Get Adobe Flash player


Fraud Prevention through payments with QR code.


Fraud Prevention through payments with QR code.

As is known code QR as a means of payment is a fact. Today through the cell, it can read and pay instantly at any retail, the supermarket, Taxi service stations.

In Argentina, already they operate more than one million people and from the central bank He established that in stores next two years to implement it will be released to accept credit cards, QR therefore be charged for an equivalent means of payment.

But since the emergence of this methodology payments via QR code has opened a way for owners is the brainstorm to gossiping to commit fraud hereby.

From the Argentina Association to Fight Cybercrime, we recommend traders to make sure your QR Code exposed / not promoted this accessible to criminals. Have to hand over their counters this QR code so that customers make payment for your purchase through scanning from cell would risk because it could be exchanged for the QR Code fraudulent without the merchant finds out immediately. And your next sales stop fence money to another account.

A practical case would have it under the counter and just present it to the customer at the time of charging operation, or place it in a place that is not easily interchangeable, places where their Stickers, Adhesives are not replaced by owner neglect trading.

Always check after selling at online account movements if the money is credited correctly.

Many traders only check the result of the operation in the cell, When a client is scanning your QR code places the amount and then gives OK and seller looking at cell seeing green that the operation was successful, but at the same time to check the account movements within the surprise that has accredited the last time charges via QR takes.

We have also seen advertising signage on public roads of different types of NGOs where you can donate money just by scanning the QR, but this code is easily replaceable.

The advice to those who use this method to make a payment is to take precautions when you scan the QR code and before accepting to verify data store where payment is being made.

And mii advice to companies that have created this wonderful method of payment, It is to implement a second method validation, for both the merchant where for example the customer has to type the number of cuit, ID card number or trade and thus entrecruzaría data between the QR code and commercial real data, and to the client using the Face ID to validate the identity of the holder of the account from which the payment will be made, and so safely approve the operation immediately.

Thus avoid economic losses to the merchant and customer headache ensuring a process between both parties.

If you were a victim of a cybercrime or think you might be please contact us, privately, and confidential try to assist.

Note: Miguel Angel Quevedo,

digital revolution: recent changes 20 years old.

by Lucas Vazquez Topssian.
The beginning of 2019 He came with the proposal of # 10yearchallenge, in which the user had to share on social networks two photographs: one from 2009 and one of 2019. Those who participated in the challenge they realized how he had changed his appearance, and one might wonder what else has changed since then. We live every day without noticing small changes that accumulate and make our life and -of course- our profession.
Today's proposal is a journey through the past 20 Internet years. There is no reason for that number and definitely has nothing to do with the beginning of the digital revolution, Which is situated 10 years earlier, from the fall of the Berlin Wall in 1989. let say, simply, since that event, the walls have not stopped falling and we can put Internet as a decanting of this whole phenomenon.
Let us begin by year 1999. We are exactly 4 years after Microsoft integrated into your Windows 95 a Internet Explorer. Since those years has been popularizing the possibility of sailing the network and writing Web addresses. Of course, a window of time, because the tabs do not appear until a few years.
Lets go shopping? In 1999 more and more people are buying was encouraging for Amazon, spinoff ago 4 years old, and gradually a great novelty was imposed: e-commerce. The emergence of Amazon was the prelude virtual trade in which we live now. Among the items for sale, We found a year ago the first digital cameras, ¡Of a megapixel!. It was low-resolution cameras, dedicated to the general public.
In 1999 We also had the free Hotmail, thrown out 2 years earlier. This technology already existed in the emerging network of the '60s. In the '70s he had invented the arroba (@) to separate the domain that hosts user posts. In addition to Hotmail accounts they were free, users do not need to have a domain to send messages. Millions of users registered, massifying communication. further, this year Microsoft launched MSN Messenger, I quickly began to undermine the market for ICQ, ceding leadership.
In 1999 Google met just a year since its launch. It is a system created by two students from the U. Stanford, Larry Page Sergey Brin are, which analyzes the links that connect Internet sites to find information more effectively. Hereinafter, Google will position, for its simplicity and usefulness, as the most successful Internet search engine.
Finally, in 1999 see crea Napster, the first network free P2P file sharing. Although Napster lasted only 2 years old, his influence was decisive to radically change the music industry, victim of piracy, and plunge into a crisis that lasted more than 20 years old.
Happy New Year 2000! Mankind survived the Y2K, although we regret that 2 states of Australia sorting machines bus tickets may not work on 1 January. But not everything was disaster: This year we have the first mobile phone to integrate a camera, by the Japanese company Sharp and J-Phone. This camera phone can take pictures with a resolution of 0.1 megapixel camera for display 256 colors. Other company, Sanyo, exports to the United States this novelty. This year, is released the Playstation 2 (game console).
In the year 2001 It came to light Wikipedia, a virtual encyclopedia that daily feeds and corrects the contributions of its users. Born the "wikis", Community model content creation. The information goes beyond the elite of publishers and encyclopedias, but in turn it is subject to vandalism and content error and reference.
From the year 2003, It began the phenomenon of social networks: Fotolog (2003), MySpace (2003), Facebook (2004) and LinkedIn (2006) and the new communication system with short messages, Twitter (2006). All these platforms allow you to create profiles with personal information, Photos, videos, links, tastes and even applications. Social relations are gradually reacomodarán this new agora and with them various forms of harassment will also be updated: It appears cyberbullying, el grooming (pedophilia) and sexual harassment by adult images.
In 2004, Firefox appeared, Mozilla browser featuring a novelty: Tabbed browsing.
Youtube appeared on the 2005 and a year later it bought by Google. Fueled by speed broadband, it reaches the rise of Internet video. progressively, this platform was gaining ground omnipotent and unidirectional television. Young people born in this era prefer Youtube, that allows interaction and comments, leaving the second TV. Fame also undergoes a change: celebrities democratically elect like hearing, as cases of Justin Bieber and Lana Del Rey.
Also in 2005 Google Earth was created, a map with high-resolution satellite imagery. Entering the name of a place, You can get the exact address, a plane view of the place or.
The first iPhone in January apareió 2007. It was a pure phone screen and no buttons, which it was a real revolution for the time. 3G connection also appears for mobile massively during that year, big difference as compared to the previous technology. With the advent of the Internet to mobile, He started the smartphone era.
In 2008 Chrome appeared, Google search, it quickly crowned as king of the browsers, until today.
In the middle of 2009 IPLAN company began offering FTTH to individual customers in Argentina, in response to the demand for new solutions for users, whose habits had changed uses. Fiber connections or FTTH allowed us to use a more demanding Internet thanks to higher speeds. This enabled members of a family could be connected to the Internet simultaneously, either through online games, would look, etc.
Year 2009 It was also when turned massive georeferencing. This meant that the dynamics of social networks are increased by the interaction based on the geographical location where the user is. One example is Google Foursquare.
The tablet concept already existed in fiction: Star Trek series in the years 60, you could see his characters using them. In 2010, the company Apple introduced the iPad (tablet), which reached commercial success. From this date, various electronic equipment manufacturers have dabbled in producing this type of technology. The tablets are laptops, They have touchscreen, and you can find them in different sizes. This year two key operating systems were also developed and functional: Apple y Android, featured world until today.
Year 2011 it was estimated that there 2.100 million Internet users worldwide. The next year, the estimation of users increased to 2.400 millions. In 2011, Latin America and the Caribbean achieved the highest sales in the history of BlackBerry phones, whose popularity was due to its BlackBerry Messenger application (BBM), instant messaging system.
The culture of courtship and dating Cambo with the appearance of Tinder in the 2012. It is a geo-social application that allows users to communicate with others based on segmenting their preferences to chat and make appointments or meetings. Uses GPS and cell from a simple swipe of a finger on the screen, You can accept or reject the meeting with a potential partner.
2012 They also brought Glass, Google launching of glasses that created the first augmented reality marketed.
As for what augmented reality refers, in 2016 Niantic lanza Pokémon Go, a set of mobile RA reaching an unprecedented success in the genre. To play, you have to physically navigate the streets, where pokemon are, and interact with other players.
During the 2016 drones, arising from the military field, They invaded the market. It is unmanned aerial vehicles that currently manage to avoid obstacles and track and photograph people intelligently, animals or objects. During the 2018 in Argentina, the National Civil Aviation Administration (ANAC) it must launch a publicity campaign to remember where you can (and where no) flying drones.
The boom of smart speakers (smart speakers) He was in the 2017. These wireless speakers and voice command with an integrated virtual assistant that offers interactive activities and hands-free activation with the help of keywords (not. “Hey Google” para Google Home). In addition to audio playback, It allows automated control household devices (thermostats, TVs, Intelligent light bulbs).
Of course, This list is incomplete historical data and the reader will surely account for other milestones that allow you to think about the subjectivity of this time. The aim of this collection is none other than placing small changes with big effects, often categorized in terms of progress. We know that neither Freud nor Lacan were progressive, and both lead us to ask what is lost every time we win. Lacan said so: “No progress; what is gained on one side it is lost on the other, and as it is not known what was lost is believed to have been won”.
Lic. Lucas Vazquez Topssian

psychologist M.N. 60.896
Director of the Department. psychology of AALCC

The AALCC does no sponsorship only the victim provides guidance and recommendations for the preservation of evidence

We inform the Permanent Council of the Organization of American States (OAS) approved, at its meeting 20 March 2019, the application of the Argentina Association against cybercrime to be part of civil society organizations registered with the OAS, in accordance with the Guidelines adopted by resolution CP / RES. 759 , designating Dr al. Diego Migliorisi as representative of the AALCC to such international entindad.


