Get Adobe Flash player

News

Security forces Pehuajó, Energetic, Carlos Casares, Carlos Tejedor, Hipolito Yrigoyen and Trenque Lauquen, among other districts, They participated in this oriented in the data recovery technique of mobile devices and the impact this has on research training.

Working day

Marcelo Romero, Auxiliary Corps of Judicial Investigations of the Autonomous City of Buenos Aires and member of the Argentina Association to Fight Cybercrime, He led the theoretical and practical workshop on "Computer Forensics". The conference was organized by the Commissioner for Women and the Family of Carlos Casares, and he counted on the support of the Senate of the province of Buenos Aires.

Throughout the activity deepened notions as the tools used in mobile expertise, the basics of computer forensics test, backup and encryption devices, among other topics.

Training instance main objective was to provide knowledge for data recovery mobile devices, even when failures have different types.

Senator provincial Felicitas Beccar Varela, who he conducted negotiations to be carried out this workshop, he stated: "Tell us and train us is the best way to react to the new offenses, to provide an answer and give greater security to bonaerenses ".

2019 You will bring new crimes

Marcelo Romero "trainings are not only important to be at the forefront of the latest coming out in technology applied to criminal investigation but also good training for personnel strength. Staff need this type of training because their workplaces automates ".

"Besides incorporating digital tools makes us in our daily work kit one more tool to help people", express.

Regarding crimes, Romero explained: "The 2019 You will bring new crimes, They are mostly old crimes mutated to digital space and that makes it a new crime that we are not used to seeing. So, if law enforcement are not used to seeing this type of crime victims grow, mode becomes very profitable and that makes you start to increase the amount of imitators, criminals imitators, to start using the new "ruling", put it in some way and there we have a problem. If you add this to the lack of training or lack of knowledge that staff or can have staff in this area it makes it a breeding ground for many victims there really ".

"This year will emphasize the training that new forms of crime are beginning to investigate as soon depart, to deliver tools to law enforcement so they can make the persecution and prosecution of this crime and perform well as prevention ", Romero finished.

WhatsApp Image 2019-01-25 at 10.04.19



Marcelo Romero gave a training to students of the University of National Defense . The AALCC continues to collaborate with civil society and the different powers of the state to achieve a fairer Argentina .

All members of the AALCC working pro bono being an institution of the country and the region working with ZERO budget because it does not accept or receive subsidies or private or public entities.

 

If an e-mail threatening majoring password.

 

It is reported about a recent form of phishing using an e-mail with susceptible threat of public interest, from a case dealt with by the Department of Psychology of the AALCC.

 

Young P. It communicates denouncing the association received the following mail in English in your spam box of your Gmail account, mail opened 10 days after it was sent.

It seems that, (Cablevision password), is your pass word. You do not know me and you are probably thinking why you are getting this mail, correct?

Well, I actually placed a malware on the adult video clips (porn) web-site and guess what, you visited this site to have fun (you know what I mean). While you were watching videos, your browser started operating as a RDP (Remote control Desktop) that has a keylogger which gave me access to your display and also web camera. Immediately after that, my software program collected your entire contacts from your Messenger, FB, and email.

What exactly did I do?

I created a double-screen video. First part displays the video you were viewing (you have a nice taste lol), and second part displays the recording of your web camera.

What should you do?

Well, in my opinion, $1900 is a fair price for our little secret. You’ll make the payment through Bitcoin (if you do not know this, search “how to buy bitcoin” in Google).

BTC Address: 1MQNUSnquwPM9eQgs7KtjDcQZBfaW7iVge

(It is cAsE sensitive, so copy and paste it)

P. reports, with shame, You have actually visited a page featuring pornography, masturbating in front of the screen and fears it has been filmed by the front camera of your notebook, such as mail says English. She says she is distressed at the prospect of being exposed to their relatives. P. mail content facilitates the association and explains what is phishing, leaving the channel arranged to your attention any concerns.

 

Notes:

  1. It has been found that from July 2018 It has begun to circulate this mail between English speakers and that it has been received by people who were involved in the activities that the e-mail describes.

  2. The mention of one of the passwords of the victim appeared to function as proof of veracity of the facts below describes the mail.

  3. The mail then describes indeed a very common and frequent occurrence, although socially repressed: masturbation by consuming pornography on the Internet. It exploits the tendency for different devices have a front camera.

  4. The mail attempts to be credible appealing to what the victim knows. "I put malware on the website of adult videos (porno) and guess what, visited this site for fun (and you know what I mean)", "You have very good taste, LOL (laughing out loud)". We see what page is not mentioned, what kind of sexual content or that way of satisfaction is, but the "you know what I mean" superego functions as a mirror of what the victim does not want to talk.

  5. Affections involved are to blame and that have to do with self-esteem (as shame), that materialize in the threat of exposure if it is not paid.

This gallery contains 1 photo.

The presentation, Lawmakers convened by Hernan Reyes and Ariel Alvarez Palma authors project that incorporates the Offenses Code of the City of identity theft , Illegitimate cyberbullying and publication of intimate images Pte took place in the living room. Alfonsin . They also participated Drs. Diego Migliorisi , Luis Nocera , the epecialista Marcelo Romero , Justice Undersecretary of the city and officials of Public Prosecutions.

 

Cybercrime

Crimes on the web, the crimes of the century-

 

With broad participation of professionals, journalists and the general public, The meeting highlighted the uses and abuses in the handling of data in public administration, and a clear picture of the types of crime on the web and the risks we incur when citizens have a cell, a computer or a simple game console, It is the first municipality to take this issue to generate collective consciousness.

 

 

With the presence of outstanding professionals in the subject as doctors and Diego Luis Nocera Migliorisi, hand National Congresswoman Gabriela Burgos and with the support of the Municipality of San Salvador de Jujuy with the figure of Agustina Apaza, Secretary of Finance, crimes carried out the first training on Ciber intended for public administration staff, healthcare professionals, The education, the media and the wider community.

 

 

 

Diego Migliorisi -Luis Nocera – Gabriela Burgos

In this ambit, Agustina Apaza, welcomed the initiative of the national representative, Gabriela Burgos "cybercrimes often talked about in the third person. We forget that we are all exposed, either from our workplace as well as personally. This talk highlighted the uses, abuses and risks in data management in public administration, as well as a broad overview of the existing legal regulations and legal "

This problem has been addressed at the national level so far this year, He remarked Congresswoman Gabriela Burgos, waiting for clear progress "today we must be aware and know what we're talking about when we touch the subject of web and cybercrimes. Knowing the risks and consequences when executing actions. While it may sound harsh, the web does not forget or erase, all our actions are recorded and can bring irreparable consequences for us or harm to others, recognizing that teenagers and children are the most vulnerable public "

In the lectures, Dr Migliorsi much el como el Dr. Nocera, through real examples they demonstrated how the simple use of a cell in the wrong way and leaves us exposed to different threats. WiFi without proper monitoring or bluetooth activated in situations that warrant no longer makes us vulnerable, where our information, our data, and consequently our privacy are the crime scene.

"We must realize from homes and be responsible with games of our children," remarked Dr.. Nocera, They explaining the actions of those who are "attentive to act", Entering from a simple game to play or activating cellular litter or computer while a child is playing with her.

Through horrifying statistics that put Argentina as the 5th largest consumer of child pornography and within the first produce, from different areas is paramount information, education and real awareness.

"We talk about heinous crimes committed through the web, such as child sexual abuse, the issue of human trafficking, own crimes Site (bullying , sexting, among others) so a wide panorama opens on these new criminal actions taken ", Burgos said the congresswoman, remarking that there are cases where justice had to change the identity of some people to move on with their lives, and other, It was reached extreme cases as suicide, "We talk about crimes that can change our lives and threatening them".

 

"Report is the first step"

 

Specialists advised parents on the subject. The first is to try to be present, talking to children, never challenge them, since the child / a containment should feel your family to tell what happened. Confidence in the main engine along with containment and support to make the complaint, where the person "feels exposed, and even violated responsible "

Another point is "Do not delete anything", take screen shots as possible, copy https, guard photos, chat and videos that will serve time research.

SOURCE http://sansalvadordejujuy.gob.ar/intendencia/ciberdelitos-2

 

The board of the AALCC , were received in the Ministry of National Security by the holder of that portfolio the Pull. Patricia Bullrich.

At the meeting we discussed the issue of crimes configured through computer media we raised various proposals were under consideration by the officials. As part of the meeting which was attended by Drs Luis Nocera , Diego Migliorisi and Marcelo Romero highlighted the important work of the minister and his cabinet in significant advances in the fight against organized crime , Drug trafficking and cyber crime.

 

The president of the Criminal Law Committee deputy Gabriela Burgos and deputies Lopardo, Libermann and Albornoz Schmidt presented a bill that incorporates the figure of the undercover agent online .

With the addition of this figure will be achieved clarify that thousands every year go unpunished cases configured through fake profiles, anonymous or criminal organizations that use software tools for not detected.

Read

This initiative arises from the need to provide more tools to justice when investigating crimes related to organized crime. In our country the Argentina Association to Fight Cybercrime (AALCC) It is one of organizations working the issue and who have raised concerns us to contemplate a change in our legislation that provides a concrete response to the constant evolution of the realization of this type of crime.
As we know the new technologies of information and communication have led to the birth of new instruments of attack through these means, becoming more frequent commit crimes perpetrated by the use of Internet.
It is a fact that millions of people use Internet, because among other things, It facilitates communications between individuals providing various benefits, but it is also true that the network facilitates the commission of crimes in cyberspace that otherwise would not have been committed to the possibility for cybercriminals to adopt another identity to approach their victims through online services, or through social networks.
Examples of the influence networks can appreciate daily, he 18 April this year has been dismantled in Spain an international child pornography network composed by WhatsApp users 18 European countries, Central and South America where it was captured and detained in Colombia for more than thirty people involved in this transnational crime. The investigation remains open in our country.
Cases like this challenge us to modify existing laws and leads to the permanent development of our criminal justice system, which it requires a parallel evolution to that experienced by the criminal activity to respond to new security demands raised by the society in which we live.
That is why the use of technology by the state is currently serving a dual role in relation to criminal proceedings: on the one hand it allows refining the analysis means for research and testing offering more reliable results, and on the other, allows the prosecution of those crimes directly connected with technology, growing number.
Spain for example already advanced in this subject and in its new regulation of the Criminal Procedure Act, in the article 282 to, contemplates the figure of computer undercover agent for investigations affecting own activities of organized crime, where the competent judge and Prosecutions, They may authorize officers of the judicial police, and taking into account their need for the purposes of research, to act under a false identity and to acquire and transport objects, effects and instruments of crime and defer the seizure of the same.
This project seeks to incorporate the figure of computer undercover agent to the current law 27.319 in order to provide a new tool to justice to those obstacles found when investigating these crimes. The figure of the undercover agent and is regulated in our legislation, This project aims to give greater scope and specificity while maintaining the provisions of the Act.
For these reasons it is that I apply to my peers approval of this bill.
http://www.hcdn.gob.ar/proyectos/proyecto.jsp?exp = 2714-D-2017

The team of AALCC stated in the Criminal Law Committee of the Chamber of Deputies on the importance of sanctioning projects “tenure child pornography ” Illegitimate publishing pictures – ponovenganza-” that obtained unanimous opinion with the support of all the blocks.

