyberstalking and Veil of Invisibility

This veil of invisibility and low probability of identification makes Cyberstalking far more common than physical stalking. Although cyberstalking might seem relatively harmless by the younger generation or veteran online users, it can easily evolve into psychological and emotional harm. As part of the evolution of cyberstalking and victim inactivity, the veiled hidden harassment may lead to actual physical stalking and/or physical/sexual assault.

Cyberstalkers and Online Predators

Cyberstalkers and online predators target their victims via websites, chat rooms, discussion forums, message boards, blogs, email and text messaging. The availability of free email, website space and frequency of electronic communication usage provides the iPredator with a digital footprint. Having access to this information along with cyberstealth, the increase of cyberstalking in the form of harassment becomes obvious.The cyberstalker starts by quickly doing a Google or search engine search using the person’s alias, real name or email address or any other personal data. Other ways to compile personal information, which one would think innocuous, is by researching a victim’s public profile available at any social media site like Facebook, MySpace and Twitter.
Cyberstalking is a quickly growing form of computer related crime in communities across the country. Cyberstalking is when a person is followed, monitored, harassed and pursued online. Whether the victim is aware or not, their privacy is invaded, their every move is watched and their personal information is slowly compiled. Once aware the stalking is occurring, this form of harassment often disrupts the life of the victim and leaves them feeling very afraid, threatened anxious and worried.
Cyberstalking usually occurs with women stalked by men, but women at greater rates are increasingly stalking men. Present numbers estimate the gender ratio at 3-1 with women being stalked three times as much. One of the fastest growing segments of victims is children stalked by adult predators, pedophiles and their peer groups.
The obvious difference between physical stalking and cyberstalking is that the cyberstalker does not have to open his or her front door. Everything he/she does can be done online and veiled by anonymity or what this writer has termed, Cyberstealth. Cyberstealth, a concept formulated along with iPredator, is a term used to define a method and/or strategy by which iPredators are able to establish and sustain complete anonymity while they troll and stalk a target. In addition to a stratagem, Cyberstealth is a reality of ICT, which humanity often fails to fathom. Given the internet inherently affords everyone anonymity, cyberstealth used by iPredator ranges from negligible to highly complex and multi-faceted.
cyberstalking-facts-types-of-cyberstalkers-ipredator-inc.-michael-nuccitelli-psy.d.-new-york

What is Cyberstealth

The rationale for using “stealth” in the suffix of this term, serves to remind online users the primary intent fueling iPredator. This intent is to hide their identity by designing false online profiles, identities, tactics and methods to ensure their identities remain concealed reducing identification and punishment. Therefore, as the internet naturally offers all online users anonymity if they decide, iPredators actively design online profiles and diversionary tactics to remain undetected and untraceable.
Stealth: According to the Merriam-Webster dictionary, Stealth is “the act or action of proceeding furtively, secretly, or imperceptibly.” Stealth as an adjective is, “intended not to attract attention.” The American Heritage Dictionary defines Stealth as “the act of moving, proceeding or acting in a covert way and the quality or characteristic of being furtive or covert.”
Cyberstealth is a covert method by which iPredators are able to establish and sustain complete anonymity while they engage in online activities planning their next assault, investigating innovative surveillance technologies or researching the social profiles of their next target. When profiling or conducting an investigation of an iPredator, the level of cyberstealth complexity and online footprint for identification and apprehension is used.
Cyberstalkers need not have to leave their home to find and harass their targets. Having this anonymity, they have no fear of physical violence or the victim’s loved ones since they cannot be physically touched in cyberspace. They also feel confident legal intervention is not likely given their invisibility.
Essentially, Cyberstalkers have a free ticket to act and behave without repercussions. Given this cloak preventing identification, they may be thousands of miles away, as close as a neighbor or even closer being a relative. Their unknown potential, geographic whereabouts or motivations can be a chilling experience.
Cyberstalking and the online predators who engage in these behaviors are growing with every passing year. Although organizations like the Department of Justice and the National Center for Victims of Crime work diligently to educate the public, society remains ignorant to the predators lurking within cyberspace. The reasoning for the public’s refusal for educating themselves and/or children likely lies in honest denial.
cyberstalking-facts-types-of-cyberstalkers-ipredator-inc.-michael-nuccitelli-psy.d.-new-york

Cyberstalking Prevention

By not affirming these dangers are real, people do not have to be concerned or set boundaries on the information they reveal online. Cyberstalkers and iPredators rely on the public not becoming educated on the necessary steps involved to reduce their potential of becoming their next target. The steps needed for online protection and reasonable security is quite easy and straightforward. Educate yourself and loved ones on iPredator and cyberstalking profiles, set boundaries on personal information disclosed online, refrain from engaging in social exchanges with people you do not know, familiarize yourself with local laws on cyber harassment and always have local law enforcement’s contact information at hand.

Michael Nuccitelli, Psy.D.