Dr. Diego Migliorisi junto a la Lic Catherine Pognat ,realaciones head of civil society in OAS


Security forces Pehuajó, Energetic, Carlos Casares, Carlos Tejedor, Hipolito Yrigoyen and Trenque Lauquen, among other districts, They participated in this oriented in the data recovery technique of mobile devices and the impact this has on research training.Working dayMarcelo Romero, Auxiliary Corps of Judicial Investigations of the Autonomous City of Buenos Aires and member of the Argentina Association to Fight Cybercrime, He led the theoretical and practical workshop on "Computer Forensics". The conference was organized by the Commissioner for Women and the Family of Carlos Casares, and he counted on the support of the Senate of the province of Buenos Aires.
Throughout the activity deepened notions as the tools used in mobile expertise, the basics of computer forensics test, backup and encryption devices, among other topics.

Training instance main objective was to provide knowledge for data recovery mobile devices, even when failures have different types.

Senator provincial Felicitas Beccar Varela, who he conducted negotiations to be carried out this workshop, he stated: "Tell us and train us is the best way to react to the new offenses, to provide an answer and give greater security to bonaerenses ".

2019 You will bring new crimes

Marcelo Romero "trainings are not only important to be at the forefront of the latest coming out in technology applied to criminal investigation but also good training for personnel strength. Staff need this type of training because their workplaces automates ".

"Besides incorporating digital tools makes us in our daily work kit one more tool to help people", express.

Regarding crimes, Romero explained: "The 2019 You will bring new crimes, They are mostly old crimes mutated to digital space and that makes it a new crime that we are not used to seeing. So, if law enforcement are not used to seeing this type of crime victims grow, mode becomes very profitable and that makes you start to increase the amount of imitators, criminals imitators, to start using the new "ruling", put it in some way and there we have a problem. If you add this to the lack of training or lack of knowledge that staff or can have staff in this area it makes it a breeding ground for many victims there really ".

"This year will emphasize the training that new forms of crime are beginning to investigate as soon depart, to deliver tools to law enforcement so they can make the persecution and prosecution of this crime and perform well as prevention ", Romero finished.

WhatsApp Image 2019-01-25 at 10.04.19


Marcelo Romero gave a training to students of the University of National Defense . The AALCC continues to collaborate with civil society and the different powers of the state to achieve a fairer Argentina .

All members of the AALCC working pro bono being an institution of the country and the region working with ZERO budget because it does not accept or receive subsidies or private or public entities.


If an e-mail threatening majoring password.


It is reported about a recent form of phishing using an e-mail with susceptible threat of public interest, from a case dealt with by the Department of Psychology of the AALCC.


Young P. It communicates denouncing the association received the following mail in English in your spam box of your Gmail account, mail opened 10 days after it was sent.


It seems that, (Cablevision password), is your pass word. You do not know me and you are probably thinking why you are getting this mail, correct?

Well, I actually placed a malware on the adult video clips (porn) web-site and guess what, you visited this site to have fun (you know what I mean). While you were watching videos, your browser started operating as a RDP (Remote control Desktop) that has a keylogger which gave me access to your display and also web camera. Immediately after that, my software program collected your entire contacts from your Messenger, FB, and email.

What exactly did I do?

I created a double-screen video. First part displays the video you were viewing (you have a nice taste lol), and second part displays the recording of your web camera.

What should you do?

Well, in my opinion, $1900 is a fair price for our little secret. You’ll make the payment through Bitcoin (if you do not know this, search “how to buy bitcoin” in Google).

BTC Address: 1MQNUSnquwPM9eQgs7KtjDcQZBfaW7iVge

(It is cAsE sensitive, so copy and paste it)

P. reports, with shame, You have actually visited a page featuring pornography, masturbating in front of the screen and fears it has been filmed by the front camera of your notebook, such as mail says English. She says she is distressed at the prospect of being exposed to their relatives. P. mail content facilitates the association and explains what is phishing, leaving the channel arranged to your attention any concerns.



  1. It has been found that from July 2018 It has begun to circulate this mail between English speakers and that it has been received by people who were involved in the activities that the e-mail describes.

  2. The mention of one of the passwords of the victim appeared to function as proof of veracity of the facts below describes the mail.

  3. The mail then describes indeed a very common and frequent occurrence, although socially repressed: masturbation by consuming pornography on the Internet. It exploits the tendency for different devices have a front camera.

  4. The mail attempts to be credible appealing to what the victim knows. "I put malware on the website of adult videos (porno) and guess what, visited this site for fun (and you know what I mean)", "You have very good taste, LOL (laughing out loud)". We see what page is not mentioned, what kind of sexual content or that way of satisfaction is, but the "you know what I mean" superego functions as a mirror of what the victim does not want to talk.

  5. Affections involved are to blame and that have to do with self-esteem (as shame), that materialize in the threat of exposure if it is not paid.

This gallery contains 1 photo.

The presentation, Lawmakers convened by Hernan Reyes and Ariel Alvarez Palma authors project that incorporates the Offenses Code of the City of identity theft , Illegitimate cyberbullying and publication of intimate images Pte took place in the living room. Alfonsin . They also participated Drs. Diego Migliorisi , Luis Nocera , the epecialista Marcelo Romero , Justice Undersecretary of the city and officials of Public Prosecutions.



Crimes on the web, the crimes of the century-


With broad participation of professionals, journalists and the general public, The meeting highlighted the uses and abuses in the handling of data in public administration, and a clear picture of the types of crime on the web and the risks we incur when citizens have a cell, a computer or a simple game console, It is the first municipality to take this issue to generate collective consciousness.



With the presence of outstanding professionals in the subject as doctors and Diego Luis Nocera Migliorisi, hand National Congresswoman Gabriela Burgos and with the support of the Municipality of San Salvador de Jujuy with the figure of Agustina Apaza, Secretary of Finance, crimes carried out the first training on Ciber intended for public administration staff, healthcare professionals, The education, the media and the wider community.




Diego Migliorisi -Luis Nocera – Gabriela Burgos


In this ambit, Agustina Apaza, welcomed the initiative of the national representative, Gabriela Burgos "cybercrimes often talked about in the third person. We forget that we are all exposed, either from our workplace as well as personally. This talk highlighted the uses, abuses and risks in data management in public administration, as well as a broad overview of the existing legal regulations and legal "

This problem has been addressed at the national level so far this year, He remarked Congresswoman Gabriela Burgos, waiting for clear progress "today we must be aware and know what we're talking about when we touch the subject of web and cybercrimes. Knowing the risks and consequences when executing actions. While it may sound harsh, the web does not forget or erase, all our actions are recorded and can bring irreparable consequences for us or harm to others, recognizing that teenagers and children are the most vulnerable public "

In the lectures, Dr Migliorsi much el como el Dr. Nocera, through real examples they demonstrated how the simple use of a cell in the wrong way and leaves us exposed to different threats. WiFi without proper monitoring or bluetooth activated in situations that warrant no longer makes us vulnerable, where our information, our data, and consequently our privacy are the crime scene.

"We must realize from homes and be responsible with games of our children," remarked Dr.. Nocera, They explaining the actions of those who are "attentive to act", Entering from a simple game to play or activating cellular litter or computer while a child is playing with her.

Through horrifying statistics that put Argentina as the 5th largest consumer of child pornography and within the first produce, from different areas is paramount information, education and real awareness.

"We talk about heinous crimes committed through the web, such as child sexual abuse, the issue of human trafficking, own crimes Site (bullying , sexting, among others) so a wide panorama opens on these new criminal actions taken ", Burgos said the congresswoman, remarking that there are cases where justice had to change the identity of some people to move on with their lives, and other, It was reached extreme cases as suicide, "We talk about crimes that can change our lives and threatening them".


"Report is the first step"


Specialists advised parents on the subject. The first is to try to be present, talking to children, never challenge them, since the child / a containment should feel your family to tell what happened. Confidence in the main engine along with containment and support to make the complaint, where the person "feels exposed, and even violated responsible "

Another point is "Do not delete anything", take screen shots as possible, copy https, guard photos, chat and videos that will serve time research.



The board of the AALCC , were received in the Ministry of National Security by the holder of that portfolio the Pull. Patricia Bullrich.

At the meeting we discussed the issue of crimes configured through computer media we raised various proposals were under consideration by the officials. As part of the meeting which was attended by Drs Luis Nocera , Diego Migliorisi and Marcelo Romero highlighted the important work of the minister and his cabinet in significant advances in the fight against organized crime , Drug trafficking and cyber crime.


The president of the Criminal Law Committee deputy Gabriela Burgos and deputies Lopardo, Libermann and Albornoz Schmidt presented a bill that incorporates the figure of the undercover agent online .

With the addition of this figure will be achieved clarify that thousands every year go unpunished cases configured through fake profiles, anonymous or criminal organizations that use software tools for not detected.