On the day that also positively addressed the law limiting the Prisoner releases and street harassment , Were present Drs. Diego Migliorisi , Marcelo Romero on behalf of the AALCC and recognized members of the Committee members as its president, Dr. Gabriela Burgos ,Marcelo Wechsler ( drivers of any of these projects ), Luis Petri , Diana Conti, Victoria Donda among others .

Luis Petri-Gabriela Burgos-Diego-Migliorisi Marcelo Romero

 

The Directorate of the Department of Psychology of the AALCC provides counseling for adults, couples and families victims of cybercrime, as well as professionals who work with this problem.

Envíe un mail a lucas.vazquez.topssian@cibercrimen.org.ar, to request and coordinate consultation totally free.

Frequent questions:

1) Should I pay something for orientation?

No. The Argentina Association to Fight Cybercrime is a non-profit, which opens the doors to the community to prevent and address related to cybercrime cases.

2) I live far from the headquarters of the AALCC, How I can check?

Read


You can make Skype consultation, mode often chosen by their ability to shorten the distance. Sending an email to the address listed above, You can coordinate the meeting this way for a day and a specific time.

3) Why should consult cases?

Although each situation is unique and no two cases are alike, most of the queries can be grouped into the following groups:

computer harassment: It is a sustained assault in time, in which a person or group of persons is attacked through digital media, by insults, threats, disclosure of intimate or false information, among other form. It has names and characteristics depending on the area where it occurs. cyberbullying, common among adolescents, It occurs in education. At work, It appears in the form of mobbing. There may also be computer harassment in the intimacy of a couple.

Grooming: New technologies have updated old problem. Grooming involves those actions taken by an adult in order to gain the trust of a child and later to sexually abuse him. It is an extremely delicate situation that must be addressed without losing time.

Assist parents: Often parents feel worried and / or overwhelmed by the behavior of their children on the net. How to discuss certain issues with them? What are the risks? Primary prevention is extremely important, because it is one that seeks to prevent future damage.

Assistance to teachers and schools: Computer harassment, in the form of cyberbullying, It has positioned itself as one of the main problems in education of middle school. The AALCC offers talks, activities with students and / or teachers who think and act to allow this problem.

other causes: anxiety and stress caused by ICTs, interpersonal problems caused by social networks, compulsive behaviors, etc.

4) I am involved / a in a computer crime for which I am ashamed / modesty talk.

Often difficult to talk about certain topics, especially those having to do with intimate aspects of private life or. The problem is that by remaining silent and isolated, the victim ends up favoring the impunity of the aggressor. You must understand that you are not alone / a and that the aim of AALCC professionals is not to judge, but provide guidance to the victim. AALCC professionals are constantly trained and observe ethical standards, as professional secrecy and the protection of personal data.

5) What I benefit a psychological orientation of the AALCC?

The immediate benefit is to be heard, which it is not just in situations of distress related to cybercrime. Although no treatment is a way of psychotherapy, the counseling can help the victim realizes what behaviors encourage or stop the actions of her attacker and thinking strategies that can mitigate or prevent damage.

We received the deputy Gabriela Burgos , president of the Criminal Law Committee. We talked about the projects to be discussed in committee this year concerning offenses that are configured through Internet and malicious behavior is not classified as “Pornovenganza” , “Ciberbullying” , ” Digital identity theft” , ” possession and collection of child pornography” , among other projects .

 

The Office of the City and the Argentina Association to Fight Cybercrime signed 27 October a framework of mutual collaboration agreement with a view to optimize the work of preventing and eradicating crimes committed via the Internet.

Under the agreement, both parties undertake to carry out joint activities, share information and undertake projects in education and training. As agreed, the first activity held in conjunction the Office of the City and the Argentina Association to Fight Cybercrime is training in public and private schools in the city of Buenos Aires, to raise awareness and warn students of the dangers that exist when surfing the Web.

The agreement was signed by the Attorney General of the City, Luis Cevasco and the President of the Argentina Association to Fight Cybercrime, Luis Angel Nocera at the headquarters of the Attorney General, Paseo Colón 1333. Corps Director of Judicial Investigations were also present, Enrique del Carril, the Judicial Department of the Liaison Office of the Attorney General, María Eugenia Capuccheti, and the founder of the Argentina Association for the Fight against Cybercrime member, Daniel Giller, among other officials.

conveniocibercrimen_1conveniocibercrimen_2

In the Argentina Association Against Cybercrime a commission of legal analysis and inicativas parliamentary work. During the 2016 important bills were presented at the initiative of the AALCC , certainly – if approved- It would be fundamental advance in the fight against impunity and crime.

Since the AALCC believe that violence, injustice and fight against impunity has no flag and silence and / or loopholes only victims harvest.

The projects presented in March period 2016 and October 2016 son :

  • Incoporpoar the Criminal Code collection of child pornography
  • Incorporate the Criminal Code harassment , harassment and humiliating treatment .
  • Penal Code incorporate digital identity theft (fake profiles)
  • Incorporate the Criminal Code Illegitimate publication of intimate images (pornovenganza)
  • Argentina incorporate into legislation the right to oblivion.

Bills in Congress

Dr Luis Angel Nocera represented the AALCC in the days of freedom of expression and internet in the Chamber of Deputies of the Nation , invited by Deputy Karina Banfi, vice president of the commission of free speech in the Chamber of Deputies

Since the AALCC believe that freedom of expression in all its forms must be respected and protected . However the judiciary is responsible for establishing the limits of her or his abuse.

The violence , The agression , humiliation , instigation has nothing to do with free speech .

Karina Banfi Congresswoman , vice president of the commission of freedom of expression of the Chamber of Deputies of the Nation.

Karina Banfi Congresswoman , vice president of the commission of freedom of expression of the Chamber of Deputies of the Nation.

The doctor. Martin Ocampo received executives of the AALCC . the current problematic issues of crimes configured via the Internet and various proposals to collaborate in the fight against crime were treated.

The current minister , in its passage by the Public Prosecutor as a federal prosecutor of the City, He has shown great commitment in the fight against cibercriminidad .

Ministry of Security and Justice City

For the purpose of collaborating in the fight against discrimination, Xenophobia , gender violence ,Homophobia and apologia Internet crime, Monday 5 September we received the Dr. Brian Schapira Under Secretary of Human Rights of the Nation.

 ddhh2

 

Investigadores Kaspersky Lab reported that recently found a new piece of Android malware with sophisticated design to steal banking credentials of a user. The malware is similar to other schemes that have been before to the extent that intelligently uses phishing attacks designed to trick users in order to send your ID and password bank.

Read

Most worrisome is that the malware is able to intercept, delete and forward text messages even banking institutions. The danger is twofold run: first, some banks send users an alert or notification when suspicious activity is detected bank, if the malware can delete such messages, users remain oblivious to the fact that your account may have been compromised; in second, some banks have security protocols that require user authentication for certain transactions or unusual banking via SMS. The report notes that “malware can counteract mobile security solutions that are popular in Russia to complete the processes.”

Kaspersky added that malware spreads through network advertising Google AdSense:

This morning we met a gratuitous act of violence against Android users. Just watch your favorite news sites during your morning coffee, they may end up downloading last-browser-update.apk, a banking Trojan detected by Kaspersky Lab as Trojan-Banker.AndroidOS.Svpeng.q. Are you there, minding your own business, reading the news and BOOM! There are no additional clicks or following links necessary. And be careful, Still out there! It turns out that the malicious program is downloaded through the Google advertising network AdSense. It is advised that many sites use this network (not only news sites) to display advertising to users. The Trojan is downloaded as soon as you visit a page with the announcement.

Importantly, Kaspersky said the malware, for now, only it appears for users in Russia. The problem was solved quickly and Google reports that there is no indication that the problem will affect more than one website.

Source: Yahoo JH

The offenses referred mettataging, typosquotting and cyberquatting are willful misconduct ( besides the computer fraud) that affect more professional, Business , businesses or trademark owners , causing significant economic loss and information . It is establishing a working committee convened by the AALCC by its president Dr Luis Angel Nocera and Secretary General Dr. Jorge Cosenza began working on alternatives to resolving this type of conflict . Soon we will provide a full report on the subject.

These crimes are related to the diversion of customers and / or traffic through publications and / or misleading actuations. The registration of existing brands or very similiar domains existing brands.

These registrations can also lead to other crimes set as .

Remember that the AALCC advises and assists for free also companies , professionals and independent traders.

 

Luis Nocera . Jorge Cosenza

Luis Nocera . Jorge Cosenza

jorge Consentia

Dr Luis Angel Nocera

According to a study by Kaspersky Lab and B2B International in 2015, from over 5.500 IT specialists 26 countries of the world, he 48% companies recognize the serious threat posed by the cryptomalware that, it is estimated, It has infected more than 234.000 computers.
The global picture of cyber threats continues to grow and cybercriminals have discovered that malicious data encryption, followed by a ransom demand, It can be very profitable. Many companies admit that often pay that ransom.
Read

Businesses are a tempting target for these attacks for ransom. No matter if the size of the company is very small or large, the cryptomalware find a way in if you do not have to lock safety. Like other forms of malware, It is introduced into a network through emails, malicious attachments or links on a web page unsuspecting employees affected open, down or click on them. There are no signs that put users on notice that they have been infected until they get the ransom demand.

Regarding Latin America, the most affected countries, ranked by penetration ransomware, son: Brazil, Costa Rica, Chile, Argentina and Colombia.

"From financial institutions, government agencies, academic institutions, and hospitals, any organization can be the focus of an incident caused by ransomware. The main motivation behind these campaigns is money extortion, evolving an age dominated by simple lockers, that only block devices but do not encrypt the information, one where the crypto-kidnappings have proven to be much more lucrative for cybercriminals ", He said Santiago Pontiroli, Security Researcher at Kaspersky Lab. "In addition, criptomonedas the boom has caused this 'business' remains one of the favorite by cybercriminals ".

according Pontiroli, ciberespionaje as Grabit campaigns have particularly affected small and medium-sized enterprises, posing a new scenario regarding cyber crime.

Among the most common consequences of an attack by ransomware loss of information temporarily or permanently are; interruption of scheduled services (lost profits); financial losses associated with the restoration systems, legal costs and IT; and damage to business reputation and loss of confidence by customers.

Kaspersky, reliable security solution and several layers is all that will stop the cryptomalware. further, stresses that this must have a OS original and updated. In Argentina, according to figures from Business Software Alliance, more of 69% installed software is illegal.

ransomware- AALCC

"Victims cryptomalware companies often pay without realizing that there is no guarantee that your data will be unlocked when they do, and there is evidence that a poorly coded ransomware is some information may never recover. The best way to protect data and assets of the company is to implement comprehensive measures cybersecurity all-encompassing, from infrastructure and storage to mobile networks, all accompanied by awareness and education of employees. On the other hand, it is essential that backup data are made regularly, so that the company is not in the unenviable position of having to choose between paying the ransom or losing your data ", Pontiroli said.

To help businesses, regardless of size, to face the growing threat of cryptomalware and protect all of its goods and IT infrastructure, Recominedo Kaspersky Endpoint Security solutions for Business and Small Office Security, since, assures, "You provide reliable protection against cyberthreats known, unknown and advanced, including attacks ransomware ".