Michael Nuccitelli, Psy.D. is a New York State licensed psychologist and certified forensic consultant. He completed his doctoral degree in Clinical Psychology in 1994 from Adler University in Chicago, Illinois. In November 2011, Dr. Nuccitelli and his colleagues established iPredator Inc. offering educational, investigation and advisory services related tocyberstalking, cyberbullying, internet predators, cybercrime & the darkside of cyberspace. In June 2013, Dr. Nuccitelli and iPredator Inc. launched this internet safety website, iPredator, and two blogs, Dark Psychology & Dr. Internet Safety. These sites offer online users an incredible amount of information, education and advisory services. Since 1985, Dr. Nuccitelli has worked in behavioral healthcare in a variety of capacities with various clinical populations.
cyberstalking-facts-types-of-cyberstalkers-ipredator-inc.-michael-nuccitelli-psy.d.-new-york

iPredator Inc.

iPredator Inc. is a New York State based Internet Safety Company founded in September 2011 to provide educational and advisory products & services to online users and organizations. Their areas of expertise include cyberbullying, cyberstalking, cybercrime,internet defamation, cyber terrorism, online predation, internet addiction and the new fields they are pioneering called Cybercriminal Psychology & Profiling. Created by a NYS licensed psychologist and certified forensic consultant, Michael Nuccitelli Psy.D., their goal is to reduce victimization, theft and disparagement from online assailants.
Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with online users and media. In addition to their professional services, Dr. Nuccitelli has authored a variety of internet safety tools, cyber attack risk assessments and diagnostic tests available to purchase as hard copy PDF files.
Although iPredator Inc. has joined a multitude of social networking sites, feel free to visit the social sites listed below they use as their information and announcement vehicles. Dr. Nuccitelli and iPredator Inc. consultants are always available, at no cost, to interact with academia, law enforcement, legal professionals and the media.
If you have questions, feel free to call iPredator Inc. anytime at (347) 871-2416 in New York or by sending correspondence using this website’s contact page by clicking on this link: Contact Us Dr. Nuccitelli or an iPredator Inc. associate return all contacts within 24 hours.
“The Information Age technocentric concept of being “connected” is a paradox of disconnection causing us to lose control of our instinctual drives for social cohesion, allegiance and selflessness. As our dependency upon Information and Communications Technology (ICT) grows, spreading throughout our collective human consciousness, the less we care for our neighbors and the more we delude ourselves into thinking that online connections are far more valuable than reality based relationships.” Michael Nuccitelli, Psy.D. (2014)

Monday 14 December 2015

Pit Bulls "What You Would Destroy?"

Posted Sunday, December 13, 2015, at 11:52 AM
(Photo)
Baby Emma & her remarkable ears.
Part 1: Emma

The past couple of weeks have been one of showing just how nasty the Haters of the American Pit Bull Terrier can be and they have demonstrated they have no qualms about killing every representative of the breed including the "pit bull types". (Doesn't matter if they do not have even a drop of Pit Bull blood, they have large heads, close coats and are muscular)

This week I begin a new series in the hopes of showing why I am not going to back down and just what this fight means to me personally. You see I am not a representative of any group, I am not dependent on the good will of anyone but the collateral damage the Haters, including the animal rights groups who fit so well under the same heading, are out to destroy live right under my roof.

Since 1979 I have had some remarkable dogs. I could share weeks of tales show casing a diversity of personalities and abilities which would astound you. In this case I am only going to focus on my three current dogs. I do not expect to change the minds of those incapable of forming their own thoughts.

Experience has taught me those who insist on having their positions fed to them rarely wake up and become free thinkers. We all know those who allow themselves to be programmed and who never waiver until the next position is issued. This is merely a series to share part of my motivation. The sheep are nothing but blind followers and will never understand unless their handler tells them something new.

Emma, a.k.a. Queen of the Universe, came to me from a seizure in the south part of Cape Girardeau in 2008. She was sick, neglected and had little to look forward other than becoming another death statistic. She spent the first two weeks of freedom at a local veterinary clinic. We met when I came into the rescuing shelter to do an evaluation on another dog. While I was hunkered down with the dog across the run, I began to "feel the eyes upon me". When I turned I got my first glimpse of "her highness" sitting very primly, wagging her tail and letting me know her bags were packed and she was ready to go...with me.

The first thing you notice when meeting Emma is she is a very pretty girl. She is obviously female because she is prissy and she carries herself with confidence bordering on snobbishness. Then you notice her ears. When she was a puppy I assumed she would grow into them. I swear they were the same size then as they are now.

Her ears were so big a friend of mine actually offered to pay to have them cropped. Being one who leaves the Terrier ears natural that was not an option and since she seemed quite proud of them, they remained intact. They are still to this day a noticeable feature on an otherwise over the top feminine dog.

The assumption she would be leaving the shelter with me was well founded. One dog went to rescue one dog went to her forever home. In the case of Emma, she rolled in and immediately began issuing orders to the resident male, my last show dog Ricky. He was a go with the flow kind of guy so following her rules was simple especially when someone the size of a small rat with Dumbo ears explained it in such graphic terms. Our journey together began and I can honestly say it has never been boring.