This initiative arises from the need to provide more tools to justice when investigating crimes related to organized crime. In our country the Argentina Association to Fight Cybercrime (AALCC) It is one of organizations working the issue and who have raised concerns us to contemplate a change in our legislation that provides a concrete response to the constant evolution of the realization of this type of crime.
As we know the new technologies of information and communication have led to the birth of new instruments of attack through these means, becoming more frequent commit crimes perpetrated by the use of Internet.
It is a fact that millions of people use Internet, because among other things, It facilitates communications between individuals providing various benefits, but it is also true that the network facilitates the commission of crimes in cyberspace that otherwise would not have been committed to the possibility for cybercriminals to adopt another identity to approach their victims through online services, or through social networks.
Examples of the influence networks can appreciate daily, he 18 April this year has been dismantled in Spain an international child pornography network composed by WhatsApp users 18 European countries, Central and South America where it was captured and detained in Colombia for more than thirty people involved in this transnational crime. The investigation remains open in our country.
Cases like this challenge us to modify existing laws and leads to the permanent development of our criminal justice system, which it requires a parallel evolution to that experienced by the criminal activity to respond to new security demands raised by the society in which we live.
That is why the use of technology by the state is currently serving a dual role in relation to criminal proceedings: on the one hand it allows refining the analysis means for research and testing offering more reliable results, and on the other, allows the prosecution of those crimes directly connected with technology, growing number.
Spain for example already advanced in this subject and in its new regulation of the Criminal Procedure Act, in the article 282 to, contemplates the figure of computer undercover agent for investigations affecting own activities of organized crime, where the competent judge and Prosecutions, They may authorize officers of the judicial police, and taking into account their need for the purposes of research, to act under a false identity and to acquire and transport objects, effects and instruments of crime and defer the seizure of the same.
This project seeks to incorporate the figure of computer undercover agent to the current law 27.319 in order to provide a new tool to justice to those obstacles found when investigating these crimes. The figure of the undercover agent and is regulated in our legislation, This project aims to give greater scope and specificity while maintaining the provisions of the Act.
For these reasons it is that I apply to my peers approval of this bill. = 2714-D-2017

The team of AALCC stated in the Criminal Law Committee of the Chamber of Deputies on the importance of sanctioning projects “tenure child pornography ” Illegitimate publishing pictures – ponovenganza-” that obtained unanimous opinion with the support of all the blocks.

On the day that also positively addressed the law limiting the Prisoner releases and street harassment , Were present Drs. Diego Migliorisi , Marcelo Romero on behalf of the AALCC and recognized members of the Committee members as its president, Dr. Gabriela Burgos ,Marcelo Wechsler ( drivers of any of these projects ), Luis Petri , Diana Conti, Victoria Donda among others .

Luis Petri-Gabriela Burgos-Diego-Migliorisi Marcelo Romero


The Directorate of the Department of Psychology of the AALCC provides counseling for adults, couples and families victims of cybercrime, as well as professionals who work with this problem.

Envíe un mail a, to request and coordinate consultation totally free.

Frequent questions:

1) Should I pay something for orientation?

No. The Argentina Association to Fight Cybercrime is a non-profit, which opens the doors to the community to prevent and address related to cybercrime cases.

2) I live far from the headquarters of the AALCC, How I can check?


You can make Skype consultation, mode often chosen by their ability to shorten the distance. Sending an email to the address listed above, You can coordinate the meeting this way for a day and a specific time.

3) Why should consult cases?

Although each situation is unique and no two cases are alike, most of the queries can be grouped into the following groups:

computer harassment: It is a sustained assault in time, in which a person or group of persons is attacked through digital media, by insults, threats, disclosure of intimate or false information, among other form. It has names and characteristics depending on the area where it occurs. cyberbullying, common among adolescents, It occurs in education. At work, It appears in the form of mobbing. There may also be computer harassment in the intimacy of a couple.

Grooming: New technologies have updated old problem. Grooming involves those actions taken by an adult in order to gain the trust of a child and later to sexually abuse him. It is an extremely delicate situation that must be addressed without losing time.

Assist parents: Often parents feel worried and / or overwhelmed by the behavior of their children on the net. How to discuss certain issues with them? What are the risks? Primary prevention is extremely important, because it is one that seeks to prevent future damage.

Assistance to teachers and schools: Computer harassment, in the form of cyberbullying, It has positioned itself as one of the main problems in education of middle school. The AALCC offers talks, activities with students and / or teachers who think and act to allow this problem.

other causes: anxiety and stress caused by ICTs, interpersonal problems caused by social networks, compulsive behaviors, etc.

4) I am involved / a in a computer crime for which I am ashamed / modesty talk.

Often difficult to talk about certain topics, especially those having to do with intimate aspects of private life or. The problem is that by remaining silent and isolated, the victim ends up favoring the impunity of the aggressor. You must understand that you are not alone / a and that the aim of AALCC professionals is not to judge, but provide guidance to the victim. AALCC professionals are constantly trained and observe ethical standards, as professional secrecy and the protection of personal data.

5) What I benefit a psychological orientation of the AALCC?

The immediate benefit is to be heard, which it is not just in situations of distress related to cybercrime. Although no treatment is a way of psychotherapy, the counseling can help the victim realizes what behaviors encourage or stop the actions of her attacker and thinking strategies that can mitigate or prevent damage.

We received the deputy Gabriela Burgos , president of the Criminal Law Committee. We talked about the projects to be discussed in committee this year concerning offenses that are configured through Internet and malicious behavior is not classified as “Pornovenganza” , “Ciberbullying” , ” Digital identity theft” , ” possession and collection of child pornography” , among other projects .


The Office of the City and the Argentina Association to Fight Cybercrime signed 27 October a framework of mutual collaboration agreement with a view to optimize the work of preventing and eradicating crimes committed via the Internet.

Under the agreement, both parties undertake to carry out joint activities, share information and undertake projects in education and training. As agreed, the first activity held in conjunction the Office of the City and the Argentina Association to Fight Cybercrime is training in public and private schools in the city of Buenos Aires, to raise awareness and warn students of the dangers that exist when surfing the Web.

The agreement was signed by the Attorney General of the City, Luis Cevasco and the President of the Argentina Association to Fight Cybercrime, Luis Angel Nocera at the headquarters of the Attorney General, Paseo Colón 1333. Corps Director of Judicial Investigations were also present, Enrique del Carril, the Judicial Department of the Liaison Office of the Attorney General, María Eugenia Capuccheti, and the founder of the Argentina Association for the Fight against Cybercrime member, Daniel Giller, among other officials.


In the Argentina Association Against Cybercrime a commission of legal analysis and inicativas parliamentary work. During the 2016 important bills were presented at the initiative of the AALCC , certainly – if approved- It would be fundamental advance in the fight against impunity and crime.

Since the AALCC believe that violence, injustice and fight against impunity has no flag and silence and / or loopholes only victims harvest.

The projects presented in March period 2016 and October 2016 son :

  • Incoporpoar the Criminal Code collection of child pornography
  • Incorporate the Criminal Code harassment , harassment and humiliating treatment .
  • Penal Code incorporate digital identity theft (fake profiles)
  • Incorporate the Criminal Code Illegitimate publication of intimate images (pornovenganza)
  • Argentina incorporate into legislation the right to oblivion.

Bills in Congress

Dr Luis Angel Nocera represented the AALCC in the days of freedom of expression and internet in the Chamber of Deputies of the Nation , invited by Deputy Karina Banfi, vice president of the commission of free speech in the Chamber of Deputies

Since the AALCC believe that freedom of expression in all its forms must be respected and protected . However the judiciary is responsible for establishing the limits of her or his abuse.

The violence , The agression , humiliation , instigation has nothing to do with free speech .

Karina Banfi Congresswoman , vice president of the commission of freedom of expression of the Chamber of Deputies of the Nation.

Karina Banfi Congresswoman , vice president of the commission of freedom of expression of the Chamber of Deputies of the Nation.

The doctor. Martin Ocampo received executives of the AALCC . the current problematic issues of crimes configured via the Internet and various proposals to collaborate in the fight against crime were treated.

The current minister , in its passage by the Public Prosecutor as a federal prosecutor of the City, He has shown great commitment in the fight against cibercriminidad .

Ministry of Security and Justice City

For the purpose of collaborating in the fight against discrimination, Xenophobia , gender violence ,Homophobia and apologia Internet crime, Monday 5 September we received the Dr. Brian Schapira Under Secretary of Human Rights of the Nation.



Investigadores Kaspersky Lab reported that recently found a new piece of Android malware with sophisticated design to steal banking credentials of a user. The malware is similar to other schemes that have been before to the extent that intelligently uses phishing attacks designed to trick users in order to send your ID and password bank.


Most worrisome is that the malware is able to intercept, delete and forward text messages even banking institutions. The danger is twofold run: first, some banks send users an alert or notification when suspicious activity is detected bank, if the malware can delete such messages, users remain oblivious to the fact that your account may have been compromised; in second, some banks have security protocols that require user authentication for certain transactions or unusual banking via SMS. The report notes that “malware can counteract mobile security solutions that are popular in Russia to complete the processes.”

Kaspersky added that malware spreads through network advertising Google AdSense:

This morning we met a gratuitous act of violence against Android users. Just watch your favorite news sites during your morning coffee, they may end up downloading last-browser-update.apk, a banking Trojan detected by Kaspersky Lab as Trojan-Banker.AndroidOS.Svpeng.q. Are you there, minding your own business, reading the news and BOOM! There are no additional clicks or following links necessary. And be careful, Still out there! It turns out that the malicious program is downloaded through the Google advertising network AdSense. It is advised that many sites use this network (not only news sites) to display advertising to users. The Trojan is downloaded as soon as you visit a page with the announcement.