Source : http://www.enfasys.net/2016/03/11/argentina-entre-los-paises-mas-afectados-por-ransomware-en-la-region/

We finish together with impunity. If you are a victim of a crime through internet please report it to the authorities. The AALCC is available to assist you throughout Argentina.

Cybercrime


no to violence on the webInternet against violence

In the framework in crime fighting soon we launch a national campaign against violence on internet. We seek a internet without violence or aggression.

Violence in the Web has grown strongly in recent years society Argentina and the world , materializing in many cases violence outside.

To participate escribinos denuncias@cibercrimen.org.ar . Please enter City , Contact nro province.

Atte.

AALCC team


Our commitment is with people.

We grow to help. Report from January to April 2016

The AALCC c , It provides technical assistance , pscilogico and guides the victim must lie to where the complaint.

We are the first civil partnership throughout Latin America with this clear objective, and we continue to grow slowly by steadily.

Read

We deeply appreciate the different associations and professionals in various fields have been added to assist the AALCC and who have actively joined the association, thus increasing the operational capacity support can provide answers in less than 24 business hours throughout Argentina.

The pursuit of ending the impunity of offenders that operates over the Internet is not an easy task, We have circumvented many obstacles, but also a lot of support from society in general.

The most important of the AALCC is human capital and time dedicated professionals in each area in the legal and technical assistance who asks us to our reaching.

In the last two years we have seen a considerable increase in crimes against minors, Revenge porn cases, threats, incitement to violence and above all operational mutation of organized crime to the web.

We have also collaborated on important bills such as the crime of revenge porn, right to oblivion and saved IP connectivity to the evidentiary effects of crime.

During the months of January and April 2016 We have held meetings with representatives of the three branches of government in order to provide our view on the growth of cybercrime in Argentina society and present more than 12 Parliamentary initiatives to fill gaps order to achieve legal and procedural.

The AALCC is an independent institution that receives no subsidies or external aid contribution conduct their partners and members of the executive committee.

If you're a person with a vocation to help and fight crime through internet. Always be the open doors of the AALCC.

We continue to work harder every day to help Argentines.

We will continue thinking and presenting proposals and initiatives to the powers of the state to help that together we achieve a less violent and less impunity Argentina.


hoax
the Hoax , it can be a modus operandi for many offenses subsequently set back .

Los Hoaxes (joke or hoax) messages are false alarms virus or any other type of warning or chain (or even solidarity involving health) or some kind of complaint distributed by email, whose common denominator is to ask users to distribute them to as many people as possible. Its sole purpose is to deceive and / or disturbing.

Read

Currently many false alerts hoax messages and ask to be forwarded, quickly become spam They collect as many e-mail.

Hoaxes in Social Networks:

formerly these false messages or chains They came exclusively by email, but today it is common to see them on the walls of our friends or family on social networks, trying to surprise us with messages that attract much attention.

With the current furor of social networks and the possibilities of combinations of text and images, have today taken another form, arriving to proporciones unusual. Please recommend not forward or republish these messages or publications.

Note: Not to be confused with spam publications (advertising) or publications with malicious links (leading to infected sites).

font : http://www.seguridadpc.net/hoaxs.htm


What is cyberbullying?

He ciberbullying is the use of electronic means (Internet, mobile and online video games mainly) to exert peer bullying. Is not here strictly harassment or abuse of a sexual nature or cases in which adults involved.

Read

What is cyberbullying?

Therefore there must be lower at both ends the attack to be considered cyberbullying: if there is an adult, then we are looking at some other cyberbullying.

Nor it is coaxing adults to minors to meet them outside the network or exploit their sexual images. Although there are times when a / a minor begins a campaign of cyberbullying that can end involving adults with sexual intentions.

When we have a case of cyberbullying?

We are facing a case of ciberbullying or less when a tormenting, threat, hazing, humiliates or annoys another / a by Internet, mobile phones, gaming consoles or other telematic technologies.

According to him Study on safe habits in the use of ICT by minors published by the INTECO in March 2009 he cyberbullying is defined as peer harassment in the ICT environment, and includes performances of blackmail, humiliations and insults from children to other children..

What you have to do with bullying cyberbullying or bullying?

They are not as similar as you might think. In both abuse occurs between equals but little else they have to do in most cases. He ciberbullying attends to other causes, it manifests itself in many different ways and strategies of soliciting and consequences also differ. It is quite possible that bullying is followed by ciberbullying. It is also possible that the ciberbullying it can also end in a situation of bullying, but certainly the latter itself is unlikely.

Why is especially severe cyberbullying?

He anonymity, the no direct and immediate perception of damage and the adoption of imaginary roles in the Red to become a serious problem cyberbullying.

Synonyms

In addition to the adaptation of the English neologism (cyber-bullying) other terms are used to describe the Castilian ciberbullying, combining the prefix cyber- or adjectives online O virtual with the words matonaje, bullying O abuse, associated with the name bullies O abusones for those who do the bullying. So we can find the following synonyms for ciberbullying: ciberabuso, cibermantonaje, cibermatoneo; online abuse, mantonaje online, bullying online; virtual abuse, virtual matonaje, virtual bullying. further, English is also used e-bullying and online bullying.

How it manifests cyberbullying?

The forms that are varied and are only limited by technological expertise and imagination of children stalkers, which is little hope. Some specific examples might include the following:

  • Hang on Internet a compromised image (real or made by photomontages) sensitive data, things that can hurt or embarrass the victim and make it known in its relations environment.
  • To register, with photo included, the victim in a web where voting is the ugliest person, to less intelligent ... and charge of stitches O votes to appear at the top.
  • Create a profile or false space on behalf of the victim, in social networks or forums, where are written as a first-person confessions certain personal events, demands explicit sexual contacts ...
  • Leave offensive participate in forums or chats aggressively posing as the victim so that the reactions will subsequently directed to those who have suffered the impersonation.
  • Being discharged the email address at certain sites which then fall victim to spam, contact with strangers ...
  • Usurp your password email, in addition to change so that the rightful owner can not see, read the messages that come to your mailbox violating her privacy.
  • Cause the victim in web services that have a person responsible for monitoring or moderate what is happening there (chats, online games, Virtual communities ...) for a violent reaction, once denounced or evidenced, it implies the exclusion of who really was being the victim.
  • Rumors circulate in which the victim is supposed reprehensible behavior, offensive or unfair, so are others who, without doubt what they read, They exercise their own forms of reprisal or harassment.
  • Menajes send threatening e-mail or SMS, chasing and stalking the victim in Internet sites it is related in regularly causing a feeling of complete oppression.

Source : http://www.ciberbullying.com/cyberbullying/que-es-el-ciberbullying


Digital identity theft: The bridge dozens of crimes

adopting, creating or appropriating an identity on the internet although it should be considered a separate offense also consider this willful action as "the bridge dozens of crimes" in which the author seeks impunity from anonymous course.

digital identity theft , the door of crime

Threats, incitement to violence, slander, child pornography, condoning crime, discrimination, extortion, minor crimes such as corruption of minors and grooming are some of the more than 45 criminal types that are set up in many cases with false identities or appropriate digital.

This willful misconduct that affects millions of Argentines who fall into despair when they saw the damage they have any criminal consequences for its author as in Argentina digital identity theft is not a crime.

But beyond conmiserar it should be a separate offense, the commission of any crime through fake profiles, adopted, or appropriate should be considered an aggravating.

In 28/09/2016 in collaboration with the AALCC , a group of 10 Low deputies in the number 6751-D-2016 They presented a project that incorporates Article 139 TER the crime of digital identity theft, a fundamental tool for advancing categorically against impunity and crime.

This project is still awaiting treatment in the commission of criminal law on deputies.

http://www.hcdn.gov.ar/proyectos/proyecto.jsp?id=191192

Cyber-exhibitionism: Why they take and share intimate photos?

Often they appear related to cyber porn-revenge news (revenge porn), where one or more people spreading sexual images of a victim, without their consent.

Read

We know that in most of the time, the victim voluntarily agreed to take those pictures and share them, trusting that the recipient of material would keep them in the private sector. Given these facts, It is common to hear the question “Why [the victim] He took those photos?”. There is a logical temptation: if there is no sexual photos, then there is nothing to spread. The problem is that this question can and tends to be formulated in order to blame and condemn the victim. Since the AALCC, we firmly believe in the rights to liberty and privacy (art. 19 CN) and we take the question with a preventive objective.

sexting

The conduct of a sexual picture fits into what we know as exhibitionism, where the subject who shares the enjoyment of watching him undress. In this case, the exhibitionist uses technology for display. Now, it is not possible to make a stable inference about a psychic symptom and cause or origin. Why? Because the dynamics of the unconscious never develops in the sense of a logical implication such a symptom to identify the structure of the subject who stated. In summary, the same phenomenon (exhibitionism or to be) You may correspond to various causes.

Speaking of exhibitionism, it is impossible not to think about the perverse structure, especially for those who read “Instincts and their destinations” Freud, which describes the fate of instinctual back to the person himself. In this text, exhibitionism is presented as a returned voyeurism on self, as it includes the fact of looking at the body itself.

In perversion, the exhibitionist is offered in view of the Other, and may generate modesty and putting at the mercy of his desire. The perverse exhibitionist seeks to surprise the other, that is moved by the unveiling. Can we diagnose a subject as perverse from having observed an exhibitionist act? No. We will see that the exhibitionist component may be present in other structures.

The exhibitionist component is also present in hysteria. In this structure, the set adopts highly invasive test narcissistic proportions. Hysterical bet wanting to like the other usually blind, trying to question the other so that it is fascinated and subdued. We know the abiding conviction of imperfection in which they live hysterics leads them to try to hide: clothes, ornament, decoration, roleplaying. further, all them is appropriate to try to make more appealing the eyes of others, which for them it is very little. We can think of the screen and the camera mobile phone is ideal for convening this look, lived as poor. In the hysterical and hysterical provision is named and all: “given to see”. In the hysterical woman, giving to see always refers to the body. Instead, in man it involves the whole body. after this “give to see”, a demand for love and recognition is hidden and for both men and women, the devices are priority.

Both men and women hysterics, in this case, also they use the display as a staging of the body. The bet, in this case, It is trying to act as if the eyes of others is always sostuviera, so that the subject can enjoy phantasmatically trial for allegedly disapproving him. In this way, for instance, a man manages to avoid a direct confrontation with a woman, in the sexual arena.

It has also been observed that this photo exchange between men can be used as a mask or homosexual game. It is not a true homosexuality, but a secondary compensation: if the other is like unto, then it protected from sexual difference.

Regarding obsessional neuroses, we know that these subjects are extremely scrupulous with the rules and that the slightest infraction fills them with anxiety. obsessive, without knowing it, It does terrible efforts to try to be perverse, but it never fails. He does not know that his obsessive defense legality is a struggle against their own desire for transgression. Obsessive can perform, exceptionally, acts that can remind a perverse transgression, although usually these transgressions are insignificant. If we think in the case of an exhibitionist act, for obsessive and even phobic, most likely a question “flight forward”. The subject, in this case, It is overcome by his own desire and acts with such transgressions. Obviously, obsessive or phobic feel guilt for the actions previously committed, while a wicked not.

In conclusion, the same behavior can have different causes and appearing under different clinical modalities. On the other hand, We saw how new technologies allow you to update as old as culture practices.