Those who have known Emma since her seizure days are quick to point out no one else could have lived with her but me. For some reason they think our personalities are the same. I do point out here for the record I have never been prissy a day in my life.

This is a dog that thrives on showing off. After her first obedience class she had to be carried to the car because she did not feel class should be over. She was six months old; this set the tone of all things to come. She presents beautifully because anything less would be unthinkable for royalty.

She does not believe in getting dirty except in the case of spending time with the horse which dictates one must have at least a little smelly green goo behind ear huge ear. Rain is not to be tolerated. She considers it my duty to insure weather, hot, cold or wet, is always optimal for her comfort. She takes it personally when I cannot address the matter immediately.

This is also a dog who loves to be outside. Her trips to the river whether by kayak or motor boat are gratifying and she is an exceptional boater, except for the getting wet thing. In her mind you should always insure she can disembark without getting her feet wet. She will wade into water up to her ankles but not further. In the matter of chasing sticks and retrieving, she lets the rabble swim out to get them then she takes them away to return to the thrower.

One of her most amazing qualities is the ability to dig a hole large enough to bury livestock in record time. When she has sand to dig in, it is not unthinkable you could have a straight shot to China as the old adage goes. Apparently sand and dirt under her nails does not fall into the category of getting dirty.

Emma is also one of the most amazing teachers of the refugee dogs who have come through our door over the past several years. She is always the one I must consider first when taking on fosters. Knowing your dog and careful consideration of the dog coming in is key. I have stated multiple times I never set my dogs up to fail.

 Emma's sense of pack order is exceptional. She has accepted numerous dogs over the years and all have left knowing pack manners. She does not have to be nasty or ugly about it, she simply knows how things should be and that is how they are. It also helps to be able to roll your entire face up to show an impressive set of teeth.

 She never makes a sound and she has never gone off on a dog. The only one to have different ideas of how things should run was Mavis the Jack Russell who also considered herself royalty. After dislodging her from Emma's shoulder we all agreed Mavis did not take up that much room and she could also rule as royalty during her stay.

In the matter of Emma not making any sound, she is true to her breed in the fact that she is not vocal. In all the years we have been together I have maybe heard her bark a dozen times. This can be attested to by those who have spent time with her on the Schutzhund and tracking field. She will not alert to save her life. She also does not bark at the door. If you watch her it is a bit like she is pointing to let you know something is up.

This non-vocalization holds true except in the case of her appearance as Sandy in the university production of Annie.

My original plan when I contracted with them to provide the dog was one of the Puppies for Parole graduates. He was visually perfect but sadly he did not have the temperament to stand up to the rigors of the theater. He did a full melt down on me with two rehearsals left to go. I had to provide a dog and the only one I had to fill the role on such short notice was Emma.

The original plan was to dye her brown to at least have some resemblance to the description of Sandy. The first rehearsal when she rolled out under the lights, that idea was scrapped. She was breath taking.

It was decided theatrical license would be exercised and my white patch female Pit Bull would take the role in her natural state. Yes even the cast chuckled over the line when the officer asks Annie what her dog's name is because when she answers Sandy the following line is "oh I can see that because of the color". Theatrical license also dictated the line would not be changed.

Back to the non-vocal point of this tale; Emma, my beautiful girl who rarely makes a sound decided during the Friday evening production, which was the president's fund raiser with every dignitary in the university present, sat down beside Annie and turned the song Tomorrow into a duet. She did this with every ounce of class and dignity she possessed.

There was not a doggone thing I could do about it but let her sing. At the end of the production the walk on part of the judge who granted Annie's adoption was held by my State Senator Wayne Wallingford. He left the stage while I was standing back stage to send Emma in for her final appearance and was laughing because he just knew she must belong to me.

One aspect of Emma's theatrical career was her final scene when she was presented to Annie by Daddy Warbucks. The costumer came in during the first rehearsal and asked if she would tolerate having a giant red bow tied to her? Mind, the prissy little diva lives to wear bling.

Her only problem with the bow was she could not keep it. She had to appear at the end of the final production which was a matinee without the bow during her photo op which lasted more than an hour.
Those who have attacked me as not being an animal lover or having any care of the dangers presented by a breed they have had limited exposure to will not understand the import of what I am trying to share in regards to the oldest member of my present pack.

This is a dog who possesses the poise and confidence to appear in front of four sold out houses, who can sit for more than an hour having her picture taken with individuals ranging in age from small children to senior citizens, who can accept refugees coming into her territory as just the way things are and who exhibits more class than most people.

This is what you would destroy without hesitation. This is what you would destroy all the while cloaking yourself behind your blind stupidity and hate.

This is the first of the reasons I will fight the devil himself which is what the Haters and the animal rights groups represent to me. You blind many with your hate mongering, death peddling ways. I pray you are once and for all driven from Missouri and find no quarter in any other state.

http://www.kfvs12.com/story/8433298/nine...