Importantly, Kaspersky said the malware, for now, only it appears for users in Russia. The problem was solved quickly and Google reports that there is no indication that the problem will affect more than one website.

Source: Yahoo JH

The offenses referred mettataging, typosquotting and cyberquatting are willful misconduct ( besides the computer fraud) that affect more professional, Business , businesses or trademark owners , causing significant economic loss and information . It is establishing a working committee convened by the AALCC by its president Dr Luis Angel Nocera and Secretary General Dr. Jorge Cosenza began working on alternatives to resolving this type of conflict . Soon we will provide a full report on the subject.

These crimes are related to the diversion of customers and / or traffic through publications and / or misleading actuations. The registration of existing brands or very similiar domains existing brands.

These registrations can also lead to other crimes set as .

Remember that the AALCC advises and assists for free also companies , professionals and independent traders.


Luis Nocera . Jorge Cosenza

Luis Nocera . Jorge Cosenza

jorge Consentia

Dr Luis Angel Nocera

According to a study by Kaspersky Lab and B2B International in 2015, from over 5.500 IT specialists 26 countries of the world, he 48% companies recognize the serious threat posed by the cryptomalware that, it is estimated, It has infected more than 234.000 computers.
The global picture of cyber threats continues to grow and cybercriminals have discovered that malicious data encryption, followed by a ransom demand, It can be very profitable. Many companies admit that often pay that ransom.

Businesses are a tempting target for these attacks for ransom. No matter if the size of the company is very small or large, the cryptomalware find a way in if you do not have to lock safety. Like other forms of malware, It is introduced into a network through emails, malicious attachments or links on a web page unsuspecting employees affected open, down or click on them. There are no signs that put users on notice that they have been infected until they get the ransom demand.

Regarding Latin America, the most affected countries, ranked by penetration ransomware, son: Brazil, Costa Rica, Chile, Argentina and Colombia.

"From financial institutions, government agencies, academic institutions, and hospitals, any organization can be the focus of an incident caused by ransomware. The main motivation behind these campaigns is money extortion, evolving an age dominated by simple lockers, that only block devices but do not encrypt the information, one where the crypto-kidnappings have proven to be much more lucrative for cybercriminals ", He said Santiago Pontiroli, Security Researcher at Kaspersky Lab. "In addition, criptomonedas the boom has caused this 'business' remains one of the favorite by cybercriminals ".

according Pontiroli, ciberespionaje as Grabit campaigns have particularly affected small and medium-sized enterprises, posing a new scenario regarding cyber crime.

Among the most common consequences of an attack by ransomware loss of information temporarily or permanently are; interruption of scheduled services (lost profits); financial losses associated with the restoration systems, legal costs and IT; and damage to business reputation and loss of confidence by customers.

Kaspersky, reliable security solution and several layers is all that will stop the cryptomalware. further, stresses that this must have a OS original and updated. In Argentina, according to figures from Business Software Alliance, more of 69% installed software is illegal.

ransomware- AALCC

"Victims cryptomalware companies often pay without realizing that there is no guarantee that your data will be unlocked when they do, and there is evidence that a poorly coded ransomware is some information may never recover. The best way to protect data and assets of the company is to implement comprehensive measures cybersecurity all-encompassing, from infrastructure and storage to mobile networks, all accompanied by awareness and education of employees. On the other hand, it is essential that backup data are made regularly, so that the company is not in the unenviable position of having to choose between paying the ransom or losing your data ", Pontiroli said.

To help businesses, regardless of size, to face the growing threat of cryptomalware and protect all of its goods and IT infrastructure, Recominedo Kaspersky Endpoint Security solutions for Business and Small Office Security, since, assures, "You provide reliable protection against cyberthreats known, unknown and advanced, including attacks ransomware ".

Source :

We finish together with impunity. If you are a victim of a crime through internet please report it to the authorities. The AALCC is available to assist you throughout Argentina.


no to violence on the webInternet against violence

In the framework in crime fighting soon we launch a national campaign against violence on internet. We seek a internet without violence or aggression.

Violence in the Web has grown strongly in recent years society Argentina and the world , materializing in many cases violence outside.

To participate escribinos . Please enter City , Contact nro province.


AALCC team

Our commitment is with people.

We grow to help. Report from January to April 2016

The AALCC c , It provides technical assistance , pscilogico and guides the victim must lie to where the complaint.

We are the first civil partnership throughout Latin America with this clear objective, and we continue to grow slowly by steadily.


We deeply appreciate the different associations and professionals in various fields have been added to assist the AALCC and who have actively joined the association, thus increasing the operational capacity support can provide answers in less than 24 business hours throughout Argentina.

The pursuit of ending the impunity of offenders that operates over the Internet is not an easy task, We have circumvented many obstacles, but also a lot of support from society in general.

The most important of the AALCC is human capital and time dedicated professionals in each area in the legal and technical assistance who asks us to our reaching.

In the last two years we have seen a considerable increase in crimes against minors, Revenge porn cases, threats, incitement to violence and above all operational mutation of organized crime to the web.

We have also collaborated on important bills such as the crime of revenge porn, right to oblivion and saved IP connectivity to the evidentiary effects of crime.

During the months of January and April 2016 We have held meetings with representatives of the three branches of government in order to provide our view on the growth of cybercrime in Argentina society and present more than 12 Parliamentary initiatives to fill gaps order to achieve legal and procedural.

The AALCC is an independent institution that receives no subsidies or external aid contribution conduct their partners and members of the executive committee.

If you're a person with a vocation to help and fight crime through internet. Always be the open doors of the AALCC.

We continue to work harder every day to help Argentines.

We will continue thinking and presenting proposals and initiatives to the powers of the state to help that together we achieve a less violent and less impunity Argentina.

the Hoax , it can be a modus operandi for many offenses subsequently set back .

Los Hoaxes (joke or hoax) messages are false alarms virus or any other type of warning or chain (or even solidarity involving health) or some kind of complaint distributed by email, whose common denominator is to ask users to distribute them to as many people as possible. Its sole purpose is to deceive and / or disturbing.


Currently many false alerts hoax messages and ask to be forwarded, quickly become spam They collect as many e-mail.

Hoaxes in Social Networks:

formerly these false messages or chains They came exclusively by email, but today it is common to see them on the walls of our friends or family on social networks, trying to surprise us with messages that attract much attention.

With the current furor of social networks and the possibilities of combinations of text and images, have today taken another form, arriving to proporciones unusual. Please recommend not forward or republish these messages or publications.

Note: Not to be confused with spam publications (advertising) or publications with malicious links (leading to infected sites).

font :

What is cyberbullying?

He ciberbullying is the use of electronic means (Internet, mobile and online video games mainly) to exert peer bullying. Is not here strictly harassment or abuse of a sexual nature or cases in which adults involved.


What is cyberbullying?

Therefore there must be lower at both ends the attack to be considered cyberbullying: if there is an adult, then we are looking at some other cyberbullying.

Nor it is coaxing adults to minors to meet them outside the network or exploit their sexual images. Although there are times when a / a minor begins a campaign of cyberbullying that can end involving adults with sexual intentions.

When we have a case of cyberbullying?

We are facing a case of ciberbullying or less when a tormenting, threat, hazing, humiliates or annoys another / a by Internet, mobile phones, gaming consoles or other telematic technologies.

According to him Study on safe habits in the use of ICT by minors published by the INTECO in March 2009 he cyberbullying is defined as peer harassment in the ICT environment, and includes performances of blackmail, humiliations and insults from children to other children..

What you have to do with bullying cyberbullying or bullying?

They are not as similar as you might think. In both abuse occurs between equals but little else they have to do in most cases. He ciberbullying attends to other causes, it manifests itself in many different ways and strategies of soliciting and consequences also differ. It is quite possible that bullying is followed by ciberbullying. It is also possible that the ciberbullying it can also end in a situation of bullying, but certainly the latter itself is unlikely.

Why is especially severe cyberbullying?

He anonymity, the no direct and immediate perception of damage and the adoption of imaginary roles in the Red to become a serious problem cyberbullying.


In addition to the adaptation of the English neologism (cyber-bullying) other terms are used to describe the Castilian ciberbullying, combining the prefix cyber- or adjectives online O virtual with the words matonaje, bullying O abuse, associated with the name bullies O abusones for those who do the bullying. So we can find the following synonyms for ciberbullying: ciberabuso, cibermantonaje, cibermatoneo; online abuse, mantonaje online, bullying online; virtual abuse, virtual matonaje, virtual bullying. further, English is also used e-bullying and online bullying.

How it manifests cyberbullying?