What to do?Regrettably, the cyber-exhibition has risks, one of which is precisely the disclosure of such images. Before sending any material, It is recommended to think about the possible consequences of that action. It is not a mandate to repression, but remember that the Internet allows the permanence and lack of boundaries. What you share may reappear many years later and reach people who do not imagine us.

I share the story of a patient, victim of cyber-revenge: “I never thought, to get me those photos, that come to people who did not exist at that time: my children”.

Lic. Lucas Vazquez Topssian

M.N. 60.896
Degree in psychology
Director of the Department of Psychology of the AALCC

The threat of the web.

In recent years the growth of child pornography through computer media has grown in precipitous way in Argentina and the world.
No doubt this is one of the most heinous crimes of our criminal regulatory body (Crimes against sexual integrity, Title III Chapter III Argentine Penal Code) and penalties are set up 15 years in prison for those for whom they trade, trasmitan, or publish such material retrasmitan.

Read

With the information revolution, the global web accessibility and pseudo-anonymity that can be found in it, many networks dedicated to pedophilia and child pornography have begun to use the dark side of the Internet to develop their criminal activity in search of impunity.
But these organizations or criminal networks would not achieve their goals without their perverted consumers. In Argentina the consumption and possession of child pornography is not a crime, ie if a "user" decide browse through internet looking for this type of content download, storing and / or collect them would mean no penalty in Argentina.
That is why from the AALCC present the initiative to establish such an action in the Argentine Penal Code.
The Spanish legislation is one of many countries considered as a penalty in his article 189 1)
b) Who produces, selleth, distribuyere, exhibiere, offereth or facilitates production, sale, dissemination or exhibition by any means of child pornography or whose production have been used people with disabilities need special protection, or possesseth for these purposes, although the material having its origin abroad or be unknown.


That crimes can be configured via Internet.

Introduction

 

According to analysis conducted we believe are at least a 50 crimes that can be configured through the internet that is defined in the second book of the Argentine Criminal Code, without considering the special laws. Although worth noting that less than a dozen of them are what we define as "proper Informaticos" ie that its configuration is inescapably requere a computer as is the case of classified and / omodificados by her law 26388/2008 or the recent incorporation of the crime of grooming.

Read

But the progress of the criminal mind is not simply a few crimes , but unfortunately we must understand that cyberspace , computer platforms, social networks and other technologies bring innovations - when used by the offender - as tools for new forms of commission of traditional crimes (common before the computer age). By understanding this delicate situation clearly we observe what they mean these new ways of committing crimes , not only by the severity of many of them but by how difficult it means the investigation of crimes configured through Internet , that beyond the complexity refers to the second anonymity of the web, in many cases it expresses collaboration of foreign naicones justice in trial production as its proper preservation and speed required . In addition many complex as arms sales, drugs, Trafficking, although they can not be configured entirely through internet , computing platforms are a great support for configuration.

 

2 Crimes

We note that in accordance with the criminal offense under Argentine regime are few 185, many of them are those that can be configured through Internet , ie the actions of the offender behind a keyboard produces the effects on the victim willful aptitude and thus the consummation of it.

Beyond the exposed, there are other crimes that today can not be configured through the web , by purely material issues , computing platforms can serve as a vital support for the configuration of the same.

The offenses that if they can congirurarse over the Internet are the following:

a) Crimes against honor

  1. Article 109 : caluminia o la la falsa imputacion
  2. Article 110 : the deshonrra or discrediting
  3. Article 113 : publciacion or reproducing the injuries inflicted by another
  4. Article 117 to : providing false information to third parties contedia in a personal data file.

 

B) Crimes against sexual integrity:

5) Article 125 : Which it promotes or facilitates the corruption of under eighteen, even with the consent of the victim

6) Article 125 to : Which it promotes or facilitates the prostitution of a person

7) Article 126: Aggravating Articles 125 and 125 to

8) Artículo128:who produces, financial, offereth, Wholesale, publication, facilitate, disclose or distribuyere, by any means, any representation of a child under eighteen (18) years devoted to explicit sexual activities or any representation of their genitals for predominantly sexual purposes, like which will organize live shows explicit sexual representations that minors participaren

9) Article 129:which implements or did perform other acts of obscene exhibitions involuntarily exposed to be seen by others.

C) Crimes against freedom :

10) Article 149 to: It shall be punished with imprisonment from six months to two years who uses threats to alarm or frighten one or more persons.

11) Article 149 have item 2 and 3 (aggravating the 149 to)

12) Article 153: unauthorized access to an electronic communication third. Delete or alter

13) Article 155: wherein, being found in possession of a map, An electronic communication, a closed tender, a telegraph office, telephone or other, not for publicity, doeth publish unduly, if the act causes or it would cause damage to third parties.

14) ARTICLE 156: wherein, taking news, by reason of their status, job, employment, profession or art, a secret whose disclosure could cause harm, revelare it without just cause.

15) ARTICLE 157: the public official who divulges facts, performances, documents or data, which by law must be secret.

16) ARTICLE 157 TO: wherein: 1.Knowingly and illegitimately, systems or violating confidentiality and data security, accediere, anyway, a bank of personal data;

  1. Illegitimately either provide or disclose to other information recorded in a file or in a personal database whose secret bound to preserve by provision of law.
  2. Illegitimately will insert or makes insert data into a file of personal data.

  1. d) Crimes against freedom of work and association:

17) ARTICLE 158: the worker who has exercised violence over another to compel him to take part in a strike or boycott. The same penalty will suffer the pattern, employer or employee, by itself or on behalf of someone, pursues coercion to compel another to take part in a lock-out and to leave or enter a working society or certain employers.

18) ARTICLE 159: that, for environment machinations fraudulentas, evil suspicions or any means of unfair advertising, try to divert, their advantage, the clientele of a commercial or industrial establishment.

 

  1. e) Crimes against freedom of assembly:

19) Article 160: Which materially impedes or a lawful meeting turbare, with insults or threats to the speaker or the institution organizing the event

  1. f) Crimes against press freedom:

20) ARTICLE 161: Which prevents or prevent, hinder the free movement of a book or newspaper

 

  1. G) Crimes against property:

21) ARTICLE 162. – It shall be punished with imprisonment from one month to two years, which unlawfully seizes a chattel, wholly or partly outside. -(computer theft through unauthorized access to computer systems).

Clarification: The concept of "computer theft" produces an effect different from the traditional desapoderamiento theft, beyond that whoever enters unduly copy information without damaging or remove content. When the article was sanctioned 162 in our country impossible therefore this concept to consider not existed computer means.

Then it is very different access to damage a computer system, violating electronic correspondence, simply enter access unduly copy content.

In Latin America and the Honduran penal codes and Venezuelan literally cite examples use the phrase "computer theft".

Article 13 cybercrime law Venezuela. Theft.

Who through the use of information technologies, access, intercepts, interfere, handling or use of any form a system or media to seize goods or tangible or intangible patrimonial values ​​its holder snatching them, in order to procure an economic benefit for himself or another, He shall be punished with imprisonment from two to six years and a fine of two hundred to six hundred tax units.

 

Art 223 Penal Code of Honduras "to chattel electric power is equated, the radio spectrum and other kinds of energy waves or telephone systems, television, facsimile or any other computer that has economic value".

 

The AALCC has presented as a proposal to amend Article 162 CPA adapting to new technologies.

 

22) ARTICLE 168:Extortion– It shall be punished with imprisonment or imprisonment of five to ten years, which with intimidation or simulating public authority or false order of the same, forces another to deliver, to send, deposit or make available or to a third party, stuff, money or documents that produce legal effects. It incur the same penalty that by the same means or violence, forces another to sign or destroy documents or credit obligation.

23) ARTICLE 169: Extortion– It shall be punished with imprisonment or imprisonment of three to eight years, wherein, by threat of charges against honor or violation of secrets, commit any of the facts stated in the preceding article.

Scams and other frauds

24) ARTICLE 172. – It shall be punished with imprisonment from one month to six years, which defrauds another with an assumed name, simulated quality, fake degrees, influence lie, breach of trust or feigning goods, credit, commission, company or trading or making use of any ruse or deception. (Through the system called phishing emails that simulate trap entities)

25) ARTICLE 173: Aggravating the artículo172. item 16. The one who defrauds another by any computer manipulation technique that alters the normal functioning of a computer system or data transmission. (subsections 3,6 and 10 They can be configured via the Internet)

26) ARTICLE 174 (other fraud) item 6 °. – Which mischievously would affect the normal development of a facility or commercial exploitation, industrial, agricultural, mining or intended for the provision of services; destruyere, Dana, doeth disappear, conceals or fraudulently disminuyere the value of raw materials, products of any nature, machines, equipment or other capital assets.

DAMAGE:

27) ARTICLE 183 second part: Which alters, mutilates or destroys data, documents, programs or systems; or sells, distribuyere, doeth circular or introdujere in a computer system, any program to damage

28) ARTICLE 184 (aggravating): item 6. Run on computer systems for the provision of health services, communications, supply or transportation of energy, means of transport or other public service.

Crimes against traffic safety and transportation and communication

29) ARTICLE 190. – It shall be punished with imprisonment from two to eight years, knowing which implements any act that endangers the safety of a ship, floating structure or aircraft (Means of transport in many cases are controlled by radar, and software that allow control and automation thereof. These systems can be violated and sabotaged therefore can produce an intentional done without them is accessed through the web or other computer media)

30) ARTICLE 194. – which, without creating a hazard common, impedes, prevent, hinder or delay the normal functioning of transport by land, water or air or public communication services, water supply, electricity or energy substances, It shall be punished with imprisonment of three months to two years. (By drones or devices for computers as well directed emission, breach or interruption of communications by blocking services) Regarding the mezzanine landing technology of IP telephony makes this crime - disruption to communications - start to become more common over the Internet.

 

  1. H) CRIMES AGAINST PUBLIC ORDER:

Incitement to commit crimes

31) ARTICLE 209. – Who publicly incites to commit a particular crime against a person or institution,

Illicit association:

32) ARTICLE 210. – It shall be punished with imprisonment or imprisonment of three to ten years, who takes part in an association or group of three or more persons to commit crimes by the mere fact of being a member of the association. For the leaders or organizers of the association the minimum penalty is five years' imprisonment or imprisonment. (While it is not very common to observe that configure racketeering crimes through internet can exemplary cases of groups of people intended to steal private or sensitive information from third parties for ransom for nondisclosure. Also cases of sale or distribution of child pornography, to cite some cases)

intimidation published:

33) ARTICLE 211. – It shall be punished with imprisonment from two to six years, wherein, to instill a public fear or provoke riots or disorders, doeth signals, hath given voices alarm, threatens to commit a crime of common danger, or uses other materials normally suitable means to produce such effects.

34) ARTICLE 212.Intigacion to collective violence – It shall be punished with imprisonment of three to six years who publicly incites mob violence against groups of persons or institutions, by the mere incitement.

35) ARTICLE 213. Condoning crime – It shall be punished with imprisonment from one month to one year, who publicly and by any means encouraging the commission of a crime or convicted of a crime.

36) ARTICLE 213 to. Other offenses against public order – It shall be punished with imprisonment or imprisonment of three to eight years which organizes or takes part in permanent or temporary groupings, without being covered by Article 210 This code, tuvieren main purpose or accessories impose their ideas or fight others by force or fear, by the mere fact of being a member of the association. (coordinated political or ideological persecution to silence third, which in this case can be expressed a forum, social networks and / or editorial)

 

  1. I) Crimes which compromise peace and dignity of the nation:

37) ARTICLE 222. – It shall be punished with imprisonment or imprisonment of one (1) a seis (6) years old, who reveals political secrets, industrial, technological or military concerning safety, the means of defense or foreign relations of the Nation. (Para substituted by art. 8No. Annex I Law No. 26.394 B.O. 29/8/2008. Validity: shall take effect on the SIX (6) months of enactment. During this period a program of outreach and training on its content and implementation will take place in relevant areas)

It incurs the same penalty which obtains the revelation of the secret. It shall be punished with imprisonment of one to four years which publicly insults the flag, the shield or the anthem of the nation or the emblems of Argentina province. If disclosure or obtaining it was committed by a military, in the exercise of their functions the minimum penalty is increased to three (3) years and the maximum penalty is increased to ten (10) years old. (Paragraph incorporated by Article. 9No. Annex I Law No. 26.394 B.O. 29/8/2008. Validity: shall take effect on the SIX (6) months of enactment. During this period a program of outreach and training on its content and implementation will take place in relevant areas)

38) ARTICLE 223. – It shall be punished with imprisonment from one month to one year and disqualification for double time, which by carelessness or negligence she shall know the secrets mentioned in the preceding article, of which there is found in possession by virtue of his employment or occupation.

39) ARTICLE 224. – It shall be punished with imprisonment from six months to two years, which unduly risen up plans of fortifications, ships, establishments, roads or other military or works that purpose introdujere, clandestinely or deceptively in such places, when the person was forbidden access to the public.

 

  1. J) Crimes against the constitutional order and democratic life:

40) ARTICLE 226 to. – Which threatens public and ideally with the commission of any of the acts referred to in Article 226, It shall be punished with imprisonment of one to four years.

  1. K) Crimes against public administration

41) ARTICLE 237. Attack and resistance to authority – It shall be punished with imprisonment from one month to one year, the who employs intimidation or force against a public official or the person who prestare assistance at the request of one or under a legal duty, to demand the execution or omission of an act of their duties.

42) ARTICLE 237. – It shall be punished with imprisonment from one month to one year, the who employs intimidation or force against a public official or the person who prestare assistance at the request of one or under a legal duty, to demand the execution or omission of an act of their duties.

43) an article was 247. Usurpation of titles and honors – It shall be punished with imprisonment of fifteen days to one year exercising an estoppel of a profession for which a special authorization is required, without having the title or authorization. (False professionals online are those that roam the web, like outside this crime can be configured via Internet)

44) ARTICLE 208: illegal practice of medicine.

1º that, without title or authorization to practice a healing art or exceeding the limits of their authorization, preach, prescribiere, Drug enforcement administration habitualmente, waters, electricity, hipnotismo or any means for treating diseases of people, even free title;

2º that, with title or authorization for the exercise of a healing art, prometiere preach or curing diseases or fixed-term secret or infallible means;

3º that, with title or authorization for the exercise of a healing art, gives his name to another hath no title or authorization, to exercise the acts that paragraph 1 of this article refers to.

It noted that the web is common to see whether ornot false healers quacks online, therefore this crime also thickens the list of which can be configured through computer media.

45) ARTICLE 83. Abetting suicide. – It shall be punished with imprisonment of one to four years, which incites another to suicide or to commit it'll help, if suicide had been tempted or consummated

46) ARTICLE 131. Grooming– He shall be punished with imprisonment of six (6) four months (4) years which, by means of electronic communications, telecommunications or any other data transmission technology, I will contact an underage person, with the purpose of committing any offense against the sexual integrity of it.

47) ARTICLE 3 LAW 23592 Discrimination: They will be punished with imprisonment of one month to three years who will participate in an organization or perform them advertising based on ideas or theories of superiority of one race or group of persons of a particular religion, ethnic origin or color, aimed at justifying or promoting racial or religious discrimination in any form.

3 FINAL THOUGHTS:

 

As this brief analysis in the previous point and without special laws are at least 47 Argentine penal code offenses which can be configured via Internet. This means that cybercrime should not only stigmatize the hacker or hacker but goes far beyond , that is included in most cases, to common crime with basic knowledge of computer use and that power settings with this form of crime commission.

But at the facilities and amenities that have the offender to act via Internet with the convenience offered aforementioned pseudo-anonymity, the speed and scope of the web among other duties comes together in the difficult and complex investigation. It is therefore essential to give the judiciary greater legislative and procedural tools to enable the specialized researcher advance at the same speed with which the offender is developed on the web.

Since the parliamentary commission proposals of the Argentina Association Against Cybercrime have been developed different parliamentary proposals for the purpose of incorporating such research tools as well as the incorporation of new crimes today are not covered by our criminal law.

The AALCC since 2014 is advising the Congress on various projects indispensable for Argentine law have a criminal regime achieve, procedural and research excellence that allows.

Atte.

Dr. Luis A Nocera. Dr. Jorge R Cosenza. Dr. Diego F Migliorisi.

President. first vowel. Secretary.

 

 

You can download the report by clicking here : Download the full text here

crimes that are configured online


Incitement to commit crimes, defend crime, public intimidation.

What happens in cyberspace, from and, It is not oblivious to what happens outside it, ie the different actions from within the web clearly have direct effects on the population that each day has a greater dependence on cyberspace.

Read

Whether through social networks, blogs, opinion pages or portals online user can communicate, inform, express themselves on one or the other subject to an incalculable speed viral effects of web platforms and search engines. For example, videos news or information notes on platforms like YouTube, Facebook, Twitter or comments news published in online newspapers can be seen by hundreds of thousands of people in a matter of minutes depending on the tenor of the published (either false profiles, Anonymous or real) hardly produce a neutral effect on the receiver.

In my previous book "Crimes in the Web" (2014 Ed del Nuevo Extremo) highlighted that a lot of traditional crimes (before the computer revolution) They can easily be set via the Internet. Among the many possible crimes and making a simple superficial analysis on the content in the Argentine and South American cyberspace I found an irrational rise of crimes against public order and incitement, described in Articles 209 and 209 bis of the Argentine Penal Code and the defense of crime, defined in Article 213 CPA.

In many cases, the cloak of pseudo anonymity offered by the web power who encouragement inhibitory, in order to generate this or that situation, they would hardly barefaced, but across computing platforms in search of impunity.

For example, if from a profile on a social network group is created "pillaging supermarkets" calling to loot supermarkets and / or businesses clearly (there were real cases) the aim of the creators of this group is to urge possibly commit the crime of "robbery in band" as defined in Article 167 CPA.

There may also be cases where you call (through web tools) to occupy land, block public services or attack an institution or to one or another person. Definitely, the offense is the same, configured from a megaphone in Florida and Corrientes (the heart of the City of Buenos Aires) or any social network or web platform of opinion that may have public access and that message is irrefutably recepcionado. That is to say, with megaphone many people can hear the instigation live and direct, but in the case of the social network and / or posting comments on the portals of opinion, said even message- It comes in more direct and literal way, noting that in my view social networks, its pages or open any user groups are promoting public road with a more precise effect that other means by the quasi instantaneous viralization.

Public incitement through the Internet can travel freely around the web, be replicated, republished elsewhere, that is to say, It generates an incalculable effect of receivers unlike other forms.

There have also been cases in publications aimed at attacking a certain person, group or institution for opinions or public actions in order to generate a wave of lone offenders or organized. In the latter case I call "cyber armies trend" and I have devoted a good part of my next book "deep web, anonymity and Internet censorship ".

In recent years, It has also promoted the use of computer platforms with clear terrorist groups threatening messages aimed at producing criminal acts.

Anyway, While it is common to see in cyberspace - more and more often- slurs, threats, discriminatory acts and other crimes, instigation is becoming a commonplace in this parallel universe, It is the same offense inside and outside.

In Title VIII of the Argentine Penal Code, Crimes against public order, we also found the public intimidation offense in Articles 211 and 212. In these articles, whose offense can also be configured via the Internet, It establishes penalties of up 6 years in prison "That, to instill a public fear or provoke riots or disorders, doeth signals, hath given voices alarm, threatens to commit a crime of common danger ". It is clear that public fear can be infused from computing platforms easily.

We also find the offense in Article 213 the Argentine Penal Code (also present in all South American penal codes), I mean the "apology for crime" which carries penalties of up to one year in prison who doeth publicly and by any means the defense of a crime or a crime convicted.

Por last, Article 213 bis criminalizes "other offenses against public order who organizes or takes part in permanent or temporary groupings that, without being covered by Article 210 (illicit association) This code, tuvieren main purpose or accessories impose their ideas or fight others by force or fear, by the mere fact of being a member of the association. In this case also these actions can be configured via Internet. Can be seen in many overlapping circumstances "ciberejercitos trend" operating on the web for the purpose of attacking, to threat, terrorize authors note, articles and / or comments in order to combat the ideas expressed from fear and terror in search of silence. These acts of fear can be infused directly or indirectly through social networks, emails, blogs and other computing platforms. The organization to impart fear and voices silenced by fear mufflers effects may be a modus operandi on the rise in Latin America.

Definitely, to achieve a fairer society, tolerant, where no prime equitable violence either within or outside the web, this type of crime - that few opportunities are reported- They should be investigated at the same speed which rotates the web.

Por Diego Migliorisi

Lawyer specializing in computer crime

Director de Abogados Migliorisi

Argentina founder of the Association to Fight Cybercrime

d1


The doctor. Luis Angel Nocera ,Lawyer specializing in internet domains tells us the secrets of this crime is rising.

1) That is the cyberquatting ? There have been cases in Argentina ?

The action is cybersqautting register the name of an Internet domain, knowing that someone has a better right to it, usually it has done to sell to who should be the owner or to divert traffic to your competitor web pages or other content..

Read

In Argentina, I been cases and usually occur daily due to lack of conocmiento of this problem by the companies end up paying large amounts of money to recover, and lack of mechanisms to recover a domain name both nationally (.com.ar), and international (.with)

2) It can be considered as a crime of misuse of brand ?

Clearly and conspicuously is a crime, brand abuse, The object of this action is to extort the trademark owner to recover by a bulky figure an Internet domain that should belong to the same as being holder of the trademark ownership.

3) If someone registers a domain with a Foreign .com extension eg .com coincident with a registered mark in Argentina , Parents who integrates the Berne Convention. The owner of the trademark has better right ? In that case what are the ways to recover?

And, It has a better right, the Berne Conveción gives the same. To retrieve a foreign domain name (.with) in relation to a trademark title, ICANN has created a new mechanism for arbitration of disputes domains quickly, who wants to use it must demonstrate that:

• has a right in favor of a name that is identical or confusingly similar to the registered domain name
• The domain owner has no legitimate interest in it
• That the domain registration and use in bad faith are

For presentation can claim up 15 domains, taking apart the suspension of the use of the domain claimed pending dispute, It should be noted in that trademark issues to take advantage of this new system, trademark owners around the world must validate their brands to the Trademark Clearing House.