The forms that are varied and are only limited by technological expertise and imagination of children stalkers, which is little hope. Some specific examples might include the following:

  • Hang on Internet a compromised image (real or made by photomontages) sensitive data, things that can hurt or embarrass the victim and make it known in its relations environment.
  • To register, with photo included, the victim in a web where voting is the ugliest person, to less intelligent ... and charge of stitches O votes to appear at the top.
  • Create a profile or false space on behalf of the victim, in social networks or forums, where are written as a first-person confessions certain personal events, demands explicit sexual contacts ...
  • Leave offensive participate in forums or chats aggressively posing as the victim so that the reactions will subsequently directed to those who have suffered the impersonation.
  • Being discharged the email address at certain sites which then fall victim to spam, contact with strangers ...
  • Usurp your password email, in addition to change so that the rightful owner can not see, read the messages that come to your mailbox violating her privacy.
  • Cause the victim in web services that have a person responsible for monitoring or moderate what is happening there (chats, online games, Virtual communities ...) for a violent reaction, once denounced or evidenced, it implies the exclusion of who really was being the victim.
  • Rumors circulate in which the victim is supposed reprehensible behavior, offensive or unfair, so are others who, without doubt what they read, They exercise their own forms of reprisal or harassment.
  • Menajes send threatening e-mail or SMS, chasing and stalking the victim in Internet sites it is related in regularly causing a feeling of complete oppression.

Source :

Digital identity theft: The bridge dozens of crimes

adopting, creating or appropriating an identity on the internet although it should be considered a separate offense also consider this willful action as "the bridge dozens of crimes" in which the author seeks impunity from anonymous course.

digital identity theft , the door of crime

Threats, incitement to violence, slander, child pornography, condoning crime, discrimination, extortion, minor crimes such as corruption of minors and grooming are some of the more than 45 criminal types that are set up in many cases with false identities or appropriate digital.

This willful misconduct that affects millions of Argentines who fall into despair when they saw the damage they have any criminal consequences for its author as in Argentina digital identity theft is not a crime.

But beyond conmiserar it should be a separate offense, the commission of any crime through fake profiles, adopted, or appropriate should be considered an aggravating.

In 28/09/2016 in collaboration with the AALCC , a group of 10 Low deputies in the number 6751-D-2016 They presented a project that incorporates Article 139 TER the crime of digital identity theft, a fundamental tool for advancing categorically against impunity and crime.

This project is still awaiting treatment in the commission of criminal law on deputies.

Cyber-exhibitionism: Why they take and share intimate photos?

Often they appear related to cyber porn-revenge news (revenge porn), where one or more people spreading sexual images of a victim, without their consent.


We know that in most of the time, the victim voluntarily agreed to take those pictures and share them, trusting that the recipient of material would keep them in the private sector. Given these facts, It is common to hear the question “Why [the victim] He took those photos?”. There is a logical temptation: if there is no sexual photos, then there is nothing to spread. The problem is that this question can and tends to be formulated in order to blame and condemn the victim. Since the AALCC, we firmly believe in the rights to liberty and privacy (art. 19 CN) and we take the question with a preventive objective.


The conduct of a sexual picture fits into what we know as exhibitionism, where the subject who shares the enjoyment of watching him undress. In this case, the exhibitionist uses technology for display. Now, it is not possible to make a stable inference about a psychic symptom and cause or origin. Why? Because the dynamics of the unconscious never develops in the sense of a logical implication such a symptom to identify the structure of the subject who stated. In summary, the same phenomenon (exhibitionism or to be) You may correspond to various causes.

Speaking of exhibitionism, it is impossible not to think about the perverse structure, especially for those who read “Instincts and their destinations” Freud, which describes the fate of instinctual back to the person himself. In this text, exhibitionism is presented as a returned voyeurism on self, as it includes the fact of looking at the body itself.

In perversion, the exhibitionist is offered in view of the Other, and may generate modesty and putting at the mercy of his desire. The perverse exhibitionist seeks to surprise the other, that is moved by the unveiling. Can we diagnose a subject as perverse from having observed an exhibitionist act? No. We will see that the exhibitionist component may be present in other structures.

The exhibitionist component is also present in hysteria. In this structure, the set adopts highly invasive test narcissistic proportions. Hysterical bet wanting to like the other usually blind, trying to question the other so that it is fascinated and subdued. We know the abiding conviction of imperfection in which they live hysterics leads them to try to hide: clothes, ornament, decoration, roleplaying. further, all them is appropriate to try to make more appealing the eyes of others, which for them it is very little. We can think of the screen and the camera mobile phone is ideal for convening this look, lived as poor. In the hysterical and hysterical provision is named and all: “given to see”. In the hysterical woman, giving to see always refers to the body. Instead, in man it involves the whole body. after this “give to see”, a demand for love and recognition is hidden and for both men and women, the devices are priority.

Both men and women hysterics, in this case, also they use the display as a staging of the body. The bet, in this case, It is trying to act as if the eyes of others is always sostuviera, so that the subject can enjoy phantasmatically trial for allegedly disapproving him. In this way, for instance, a man manages to avoid a direct confrontation with a woman, in the sexual arena.

It has also been observed that this photo exchange between men can be used as a mask or homosexual game. It is not a true homosexuality, but a secondary compensation: if the other is like unto, then it protected from sexual difference.

Regarding obsessional neuroses, we know that these subjects are extremely scrupulous with the rules and that the slightest infraction fills them with anxiety. obsessive, without knowing it, It does terrible efforts to try to be perverse, but it never fails. He does not know that his obsessive defense legality is a struggle against their own desire for transgression. Obsessive can perform, exceptionally, acts that can remind a perverse transgression, although usually these transgressions are insignificant. If we think in the case of an exhibitionist act, for obsessive and even phobic, most likely a question “flight forward”. The subject, in this case, It is overcome by his own desire and acts with such transgressions. Obviously, obsessive or phobic feel guilt for the actions previously committed, while a wicked not.

In conclusion, the same behavior can have different causes and appearing under different clinical modalities. On the other hand, We saw how new technologies allow you to update as old as culture practices.

What to do?Regrettably, the cyber-exhibition has risks, one of which is precisely the disclosure of such images. Before sending any material, It is recommended to think about the possible consequences of that action. It is not a mandate to repression, but remember that the Internet allows the permanence and lack of boundaries. What you share may reappear many years later and reach people who do not imagine us.

I share the story of a patient, victim of cyber-revenge: “I never thought, to get me those photos, that come to people who did not exist at that time: my children”.

Lic. Lucas Vazquez Topssian

M.N. 60.896
Degree in psychology
Director of the Department of Psychology of the AALCC

The threat of the web.

In recent years the growth of child pornography through computer media has grown in precipitous way in Argentina and the world.
No doubt this is one of the most heinous crimes of our criminal regulatory body (Crimes against sexual integrity, Title III Chapter III Argentine Penal Code) and penalties are set up 15 years in prison for those for whom they trade, trasmitan, or publish such material retrasmitan.


With the information revolution, the global web accessibility and pseudo-anonymity that can be found in it, many networks dedicated to pedophilia and child pornography have begun to use the dark side of the Internet to develop their criminal activity in search of impunity.
But these organizations or criminal networks would not achieve their goals without their perverted consumers. In Argentina the consumption and possession of child pornography is not a crime, ie if a "user" decide browse through internet looking for this type of content download, storing and / or collect them would mean no penalty in Argentina.
That is why from the AALCC present the initiative to establish such an action in the Argentine Penal Code.
The Spanish legislation is one of many countries considered as a penalty in his article 189 1)
b) Who produces, selleth, distribuyere, exhibiere, offereth or facilitates production, sale, dissemination or exhibition by any means of child pornography or whose production have been used people with disabilities need special protection, or possesseth for these purposes, although the material having its origin abroad or be unknown.

That crimes can be configured via Internet.



According to analysis conducted we believe are at least a 50 crimes that can be configured through the internet that is defined in the second book of the Argentine Criminal Code, without considering the special laws. Although worth noting that less than a dozen of them are what we define as "proper Informaticos" ie that its configuration is inescapably requere a computer as is the case of classified and / omodificados by her law 26388/2008 or the recent incorporation of the crime of grooming.


But the progress of the criminal mind is not simply a few crimes , but unfortunately we must understand that cyberspace , computer platforms, social networks and other technologies bring innovations - when used by the offender - as tools for new forms of commission of traditional crimes (common before the computer age). By understanding this delicate situation clearly we observe what they mean these new ways of committing crimes , not only by the severity of many of them but by how difficult it means the investigation of crimes configured through Internet , that beyond the complexity refers to the second anonymity of the web, in many cases it expresses collaboration of foreign naicones justice in trial production as its proper preservation and speed required . In addition many complex as arms sales, drugs, Trafficking, although they can not be configured entirely through internet , computing platforms are a great support for configuration.


2 Crimes

We note that in accordance with the criminal offense under Argentine regime are few 185, many of them are those that can be configured through Internet , ie the actions of the offender behind a keyboard produces the effects on the victim willful aptitude and thus the consummation of it.

Beyond the exposed, there are other crimes that today can not be configured through the web , by purely material issues , computing platforms can serve as a vital support for the configuration of the same.

The offenses that if they can congirurarse over the Internet are the following:

a) Crimes against honor

  1. Article 109 : caluminia o la la falsa imputacion
  2. Article 110 : the deshonrra or discrediting
  3. Article 113 : publciacion or reproducing the injuries inflicted by another
  4. Article 117 to : providing false information to third parties contedia in a personal data file.


B) Crimes against sexual integrity:

5) Article 125 : Which it promotes or facilitates the corruption of under eighteen, even with the consent of the victim

6) Article 125 to : Which it promotes or facilitates the prostitution of a person

7) Article 126: Aggravating Articles 125 and 125 to

8) Artículo128:who produces, financial, offereth, Wholesale, publication, facilitate, disclose or distribuyere, by any means, any representation of a child under eighteen (18) years devoted to explicit sexual activities or any representation of their genitals for predominantly sexual purposes, like which will organize live shows explicit sexual representations that minors participaren

9) Article 129:which implements or did perform other acts of obscene exhibitions involuntarily exposed to be seen by others.

C) Crimes against freedom :

10) Article 149 to: It shall be punished with imprisonment from six months to two years who uses threats to alarm or frighten one or more persons.

11) Article 149 have item 2 and 3 (aggravating the 149 to)

12) Article 153: unauthorized access to an electronic communication third. Delete or alter

13) Article 155: wherein, being found in possession of a map, An electronic communication, a closed tender, a telegraph office, telephone or other, not for publicity, doeth publish unduly, if the act causes or it would cause damage to third parties.

14) ARTICLE 156: wherein, taking news, by reason of their status, job, employment, profession or art, a secret whose disclosure could cause harm, revelare it without just cause.

15) ARTICLE 157: the public official who divulges facts, performances, documents or data, which by law must be secret.

16) ARTICLE 157 TO: wherein: 1.Knowingly and illegitimately, systems or violating confidentiality and data security, accediere, anyway, a bank of personal data;

  1. Illegitimately either provide or disclose to other information recorded in a file or in a personal database whose secret bound to preserve by provision of law.
  2. Illegitimately will insert or makes insert data into a file of personal data.

  1. d) Crimes against freedom of work and association:

17) ARTICLE 158: the worker who has exercised violence over another to compel him to take part in a strike or boycott. The same penalty will suffer the pattern, employer or employee, by itself or on behalf of someone, pursues coercion to compel another to take part in a lock-out and to leave or enter a working society or certain employers.

18) ARTICLE 159: that, for environment machinations fraudulentas, evil suspicions or any means of unfair advertising, try to divert, their advantage, the clientele of a commercial or industrial establishment.


  1. e) Crimes against freedom of assembly:

19) Article 160: Which materially impedes or a lawful meeting turbare, with insults or threats to the speaker or the institution organizing the event

  1. f) Crimes against press freedom:

20) ARTICLE 161: Which prevents or prevent, hinder the free movement of a book or newspaper


  1. G) Crimes against property:

21) ARTICLE 162. – It shall be punished with imprisonment from one month to two years, which unlawfully seizes a chattel, wholly or partly outside. -(computer theft through unauthorized access to computer systems).

Clarification: The concept of "computer theft" produces an effect different from the traditional desapoderamiento theft, beyond that whoever enters unduly copy information without damaging or remove content. When the article was sanctioned 162 in our country impossible therefore this concept to consider not existed computer means.

Then it is very different access to damage a computer system, violating electronic correspondence, simply enter access unduly copy content.

In Latin America and the Honduran penal codes and Venezuelan literally cite examples use the phrase "computer theft".

Article 13 cybercrime law Venezuela. Theft.

Who through the use of information technologies, access, intercepts, interfere, handling or use of any form a system or media to seize goods or tangible or intangible patrimonial values ​​its holder snatching them, in order to procure an economic benefit for himself or another, He shall be punished with imprisonment from two to six years and a fine of two hundred to six hundred tax units.


Art 223 Penal Code of Honduras "to chattel electric power is equated, the radio spectrum and other kinds of energy waves or telephone systems, television, facsimile or any other computer that has economic value".


The AALCC has presented as a proposal to amend Article 162 CPA adapting to new technologies.


22) ARTICLE 168:Extortion– It shall be punished with imprisonment or imprisonment of five to ten years, which with intimidation or simulating public authority or false order of the same, forces another to deliver, to send, deposit or make available or to a third party, stuff, money or documents that produce legal effects. It incur the same penalty that by the same means or violence, forces another to sign or destroy documents or credit obligation.

23) ARTICLE 169: Extortion– It shall be punished with imprisonment or imprisonment of three to eight years, wherein, by threat of charges against honor or violation of secrets, commit any of the facts stated in the preceding article.

Scams and other frauds

24) ARTICLE 172. – It shall be punished with imprisonment from one month to six years, which defrauds another with an assumed name, simulated quality, fake degrees, influence lie, breach of trust or feigning goods, credit, commission, company or trading or making use of any ruse or deception. (Through the system called phishing emails that simulate trap entities)

25) ARTICLE 173: Aggravating the artículo172. item 16. The one who defrauds another by any computer manipulation technique that alters the normal functioning of a computer system or data transmission. (subsections 3,6 and 10 They can be configured via the Internet)

26) ARTICLE 174 (other fraud) item 6 °. – Which mischievously would affect the normal development of a facility or commercial exploitation, industrial, agricultural, mining or intended for the provision of services; destruyere, Dana, doeth disappear, conceals or fraudulently disminuyere the value of raw materials, products of any nature, machines, equipment or other capital assets.


27) ARTICLE 183 second part: Which alters, mutilates or destroys data, documents, programs or systems; or sells, distribuyere, doeth circular or introdujere in a computer system, any program to damage

28) ARTICLE 184 (aggravating): item 6. Run on computer systems for the provision of health services, communications, supply or transportation of energy, means of transport or other public service.

Crimes against traffic safety and transportation and communication

29) ARTICLE 190. – It shall be punished with imprisonment from two to eight years, knowing which implements any act that endangers the safety of a ship, floating structure or aircraft (Means of transport in many cases are controlled by radar, and software that allow control and automation thereof. These systems can be violated and sabotaged therefore can produce an intentional done without them is accessed through the web or other computer media)

30) ARTICLE 194. – which, without creating a hazard common, impedes, prevent, hinder or delay the normal functioning of transport by land, water or air or public communication services, water supply, electricity or energy substances, It shall be punished with imprisonment of three months to two years. (By drones or devices for computers as well directed emission, breach or interruption of communications by blocking services) Regarding the mezzanine landing technology of IP telephony makes this crime - disruption to communications - start to become more common over the Internet.



Incitement to commit crimes

31) ARTICLE 209. – Who publicly incites to commit a particular crime against a person or institution,

Illicit association:

32) ARTICLE 210. – It shall be punished with imprisonment or imprisonment of three to ten years, who takes part in an association or group of three or more persons to commit crimes by the mere fact of being a member of the association. For the leaders or organizers of the association the minimum penalty is five years' imprisonment or imprisonment. (While it is not very common to observe that configure racketeering crimes through internet can exemplary cases of groups of people intended to steal private or sensitive information from third parties for ransom for nondisclosure. Also cases of sale or distribution of child pornography, to cite some cases)

intimidation published:

33) ARTICLE 211. – It shall be punished with imprisonment from two to six years, wherein, to instill a public fear or provoke riots or disorders, doeth signals, hath given voices alarm, threatens to commit a crime of common danger, or uses other materials normally suitable means to produce such effects.

34) ARTICLE 212.Intigacion to collective violence – It shall be punished with imprisonment of three to six years who publicly incites mob violence against groups of persons or institutions, by the mere incitement.

35) ARTICLE 213. Condoning crime – It shall be punished with imprisonment from one month to one year, who publicly and by any means encouraging the commission of a crime or convicted of a crime.

36) ARTICLE 213 to. Other offenses against public order – It shall be punished with imprisonment or imprisonment of three to eight years which organizes or takes part in permanent or temporary groupings, without being covered by Article 210 This code, tuvieren main purpose or accessories impose their ideas or fight others by force or fear, by the mere fact of being a member of the association. (coordinated political or ideological persecution to silence third, which in this case can be expressed a forum, social networks and / or editorial)


  1. I) Crimes which compromise peace and dignity of the nation:

37) ARTICLE 222. – It shall be punished with imprisonment or imprisonment of one (1) a seis (6) years old, who reveals political secrets, industrial, technological or military concerning safety, the means of defense or foreign relations of the Nation. (Para substituted by art. 8No. Annex I Law No. 26.394 B.O. 29/8/2008. Validity: shall take effect on the SIX (6) months of enactment. During this period a program of outreach and training on its content and implementation will take place in relevant areas)

It incurs the same penalty which obtains the revelation of the secret. It shall be punished with imprisonment of one to four years which publicly insults the flag, the shield or the anthem of the nation or the emblems of Argentina province. If disclosure or obtaining it was committed by a military, in the exercise of their functions the minimum penalty is increased to three (3) years and the maximum penalty is increased to ten (10) years old. (Paragraph incorporated by Article. 9No. Annex I Law No. 26.394 B.O. 29/8/2008. Validity: shall take effect on the SIX (6) months of enactment. During this period a program of outreach and training on its content and implementation will take place in relevant areas)

38) ARTICLE 223. – It shall be punished with imprisonment from one month to one year and disqualification for double time, which by carelessness or negligence she shall know the secrets mentioned in the preceding article, of which there is found in possession by virtue of his employment or occupation.

39) ARTICLE 224. – It shall be punished with imprisonment from six months to two years, which unduly risen up plans of fortifications, ships, establishments, roads or other military or works that purpose introdujere, clandestinely or deceptively in such places, when the person was forbidden access to the public.


  1. J) Crimes against the constitutional order and democratic life:

40) ARTICLE 226 to. – Which threatens public and ideally with the commission of any of the acts referred to in Article 226, It shall be punished with imprisonment of one to four years.