There is also the traditional method of ICANN consisting of 5 steps:

  1. Filing a complaint with a service provider of dispute resolution is accredited by ICANN and selected by the applicant, such as WIPO (World Intellectual Property Organization).
  2. The other part of either a person or entity against which it has filed suit has the right to file a disclaimer to fend off the accusation
    .
  3. The appointment of an expert group Admnistrativo, composed of one or three, that will decide the dispute, Appointment made by the service provider selected dispute settlement.
  4. The decision of the Administrative Panel, it notifies the parties, the concerned Registrar and ICANN.
  5. The enforcement of the decision of the administrative panel by registrars interested, if a resolution that has to be canceled or transferred the name or domain name in question is issued.

Ternerse should present these dispute resolution mechanisms have a cost that varies according to the number of domains to be claimed.


Incitement is a crime that carries penalties in Argentina up 6 years in prison is a more common crime of which parese. We can find it in different news comments, Entries and other tools provided by cyberspace so that the user can communicate

Incitement to commit crimes

ARTICLE 209. – Who publicly incites to commit a particular crime against a person or institution, shall be punished, for the sole instigation, with imprisonment from two to six years, depending on the seriousness of the crime and other circumstances established in article 41.


In Mexico there are more than 16 thousand children and adolescents subjected to sexual slavery, of which a significant number was hooked through the Internet.

This means it is very convenient to the dealer by the facilities provided, for instance, accessibility, the ability to impersonate someone else, to meet people from anywhere in the world and interact with several people at the same time taking advantage of anonymity.

Read

To capture their victims, traffickers use social networks, chats, couple seekers and job openings in false modeling agencies, for instance, that allow them to obtain information and then contact them and then catch them and subjecting them to illegal trafficking.

Operators also use the network to offer the public as a commodity to people captured, disseminate and commercialize materials derived from trafficking, like pornography. further, pedophiles and sex tourists use the Internet to plan or arrange sexual encounters with people who are exploited.

In this way, Internet has become part of the process of trafficking so they insist, especially parents and teens to be cautious either with supervision for the first and the handling of information and contacts with the second.

http://www.peques.com.mx/trata_de_personas_en_internet_y_redes_sociales.htm


Internet, despite all the good that contributes to society in information, training, communication, job, etc, it has also become the tool of thousands of criminals who use it for their own benefit regardless of the consequences. Harassment offenses, fraud, fraud, illegal drug sales, medicines and so on are only a few examples. But the network of networks is also being used for something much more terrible consequences such as illegal arms sales, a crime that could have facilitated the recent attacks in Paris that claimed hundreds of lives and plunged France and dozens of countries to a state of collective panic with consequences in all areas of society.

Read

In United States, where gun ownership is a right recognized by the constitution, it is estimated that half of the companies engaged in the sale of firearms accept orders over the Internet without first verifying the age and identity of purchased. There, Every year dozens of tragic events related to this easy access to guns succeed, both by adults and minors.

arms sales

But to illustrate this phenomenon of online selling arms you do not need to cross the ocean or so if you want to get out of our borders. Cases of illegal sale of firearms taking advantage of the anonymity and internet facilities granted is also a fact here in Spain.

In 2013 Four program "Walking Street Journal" showed hidden camera through the ease with which a person announced arms sales online. Sure to locate any weapon and flaunted her discretion. Just prior to delivery full Atocha station, the trafficker was arrested by the Civil Guard who declared that "anyone can acquire a firearm", that easy.

This same year 2015, in April, Civil Guard disarticulated a network of selling illegal weapons via the Internet. As in the previous case, these criminals were announced in shopping portals - sale between individuals under the guise of collecting and during the search were seized her arm and different modified, therefore illegal, as well as plenty of ammunition.

But perhaps the most tragic and recent events linked to the sale of weapons in internet constituent recent terrorist attacks in the city of Paris and claimed by the ISIS that have killed hundreds of people. Investigations after the facts have led to the arrest in the small town of Magstadt, in Germany, of a man 34 years of age, He published by the newspaper "Image", It could have been the linchpin that facilitated terrorist assault rifles with which they perpetrated the slaughter.

Four emails found on the mobile phone of the detainee prove that this man sold last day 7 November through internet two assault rifles Yugoslav Zastava M70 model making and two Kalashnikov AK-47, the best-selling history, Chinese production, a "An Arab of Paris".

Although research results are not yet conclusive, French police is convinced that it is the weapons used in the attacks of Paris while German police assumes demonstrated that this man "manipulated legal blank pistols to turn in firearms then sold on the Internet" so illegal activity, in any case, could lead to dire consequences.

Illegal arms sales online shooting



The legal and technical team is ready to help AALCC .

Threats through social networks , emails and other computing platforms are one of the most common Internet crimes . If you are the victim of this crime requesting legal and technical advice of professionals AALCC

denuncias@cibercrimen.org.ar


During the summer of 2016 the board of the AALCC led by Dr. Luis Angel Nocera and Dr. Diego Migliorisi along with a group of specialists in security and defense began prepared a document to present to the Congress of the Nation Argentina .Dicho document it consists of 15 legislative proposals with their respective foundations and witnesses in comparative law cases. The AALCC and its external partners consider fundamental and strategic update and adapt the criminal law on computer crime and crimes that are configured through Internet, as well also give researchers of all legal tools, technological and procedural for the purpose of achieving an expeditious investigation and win the race to crime.
To contact the commission legislation AALCC email to denuncias@cibercrimen.org.ar

Legislative Commission of the AALCC. Dr. Luis Nocera Dr. Dr Diego Migliorisi. Jorge Cosenza

Legislative Commission of the AALCC.
Dr. Luis Nocera
Dr. Diego Migliorisi
Dr. Jorge Cosenza


Stress in times of hyper.

By Lucas Vazquez Topssian

Lic, Psychology –

I receive in my office a patient referred by a gastroenterologist. The woman, about 60 years old, He suffered from heartburn and bouts of diarrhea alternating with constipation other. It was assessed by various medical professionals, being unable to find any organic abnormality that would justify the box, They considered the hypothesis that this was a case of “stress”.

Read

In initial interviews, nothing in the story of the patient seemed to indicate what caused this stress: He had a self-managed work to your liking, adults and successful children, a good economic move, a large house in a quiet neighborhood and a boyfriend described by her as protector, attentive and gentleman. He had a life that could be classified as privileged.

In the passage of a patient, It is a matter of time until a detail appears, that the professional give you a clue why things are not going as they should. In this case, It was that the patient forgot to mute your phone during a session. She, distracted in his account, not listened to the amount of notification sounds emanating from inside your portfolio. When I remark this, the patient pounced on the phone to answer the many messages that had been sent. Her friends by Facebook. Family by a group of Whatsapp. Text messages of their clients. Notifications of your Twitter profile. I wonder if this was always the case, and tells me that if: she could not afford the right not to be available.

As technology advances, it is small device that accompanies us everywhere takes increasingly important in our lives. Mobile telephony functions up until not long ago seemed futuristic, as games, playing music in various formats, email, SMS, electronic agenda, digital photography and video, video call, Web browsing, GPS, and even digital TV. The virtual field, made possible by social networks open the doors to new agora, that space immediately exchange in which one is but it is not and that it is increasingly impossible to leave.

Although the phenomenon of mobile telephony is recent and is undertheorized, the idea that emotions disturb the normal course of operation of the body is known since antiquity. We know that every affection involves a vasomotor download, that is to say, every emotion is a growing movement that comes from a nervous excitement that is performed in typical fashion, that allows us to distinguish one emotion from another. In the case of stress, which it is the normal response of a subject against a hazard, the reaction of the organism is characterized by changes in neuroendocrine at stake the hypothalamus and pituitary gland and adrenal (center reactivity). Although stress is a natural and necessary response for survival, under certain circumstances can cause serious health problems. On one side are all physiological alterations, and on the other are the complications of emotional order.

Can the mobile phone stress to a subject? The patient talking, once warned of the weight of cell in your everyday life, reports “When cell phone rings, I do not know if it is something urgent. I run to see who is, I fear that something has happened to my family… But in the end they are always unimportant messages“. In the case of this patient, the phone rang all the time: while working, when he ate, when it was nap.

My first intervention, somewhat naive, was propose to the patient that the cell always remain silent and she was dedicated at times to answer all messages and notifications accumulated. It was hoped that my prescription was rejected strictly, although no one could condemn the attempt the obvious solution. However, the patient did manage to start wondering if any of the logic of my proposal could benefit her, move from one of these situations commonly known as “bottom”. In one of his runs to answer the phone, the patient fell down the stairs of his house and had to be casted. That was how he introduced the question about the use and abuse of the cell and could start working on the symptom. possibly, the phone was muted and stress yielded. The patient gradually concluded the damage to their health caused him to want to be available and virtually constant physical symptoms and finally gave.

I would like to clarify that this was not the only occasion where the mobile phone was present in a query and before certain phrases heard repeatedly, I allow questions:

“I must be alert if an emergency occurs”.

What is an emergency for you?

Before the emergence of a real and imminent danger, Would you ask for help from the nearest person physically? Is it enough to their virtual presence?

“I must respond immediately to not worry my acquaintances”.

Why would worry acquaintances?

Do you really care, you fear or worry?

What do you think is the scenario that acquaintances imagine believe if you do not answer immediately?

“My relatives, friends and acquaintances will be angry if I do not respond quickly”.

Why are your relatives react well? And what do you do about it?

Do your acquaintances the ability to wait for a response?

“I answer my customers immediately, or I'll lose”

Your clients, Do they value their speed to care for them or their effectiveness and efficiency at work?

Is it really important that you attend your customers at any time?

Does your customer likes you are constantly taking cell?
Finally, I conclude with this question: What price we paid for the lifestyle that llevamo


Por Diego Migliorisi
lawyer- especialsita on Cybercrime
Director de Abogados Migliorisi
Argentina founder of the Association to Fight Cybercrime

The problem of computer crime investigation of a crime or configured through the Internet has never been easy, even more so when the behavior of offenders in most cases is hiding behind the pseudo-anonymity offered by the network.