  1. K) Crimes against public administration

41) ARTICLE 237. Attack and resistance to authority – It shall be punished with imprisonment from one month to one year, the who employs intimidation or force against a public official or the person who prestare assistance at the request of one or under a legal duty, to demand the execution or omission of an act of their duties.

42) ARTICLE 237. – It shall be punished with imprisonment from one month to one year, the who employs intimidation or force against a public official or the person who prestare assistance at the request of one or under a legal duty, to demand the execution or omission of an act of their duties.

43) an article was 247. Usurpation of titles and honors – It shall be punished with imprisonment of fifteen days to one year exercising an estoppel of a profession for which a special authorization is required, without having the title or authorization. (False professionals online are those that roam the web, like outside this crime can be configured via Internet)

44) ARTICLE 208: illegal practice of medicine.

1º that, without title or authorization to practice a healing art or exceeding the limits of their authorization, preach, prescribiere, Drug enforcement administration habitualmente, waters, electricity, hipnotismo or any means for treating diseases of people, even free title;

2º that, with title or authorization for the exercise of a healing art, prometiere preach or curing diseases or fixed-term secret or infallible means;

3º that, with title or authorization for the exercise of a healing art, gives his name to another hath no title or authorization, to exercise the acts that paragraph 1 of this article refers to.

It noted that the web is common to see whether ornot false healers quacks online, therefore this crime also thickens the list of which can be configured through computer media.

45) ARTICLE 83. Abetting suicide. – It shall be punished with imprisonment of one to four years, which incites another to suicide or to commit it'll help, if suicide had been tempted or consummated

46) ARTICLE 131. Grooming– He shall be punished with imprisonment of six (6) four months (4) years which, by means of electronic communications, telecommunications or any other data transmission technology, I will contact an underage person, with the purpose of committing any offense against the sexual integrity of it.

47) ARTICLE 3 LAW 23592 Discrimination: They will be punished with imprisonment of one month to three years who will participate in an organization or perform them advertising based on ideas or theories of superiority of one race or group of persons of a particular religion, ethnic origin or color, aimed at justifying or promoting racial or religious discrimination in any form.



As this brief analysis in the previous point and without special laws are at least 47 Argentine penal code offenses which can be configured via Internet. This means that cybercrime should not only stigmatize the hacker or hacker but goes far beyond , that is included in most cases, to common crime with basic knowledge of computer use and that power settings with this form of crime commission.

But at the facilities and amenities that have the offender to act via Internet with the convenience offered aforementioned pseudo-anonymity, the speed and scope of the web among other duties comes together in the difficult and complex investigation. It is therefore essential to give the judiciary greater legislative and procedural tools to enable the specialized researcher advance at the same speed with which the offender is developed on the web.

Since the parliamentary commission proposals of the Argentina Association Against Cybercrime have been developed different parliamentary proposals for the purpose of incorporating such research tools as well as the incorporation of new crimes today are not covered by our criminal law.

The AALCC since 2014 is advising the Congress on various projects indispensable for Argentine law have a criminal regime achieve, procedural and research excellence that allows.


Dr. Luis A Nocera. Dr. Jorge R Cosenza. Dr. Diego F Migliorisi.

President. first vowel. Secretary.



You can download the report by clicking here : Download the full text here

crimes that are configured online

Incitement to commit crimes, defend crime, public intimidation.

What happens in cyberspace, from and, It is not oblivious to what happens outside it, ie the different actions from within the web clearly have direct effects on the population that each day has a greater dependence on cyberspace.


Whether through social networks, blogs, opinion pages or portals online user can communicate, inform, express themselves on one or the other subject to an incalculable speed viral effects of web platforms and search engines. For example, videos news or information notes on platforms like YouTube, Facebook, Twitter or comments news published in online newspapers can be seen by hundreds of thousands of people in a matter of minutes depending on the tenor of the published (either false profiles, Anonymous or real) hardly produce a neutral effect on the receiver.

In my previous book "Crimes in the Web" (2014 Ed del Nuevo Extremo) highlighted that a lot of traditional crimes (before the computer revolution) They can easily be set via the Internet. Among the many possible crimes and making a simple superficial analysis on the content in the Argentine and South American cyberspace I found an irrational rise of crimes against public order and incitement, described in Articles 209 and 209 bis of the Argentine Penal Code and the defense of crime, defined in Article 213 CPA.

In many cases, the cloak of pseudo anonymity offered by the web power who encouragement inhibitory, in order to generate this or that situation, they would hardly barefaced, but across computing platforms in search of impunity.

For example, if from a profile on a social network group is created "pillaging supermarkets" calling to loot supermarkets and / or businesses clearly (there were real cases) the aim of the creators of this group is to urge possibly commit the crime of "robbery in band" as defined in Article 167 CPA.

There may also be cases where you call (through web tools) to occupy land, block public services or attack an institution or to one or another person. Definitely, the offense is the same, configured from a megaphone in Florida and Corrientes (the heart of the City of Buenos Aires) or any social network or web platform of opinion that may have public access and that message is irrefutably recepcionado. That is to say, with megaphone many people can hear the instigation live and direct, but in the case of the social network and / or posting comments on the portals of opinion, said even message- It comes in more direct and literal way, noting that in my view social networks, its pages or open any user groups are promoting public road with a more precise effect that other means by the quasi instantaneous viralization.

Public incitement through the Internet can travel freely around the web, be replicated, republished elsewhere, that is to say, It generates an incalculable effect of receivers unlike other forms.

There have also been cases in publications aimed at attacking a certain person, group or institution for opinions or public actions in order to generate a wave of lone offenders or organized. In the latter case I call "cyber armies trend" and I have devoted a good part of my next book "deep web, anonymity and Internet censorship ".

In recent years, It has also promoted the use of computer platforms with clear terrorist groups threatening messages aimed at producing criminal acts.

Anyway, While it is common to see in cyberspace - more and more often- slurs, threats, discriminatory acts and other crimes, instigation is becoming a commonplace in this parallel universe, It is the same offense inside and outside.

In Title VIII of the Argentine Penal Code, Crimes against public order, we also found the public intimidation offense in Articles 211 and 212. In these articles, whose offense can also be configured via the Internet, It establishes penalties of up 6 years in prison "That, to instill a public fear or provoke riots or disorders, doeth signals, hath given voices alarm, threatens to commit a crime of common danger ". It is clear that public fear can be infused from computing platforms easily.

We also find the offense in Article 213 the Argentine Penal Code (also present in all South American penal codes), I mean the "apology for crime" which carries penalties of up to one year in prison who doeth publicly and by any means the defense of a crime or a crime convicted.

Por last, Article 213 bis criminalizes "other offenses against public order who organizes or takes part in permanent or temporary groupings that, without being covered by Article 210 (illicit association) This code, tuvieren main purpose or accessories impose their ideas or fight others by force or fear, by the mere fact of being a member of the association. In this case also these actions can be configured via Internet. Can be seen in many overlapping circumstances "ciberejercitos trend" operating on the web for the purpose of attacking, to threat, terrorize authors note, articles and / or comments in order to combat the ideas expressed from fear and terror in search of silence. These acts of fear can be infused directly or indirectly through social networks, emails, blogs and other computing platforms. The organization to impart fear and voices silenced by fear mufflers effects may be a modus operandi on the rise in Latin America.

Definitely, to achieve a fairer society, tolerant, where no prime equitable violence either within or outside the web, this type of crime - that few opportunities are reported- They should be investigated at the same speed which rotates the web.

Por Diego Migliorisi

Lawyer specializing in computer crime

Director de Abogados Migliorisi

Argentina founder of the Association to Fight Cybercrime


The doctor. Luis Angel Nocera ,Lawyer specializing in internet domains tells us the secrets of this crime is rising.

1) That is the cyberquatting ? There have been cases in Argentina ?

The action is cybersqautting register the name of an Internet domain, knowing that someone has a better right to it, usually it has done to sell to who should be the owner or to divert traffic to your competitor web pages or other content..


In Argentina, I been cases and usually occur daily due to lack of conocmiento of this problem by the companies end up paying large amounts of money to recover, and lack of mechanisms to recover a domain name both nationally (, and international (.with)

2) It can be considered as a crime of misuse of brand ?

Clearly and conspicuously is a crime, brand abuse, The object of this action is to extort the trademark owner to recover by a bulky figure an Internet domain that should belong to the same as being holder of the trademark ownership.

3) If someone registers a domain with a Foreign .com extension eg .com coincident with a registered mark in Argentina , Parents who integrates the Berne Convention. The owner of the trademark has better right ? In that case what are the ways to recover?

And, It has a better right, the Berne Conveción gives the same. To retrieve a foreign domain name (.with) in relation to a trademark title, ICANN has created a new mechanism for arbitration of disputes domains quickly, who wants to use it must demonstrate that:

• has a right in favor of a name that is identical or confusingly similar to the registered domain name
• The domain owner has no legitimate interest in it
• That the domain registration and use in bad faith are

For presentation can claim up 15 domains, taking apart the suspension of the use of the domain claimed pending dispute, It should be noted in that trademark issues to take advantage of this new system, trademark owners around the world must validate their brands to the Trademark Clearing House.