Read

We must also bear in mind that there is no law requiring companies that provide Internet in our country (ISP) the stored traffic or IP connection nor its customers to view interactive portals from where you can configure offenses. That is getting part of the test for research on the one hand depends on the goodwill of such local companies as well also foreign companies such as the owners of social networks that host such information in their respective countries lawfully requested via urge .
The computer maze that requires research first obtain the IP data (nro a kind of connection that gives the customer ISP to access the Internet). In some cases this information is not visible and to obtain in many cases it is essential to require proof abroad. Once the IP with which the offender contacted structure can determine the country the country and the name of the ISP that submitted IP. Since then the company can inform researchers customer data to which you assign that IP address in the day and exact time the crime was committed. It noted that what is stored is not the content but encrypted data navigation of dynamic ip assigned to each of its customers day, schedule, lease time, so this tool does not violate in any way the privacy or other constitutional principle. In Argentina still roams the various committees of the Chamber of Deputies a bill presented in the 2014 which provides a solution to this problem.
It is worth mentioning that a particular offense from ip assigned to a client does not mean guilt but one of many possible direct research as offices, businesses, companies or public place like places with unrestricted access to the website or the services signal open wi-fi can be used by a significant number of people without being its owner criminally responsible for the misuse of the service
(Ip may be fixed or dynamic. In the first assigned IP it is always the same and the dynamic number can vary daily, when the computer is turned on or off or agree to a certain amount of hours, mode changes IP address assigned depends on the ISP)
As explained it is necessary to affirm the indispensable means incorporating be tools for investigating computer crimes and those configured through Internet since it noted the exponential growth in Argentina of this new type of crime with a clear-up rate less than 5%.
Cyber ​​most frequent crimes in Argentina:

1) Slander , slander and defamation (art 109 a 117 Argentine Criminal Code bis)
2) Threats ( Arts. 149 to y 149 ter Argentino)
3) Intellectual property crimes ( law 11723 art 71,72 and law 25036)
4) Child pornography (art 128 Argentine penal code)
5) Unauthorized access to computer systems ( art 153 and 153 Argentine Criminal Code bis)
6) Computer fraud (phishing) ( Art 172 and 173 Argentine Criminal Code)
7) Incitement to commit crimes (art 209 and 209 Argentine Criminal Code bis), Condoning crime (art 213 CPA).
8) Grooming ( Art 131 Coding Penal Argentina )
9) Extortion (Argentine Criminal Code art)
10) Computer damage ( destruction of computer systems and / or its contents) ( Art 183 Argentine Criminal Code )

It noted that crimes such as drug sales, weapons, organs and reduction products acquired illegally (theft or misappropriation) They are beginning to intensify in recent years. Other actions such as theft and / or phishing, the coordinated action of ciberejercitos trend and revenge porn (Bill bill 5201-D-2015) They are not yet codified in our country but reaping victims.


Interview

interviews

1) Referring to trademark offenses such as illegal use of brands by Internet domain registration. As we warn ? That possible actions for victims? We seek testing?

The best way to prevent illegitimate use trademark, It is to register the domain with the name of our brand as those similar to avoid confusion, You can carry an economic cost to this but it is very effective, and in turn both the .com register as .com.ar, with this increased security spectrum covers.

Read

Before the case as we are with the domain in relation to our brand usurped there are different ways to act, in the case of .com.ar, there “domain dispute” It is a procedure that can prove a better claim on the domain that interests us or we were usurped, It is a process that must contain a completed form, be validated as a natural or legal person in Nic Argentina, and documentation showing that one must be the owner of that domain, as can be branded titles, bills, fotos de local, etc. That is all that demonstrates a commercial business or interest. This is presented to the National Internet Domains (Nic Argentina), It can be done on-line or in person.
For .com, ICANN has launched 2014 a system of dispute resolution by arbitration domains quickly, who wants to use it must demonstrate that:
• has a right in favor of a name that is identical or confusingly similar to the registered domain name
• The domain owner has no legitimate interest in it
• That the domain registration and use in bad faith are
For presentation can claim up 15 domains, taking apart the suspension of the use of the domain claimed pending dispute, It should be noted in that trademark issues to take advantage of this new system, trademark owners around the world must validate their brands to the Trademark Clearing House.

2) In Argentina it is an offense to register a domain of a brand and / or person on behalf of a third party ? As Nic and act on these events ICCAN?

Currently it is not an offense to register a domain in relation to a brand name of a third party, both Nic Argentina, ICANN as it gives opportunities to play usurped domains, because when registering a domain, in their terms and conditions you must agree to submit any dispute on these control mechanisms.
3) Can you explain that there are pages of foreign domains with content and / or name of terrorist organizations, Guerrilla, hate and / or violence apologies different crime? How to proceed to detect these cases?

Can you explain that there are pages of foreign domains with content and / or name of terrorist organizations, Guerrilla, hate and / or violence apologies different crime? How to proceed to detect these cases?

Please note that both ICANN and Nic Argentina, like other loggers are just dealing with it that is the registration and each of the countries taking different policies regarding who can register names, these recorders do not address the content of the pages, who does it is justice, in the presence of a page whose content incites hatred and / or violence crime apologies different one should report it to the prosecution of cybercrime the place you find yourself in, in the case of not finding with this form of contact, one must go to the Public Prosecutor, to become aware of what is happening. We the Argentina Association for the Fight Against Cybercrime, We have constant contact with cybercrime law before they can consult for us to make a link to get to the appropriate authorities, using the form found on our web cibercrimen.org.ar.
Lic. Luis Angel Nocera.
President - founder member AALCC
Specialist internet domains

luis


The cyberacoso: features and innovations in Argentina. (By Lic. Lucas Vazquez Topssian)

It is well known that one of the possible behaviors in humans is aggression, where a subject attempts to intentionally cause harm to another. Although this behavior may appear and disappear in a short period of time, its duration can also be extended and not forward fast or easy way: we well within the realm of harassment.

Read

Bullying is aggressive component of intention to do harm, but it lasts over time and is common to find repeated episodes of violence that realize this chronicity. In fact all harassment inequality of power between the victim and the aggressor also appears. About the latter, We found that bullying can be exercised individually or in groups.

The types of damages arising from harassment usually variable, the most common physical (hits, jostle, Burns), Verbal (abuse, threats), psychological (spreading rumors about the victim) or social (exclusion of the victim group level).

As for the participants of harassment, They recognize 3: the aggressor, the victim and the observer. Often not taken into account the participation of observers in the process of harassment, that is to say, those who witness bullying and since their action or inaction help prolong or encourage it.

When harassment occurs through information and communication technologies (TIC), We talk about the cyberacoso, or English, “cyberbullying”. These technologies offer the attacker a wide range of modalities:

  • Harassment by numerous messages, calls, or e, which they take the form of threats and / or insults.
  • Dissemination of committed images, hearsay, gossip.
  • The possibility to hack someone's account.
  • Create fake profiles on social networks.
  • The recording of aggression or humiliation of the victim to spread later.

It should be clarified that due to the virtual world where it occurs, the cyberacoso has certain peculiarities regarding harassment where not involved ICTs. While harassment ordinary It occurs in a place and time, cyberacoso not know the area or time limits. The victim can hardly escape the cyberacoso. As for the effects, the permanence cyberacoso has offered Internet and these multiply exponentially to reach more people. In this point, Observers may adversely collaborate to share and disseminate related material cyberbullying. ICTs have also updated other serious forms of harassment old, as child abuse: el grooming.

The aggressor often acts impulsively cyberacoso, with a little reflective attitude, without thinking of the consequences it may have for the victim or for himself. If it compares, the aggressor usually justify their actions by different positions outside their own responsibility. Sometimes they are minimizing the occurrence and its consequences, assuming that it is a game or a joke unimportant, where everyone laughs. Other times does the idea of ​​reciprocity, that is to say, the cyberacoso as revenge for a past committed by the victim. Excuses appear frequently blame the victim: “He is an idiot, he deserves it” O “She took the pictures”. Finally, There aggressors trying to shift the responsibility for their actions toward others, for instance, to those who spread the material.

Frequently, the aggressors were also victims and here cyberacoso, repeat with other damage that they suffered. Age and gender are also factors to be taken into account: cyberacoso the phenomenon gains strength among young adolescents.

What are the psychological consequences for victims of cyberacoso? According to a study (Kowalsky, Giumetti.Schroeder and Latlanner, 2014), may appear on the victim depression, esteem issues, anxiety, academic impairment, soledad, dissatisfaction with life, alcohol and drug use, stress and suicidal ideation.

Research in Argentina.

He 28 October 2015 It took place at the meeting UADE “Cyberbullying entre adolescentes: characteristics, Prevalence, assessment and intervention”, organized by the Institute of Social Sciences and Disciplines projective INSOD. He attended an international specialist in the subject exhibitor, The doctor. Manuel Gámez-Guadix, of the Autonomous University of Madrid, who is currently working with the CONICET.
The proposal is to make a quantitative and qualitative study, national and international participation on the phenomenon of cyberacoso in Argentina. Administration of an anonymous and voluntary questionnaire to a sample of adolescents preveé.


1) What are the most common cybercrime ?

The most common are information theft, in the form of Phishing, although darkly and a high index of child pornography, some sectors argue that it is much more common than people think, the lack of reliable statistics and public, It makes it hard to tell one or another position.-

2) Considers that anonymity on the Internet as a major obstacle to research?

While it is an obstacle, It would not be the greatest impediments to investigate a crime, personally I feel that the lack of training on cybercrime and new modus operandi is the greatest obstacle to justice is when responding to the victims of these.-

Read

3) From cyber crimes , wifi zones or anonymous proxies use different methodologies for research ?

And, Clear… no matter the medium, each offense on which technology is used is unique, and this is because the technology is advancing faster than laws, every minute, a developer user goes up new applications, every hour, a researcher found a security flaw. This makes every offense which is exploited this, You will have to research in different ways.-

4) What are the benefits it has brought to the investigation of cybercrime called BigData?

He Big Data O Massive data is a concept that refers to the accumulation of large amounts of data.-This has resulted in each LAN remaining income record of it somewhere, which uses a good Ciberinvestigador collecting each of these indications, to rebuild the investigated fact and so to bring the offender to justice. So as we see in a movie Sherlock Home is connected each of the clues and solving a case ends, the ciberinvestigadores, They collect these signs that are on the network, to reconstruct the event and give the author, another benefit that can get to be exposed, Big Data is recognizing that would become synonymous with FINGERPRINT ONLINE.

5) Considers important policy framework that requires local ISP connection ip saving their customers?

It's very important, as this would give security forces the opportunity to demand in the relevant legal frameworks, Connection log of offenders entering the RED. and mainly regulate this activity by providing some prospered only tacitly anonymity.-

6) Is an obstacle the time it takes to officially receive a requested test a power extanjera?

If that is a very big obstacle, in matters of life and death or where facts at risk of life or safety of a child by example. the security forces have to wait on occasion even months for a company meets an Argentine judicial office, and in many cases by their own law they are not obliged to answer, this leaves the good will of those who received the request from across the world, as framing its laws, and especially to understand you… (I have had, send a request to Hong Kong and Shanghai for an emergency in the issue of child pornography, where he ran less risk of life, and the company, He has bounced on several occasions orders, for small legal potholes, sending the response ends at the insistence of the researcher), then it shows that goodwill, save a life, but not so, the legality of forms.

7) The vicitmas of computer crimes and those committed over the Internet. What percentage unreported?

Only today it denounces 30 a 35% cases, this can only be measured in directions of the Ministry of Security in the direction of cybercrime, But back to the previous question, the absence of a public observatory on these new crimes, It makes it difficult to respond.-

8) In our organized crime (Drug, weapons, trafficking in persons, organs, Trafficking, selling stolen material, terrorism ,etc) You have begun to use the web as a primary tool of their operations. This accordingly.

I agree, but this is not new, ORGANIZED CRIME coming several years dabbling in technology, and take advantage of this as it increases profit and lower investment costs at the time of forming criminal gangs. The lack of coordination between forces specialized in this area, thinking this to be 5 types of security forces, they do not exchange information with each other, It makes it difficult to be able to actually measure the power of the offender.

-If yes: This new modus operandi began in the deep web and is currently landing on the surface web?

No, began in the surface web, then mutated into what is known as Deep Web, since this is newer than the last, and the offender, tempted computer experts to participate in crimes such advisers, as bandan until they can train their own computer expert to give them the support.-

-The offender and / or criminal organizations feel more comfortable operating from the web ?