There is also the traditional method of ICANN consisting of 5 steps:

  1. Filing a complaint with a service provider of dispute resolution is accredited by ICANN and selected by the applicant, such as WIPO (World Intellectual Property Organization).
  2. The other part of either a person or entity against which it has filed suit has the right to file a disclaimer to fend off the accusation
  3. The appointment of an expert group Admnistrativo, composed of one or three, that will decide the dispute, Appointment made by the service provider selected dispute settlement.
  4. The decision of the Administrative Panel, it notifies the parties, the concerned Registrar and ICANN.
  5. The enforcement of the decision of the administrative panel by registrars interested, if a resolution that has to be canceled or transferred the name or domain name in question is issued.

Ternerse should present these dispute resolution mechanisms have a cost that varies according to the number of domains to be claimed.

Incitement is a crime that carries penalties in Argentina up 6 years in prison is a more common crime of which parese. We can find it in different news comments, Entries and other tools provided by cyberspace so that the user can communicate

Incitement to commit crimes

ARTICLE 209. – Who publicly incites to commit a particular crime against a person or institution, shall be punished, for the sole instigation, with imprisonment from two to six years, depending on the seriousness of the crime and other circumstances established in article 41.

In Mexico there are more than 16 thousand children and adolescents subjected to sexual slavery, of which a significant number was hooked through the Internet.

This means it is very convenient to the dealer by the facilities provided, for instance, accessibility, the ability to impersonate someone else, to meet people from anywhere in the world and interact with several people at the same time taking advantage of anonymity.


To capture their victims, traffickers use social networks, chats, couple seekers and job openings in false modeling agencies, for instance, that allow them to obtain information and then contact them and then catch them and subjecting them to illegal trafficking.

Operators also use the network to offer the public as a commodity to people captured, disseminate and commercialize materials derived from trafficking, like pornography. further, pedophiles and sex tourists use the Internet to plan or arrange sexual encounters with people who are exploited.

In this way, Internet has become part of the process of trafficking so they insist, especially parents and teens to be cautious either with supervision for the first and the handling of information and contacts with the second.

Internet, despite all the good that contributes to society in information, training, communication, job, etc, it has also become the tool of thousands of criminals who use it for their own benefit regardless of the consequences. Harassment offenses, fraud, fraud, illegal drug sales, medicines and so on are only a few examples. But the network of networks is also being used for something much more terrible consequences such as illegal arms sales, a crime that could have facilitated the recent attacks in Paris that claimed hundreds of lives and plunged France and dozens of countries to a state of collective panic with consequences in all areas of society.


In United States, where gun ownership is a right recognized by the constitution, it is estimated that half of the companies engaged in the sale of firearms accept orders over the Internet without first verifying the age and identity of purchased. There, Every year dozens of tragic events related to this easy access to guns succeed, both by adults and minors.

arms sales

But to illustrate this phenomenon of online selling arms you do not need to cross the ocean or so if you want to get out of our borders. Cases of illegal sale of firearms taking advantage of the anonymity and internet facilities granted is also a fact here in Spain.

In 2013 Four program "Walking Street Journal" showed hidden camera through the ease with which a person announced arms sales online. Sure to locate any weapon and flaunted her discretion. Just prior to delivery full Atocha station, the trafficker was arrested by the Civil Guard who declared that "anyone can acquire a firearm", that easy.

This same year 2015, in April, Civil Guard disarticulated a network of selling illegal weapons via the Internet. As in the previous case, these criminals were announced in shopping portals - sale between individuals under the guise of collecting and during the search were seized her arm and different modified, therefore illegal, as well as plenty of ammunition.

But perhaps the most tragic and recent events linked to the sale of weapons in internet constituent recent terrorist attacks in the city of Paris and claimed by the ISIS that have killed hundreds of people. Investigations after the facts have led to the arrest in the small town of Magstadt, in Germany, of a man 34 years of age, He published by the newspaper "Image", It could have been the linchpin that facilitated terrorist assault rifles with which they perpetrated the slaughter.

Four emails found on the mobile phone of the detainee prove that this man sold last day 7 November through internet two assault rifles Yugoslav Zastava M70 model making and two Kalashnikov AK-47, the best-selling history, Chinese production, a "An Arab of Paris".

Although research results are not yet conclusive, French police is convinced that it is the weapons used in the attacks of Paris while German police assumes demonstrated that this man "manipulated legal blank pistols to turn in firearms then sold on the Internet" so illegal activity, in any case, could lead to dire consequences.

Illegal arms sales online shooting

The legal and technical team is ready to help AALCC .

Threats through social networks , emails and other computing platforms are one of the most common Internet crimes . If you are the victim of this crime requesting legal and technical advice of professionals AALCC

During the summer of 2016 the board of the AALCC led by Dr. Luis Angel Nocera and Dr. Diego Migliorisi along with a group of specialists in security and defense began prepared a document to present to the Congress of the Nation Argentina .Dicho document it consists of 15 legislative proposals with their respective foundations and witnesses in comparative law cases. The AALCC and its external partners consider fundamental and strategic update and adapt the criminal law on computer crime and crimes that are configured through Internet, as well also give researchers of all legal tools, technological and procedural for the purpose of achieving an expeditious investigation and win the race to crime.
To contact the commission legislation AALCC email to

Legislative Commission of the AALCC. Dr. Luis Nocera Dr. Dr Diego Migliorisi. Jorge Cosenza

Legislative Commission of the AALCC.
Dr. Luis Nocera
Dr. Diego Migliorisi
Dr. Jorge Cosenza

Stress in times of hyper.

By Lucas Vazquez Topssian

Lic, Psychology –

I receive in my office a patient referred by a gastroenterologist. The woman, about 60 years old, He suffered from heartburn and bouts of diarrhea alternating with constipation other. It was assessed by various medical professionals, being unable to find any organic abnormality that would justify the box, They considered the hypothesis that this was a case of “stress”.


In initial interviews, nothing in the story of the patient seemed to indicate what caused this stress: He had a self-managed work to your liking, adults and successful children, a good economic move, a large house in a quiet neighborhood and a boyfriend described by her as protector, attentive and gentleman. He had a life that could be classified as privileged.

In the passage of a patient, It is a matter of time until a detail appears, that the professional give you a clue why things are not going as they should. In this case, It was that the patient forgot to mute your phone during a session. She, distracted in his account, not listened to the amount of notification sounds emanating from inside your portfolio. When I remark this, the patient pounced on the phone to answer the many messages that had been sent. Her friends by Facebook. Family by a group of Whatsapp. Text messages of their clients. Notifications of your Twitter profile. I wonder if this was always the case, and tells me that if: she could not afford the right not to be available.

As technology advances, it is small device that accompanies us everywhere takes increasingly important in our lives. Mobile telephony functions up until not long ago seemed futuristic, as games, playing music in various formats, email, SMS, electronic agenda, digital photography and video, video call, Web browsing, GPS, and even digital TV. The virtual field, made possible by social networks open the doors to new agora, that space immediately exchange in which one is but it is not and that it is increasingly impossible to leave.

Although the phenomenon of mobile telephony is recent and is undertheorized, the idea that emotions disturb the normal course of operation of the body is known since antiquity. We know that every affection involves a vasomotor download, that is to say, every emotion is a growing movement that comes from a nervous excitement that is performed in typical fashion, that allows us to distinguish one emotion from another. In the case of stress, which it is the normal response of a subject against a hazard, the reaction of the organism is characterized by changes in neuroendocrine at stake the hypothalamus and pituitary gland and adrenal (center reactivity). Although stress is a natural and necessary response for survival, under certain circumstances can cause serious health problems. On one side are all physiological alterations, and on the other are the complications of emotional order.

Can the mobile phone stress to a subject? The patient talking, once warned of the weight of cell in your everyday life, reports “When cell phone rings, I do not know if it is something urgent. I run to see who is, I fear that something has happened to my family… But in the end they are always unimportant messages“. In the case of this patient, the phone rang all the time: while working, when he ate, when it was nap.

My first intervention, somewhat naive, was propose to the patient that the cell always remain silent and she was dedicated at times to answer all messages and notifications accumulated. It was hoped that my prescription was rejected strictly, although no one could condemn the attempt the obvious solution. However, the patient did manage to start wondering if any of the logic of my proposal could benefit her, move from one of these situations commonly known as “bottom”. In one of his runs to answer the phone, the patient fell down the stairs of his house and had to be casted. That was how he introduced the question about the use and abuse of the cell and could start working on the symptom. possibly, the phone was muted and stress yielded. The patient gradually concluded the damage to their health caused him to want to be available and virtually constant physical symptoms and finally gave.

I would like to clarify that this was not the only occasion where the mobile phone was present in a query and before certain phrases heard repeatedly, I allow questions:

“I must be alert if an emergency occurs”.

What is an emergency for you?

Before the emergence of a real and imminent danger, Would you ask for help from the nearest person physically? Is it enough to their virtual presence?

“I must respond immediately to not worry my acquaintances”.

Why would worry acquaintances?

Do you really care, you fear or worry?

What do you think is the scenario that acquaintances imagine believe if you do not answer immediately?

“My relatives, friends and acquaintances will be angry if I do not respond quickly”.

Why are your relatives react well? And what do you do about it?

Do your acquaintances the ability to wait for a response?

“I answer my customers immediately, or I'll lose”

Your clients, Do they value their speed to care for them or their effectiveness and efficiency at work?

Is it really important that you attend your customers at any time?

Does your customer likes you are constantly taking cell?
Finally, I conclude with this question: What price we paid for the lifestyle that llevamo


Gurruchaga 483 - Capital Federal.