It is not only more comfortable, It is that a lot lower costs when investing for crimes each larger by large concentrations see data in one place or virtual wallets, and anonymities and resource constraints that have to invest makes it very special this new form of crime.-

9) He considers that crimes that are committed via the Internet and computer crime itself will increase in the coming years ? Why ?

Not only will increase, They will be almost the only way to commit crimes, life as we know it is mutating into the digital age, children are born with the technology and the virtual space Virtually his new position to play, this makes the offender, found on the Internet a new space and almost unique to commit a crime.
Imagine that there are virtual wallets FOR SAFETY, which they are attacked from anywhere in the world this opened a sumo fan and not only national but transnational criminals.-

10) That legal and procedural tools should punish estimated Congrso or respective national control authorities to achieve a more efficient research ?

All the tools are incorporated into the security forces, They are welcome, regulate and create public action protocols for computer crime is impresindible and especially the skills they need to regulate security forces, that should have a good foundation and a special profile to be investigating these new indications are today the only po today that leaves the offender, and if the ciberinvestigador not recognize both justice and the force will have lost the battle.-


image-5d40be2d0d0a8adf85418ee926ce89cf85d14d1bc761410b978262ad3e74a55c-V(1)

The board of the Argentina Association of Cybercrime Fight with strongly condemns the recent terrorist attacks in the City of Paris, as it occurred in this same way all over the world.

No solidarity with all the citizens of that nation by the terrible events.

Atte

AALCC

Comsión directive


He 23 September deputies presented an outstanding bill that criminalizes the illegitimate publication of audiovisual material on the Internet. The project provides for the protection of those directly affected, minors and gender violence.

You can download the complete project and its foundations in this link :

http://www1.hcdn.gov.ar/proyxml/expediente.asp?Basics = yes&numexp=5201-D-2015

Read

File No.
5201-D-2015
Parliamentary Procedure
128 (23/09/2015)
Signatories
BERGMAN, SERGIO ALEJANDRO – BULLRICH, PATRICIA – SPINOZZI, RICARDO ADRIAN.
Turn to Fees
CRIMINAL LAW.

The Senate and Chamber of Deputies,…

Article 1 – Incorporated as article 155 bis of the Criminal Code of the Nation, the following:

“It shall be punished with imprisonment from one month to one year, wherein, by any means disseminate, spread, publication, distributes or otherwise stand in the scope of third, un video, images or any material on nude or semi another person, or their reproductive system or any part of the body of a sexual nature which is highlighted, or materials of erotic or sexual content, they are private, without the authorization of the same, and allowed to identify, with intent to harm the owner of the images.

In the case that whoever has incurred such conduct has had access to the material on the occasion of an intimate link, particularly love or trust or closeness to the victim, the penalty is six (6) months of (2) years in prison.

The penalty shall be one (1) four (4) years in prison, If the author of disclosure, publication or distribution of pornographic material without permission of the participants, a common activity, by any means, sea a título oneroso o gratuito, or facilitates portals, Web sites or others to commit the acts described above.

When the victim is under 18 years old, the conduct described in the first two paragraphs of this Article shall be punished with imprisonment from two (2) a cinco (5) years in prison. If the victim is under 13 years old, the penalty is imprisonment of three (3) a seis (6) years in prison.

In any case, the offender will also be obliged to withdraw from circulation, to block, eliminate or suppress, the material of the case, at his expense and within the judge to determine.

The sentence must be published in two (2) day equivalent to public notoriety that has acquired the relevant material movement, for a period not less than two (2) calendar days, to be determined by the judge, and at the expense of the offender.”

Article 2 – Communicate to the Executive.


The AALCC to hundreds of associations in the world joins in the fight against pedophilia on the Internet. We call on all internet users who want to work, simply denouncing objected pages through our website and our team will lead research to justice.

The fight against this abhorrent crime is a direct involvement of the whole society with the victims.

Atte

Luis Angel Nocera

President

pedfilos-in-internet-28-728


The properly called illegitimate publication of images or videos of sexual or erotic content on the internet or in a mass-media, It produces a psychic damage, irreversible moral and social characteristics. This concept is based primarily on when someone raises some material, such as a video or photo, although the judicial order blocking the url containing such material or specific link desindexen seekers in search results, It is not a definitive solution to the question that is always the possibility that it is rising again in the future, either by the original author of action or third, the download information, decide to raise it again or share. Therefore the possibility of that happening and the nightmare for the victim again become reality, technically uncontrollable. And that is why the board of the AALCC considers it essential that this action be criminalized and incorporated into Argentine Criminal Code as a separate offense dependent private instance.

We share the report by the degree in psychology Lucas Vázquez Topssian, director of psychology and containment victims of AALCC

Read

The psychological damage to victims of revenge-porn. (Lic. Lucas Vázquez Topssian)

With the term revenge-porn (“revenge porn” en inglés) It is designated for publication on the Internet of images and / or pornographic videos of another person without their consent. The actor is usually a hacker or ex-partner and, although the phenomenon is not new, He took public notoriety after learning of the creation of pages devoted to the exhibition, against the will of the victims, of sexually explicit material.

 

The victim, initially, access to take photos or create a pornographic video in an atmosphere of intimacy and privacy with actor, subject you trust. The actor betrays this trust and publishes material on the Internet, often accompanied with personal data of the victim, as your real name, social networking site, workplace and even home. The victim suddenly finds the fact, when the material is already loaded in Internet, time can locate the beginning of trauma.

 

Trauma is an injury that occurs as a result of a violent and surprising external action. A psychic trauma is a wound caused by an external event that appears as a surprise and that upsets the balance, a person hitherto held, to suit their internal and external needs. When a subject is subjected to a number of stimuli that exceed their usual tolerance, a break occurs in the responsiveness of the subject: their defensive resources are depleted and the psychic damage appears. This will depend on the specific susceptibility and significance that the event take for each subject according to the concept of psychic reality, as the vital moment that is passing the subject, according to the resources it holds in the time of the event and according to their life history and family.

 

An event like the porno-revenge cause the victim, without a doubt, a massive disturbance of the victim and put into action, initially, all defense mechanisms. If the individual can not implement these mechanisms, the memory of the print acquire importance of trauma. It is important to reiterate, so, that what is essentially traumatic experience is the subject and not the fact itself.

 

The most common mental disorders test the impact of a surprise event that the subject can not handle, They are adjustment disorders and anxiety disorders. In the most serious cases where a major collapse of the I occurs, we can find ourselves in a melancholic or psychotic disintegrative box type. If the victim previously coursing through a personality disorder, the stress generated by the fact can generate a stiffening of the operating guidelines of your personality.

 

A phenomenon like the porno-revenge can cause the victim to consult therapy, after a while, by nonspecific symptoms such as headaches, state of hyperarousal and hypervigilance (Alert exaggerated responses, insomnia, irritability), depressive syndrome and sleep disorders, poor concentration and memory disorders. It is rare that the victim quickly mention the history of the traumatic event, the victims tend to dissociate. The victim of the revenge-porn can, be configured to trauma, show 3 types of symptoms:

  • Reexperience / INTRUSION: Inability to divide the event of mind, Indeed scenes become involuntarily as images, unwanted memories, nightmares or flashbacks (flashbacks). as usuall, this symptom is accompanied by intense distress, often being experienced physical symptoms such as palpitations, shortness of breath and other symptoms of panic. Intrusive memories,
  • Physical and exaggerated emotional responses triggered by stimuli associated with the traumatic event.

 

  • AVOIDANCE / Torpor: In an attempt to try to handle these memories, patients develop a series of avoidance behaviors aimed at restricting exposure to traumatic memories: avoid people, places, thoughts, feelings, conversations or things that evoke them the traumatic event. In extreme cases, survivors "forget" or possibly repressed aspects of the traumatic event. Another type of avoidance behavior is emotional blunting, inhibition and lack of response to the environment.

 

  • Hypervigilance: Sleep disorders, irritability, difficulty concentrating and increased startle response. Unprovoked anger. Rages, difficulty concentrating.

 

 

The specific symptoms vary in intensity and number depending on the subject. A professional diagnose Post Traumatic Stress Disorder if at least has a symptom of each group. These symptoms should be recurrent and cause changes in the overall activity of the subject.

 

Particularly porn-revenge, by its degrading characteristics, It can cause you trouble victim feeling and expressing emotions, especially those closest. Avoidance behavior can also interfere with daily activities. The victim can avoid responsibility, lose interest in favorite activities or feel hopeless for most of the time. Family and work relationships can be severely affected. Physically, the victim may experience panic disorder with symptoms such as chest pain, dizziness, rapid breathing, fear of death, among other less general.

Lic. Lucas Vázquez Topssian

AALCC-Dept.. psychology


people
Our commitment is with people. Stop a felon behind a keyboard change your life : You have the complaint. denuncias@cibercrimen.org.ar

The AALCC not perform patricinio , our team only refers cases to relevant institutions , It provides technical assistance , pscilogico and guides the victim must lie to where the complaint.


France announces measures “Exceptional” Network controls. Cameron raises in UK block Whatsapp and have new powers to spy on private communications. Obama gets cybersecurity a priority

 

Read

MADRID.- Internet becomes the center of the target. Following the attacks that have rocked France, the institutional response to several European countries has focused on the network and the use of platforms that can serve propaganda. Under the euphemistic announcement propose measures “Exceptional”, governments like France or the UK have warned of his intention to give more powers to increase controls on private communications of citizens and their activities online.

One of the first was David Cameron. British Prime Minister, under the pretext of preventing terrorism, He reported that plans to equip the intelligence and security forces of his country new powers to spy on and facilitate access to exchanges of messages between users. This measure would affect applications systems such as instant messaging and chatWhatsApp, Telegram, iMessage o FaceTime.

Cameron intended communication systems can not deny the government access to your system

The Conservative leader said that, if he wins the elections next May with sufficient majority, promulgate a law, among other things, It raises block all communication systems that encrypt messages and that can not be denied access to the authorities whenever there is an order signed by Interior. Cameron is essential to have access to communications, data whose, how, when, where and who, and, especially, content.

“These vital data is crucial not only to combat terrorism, but also to find missing and investigate killings”, said the premier. The latest initiative of the Conservative Party in this matter, Law Data Communications, was lying at the lack of support from partner Cameron Government, the Liberal Democrats.

First convictions in France

In France, the French Prime Minister, Manuel Valls, also made it clear during his speech in the National Assembly on Tuesday that the new package of measures against terrorism It will emphasize the Internet and social networks. According to Valls, network is being “used more than ever for enlistment, contacting and acquiring techniques to take action”.

Holders of Interior, French Defence Justice and now have eight days to prepare the first proposals. “France is at war against terrorism, Jihadism and radical Islam, but not against a religion. It is not at war against Islam and Muslims. It will protect, as it has always done, all fellow citizens: those who believe and those who do not”, Valls said.

“If we restrict individual freedom of some, we have to do”, defends the president of the parliamentary group of the UMP

The truth is that the French authorities have already imposed the first sentences for advocating terrorism on the Internet after the attacks last week. A young 27 years was sentenced to a year in jail for posting Facebook photos and quotes to support jihadists Paris.

“If we restrict individual freedom of some, we have to do”, had pointed in the Christian Congress Jacob, chairman of the parliamentary group of the conservative Union for a Popular Movement, the main opposition party. “An exceptional location must be followed by exceptional measures, but I say with equal force than ever emergency measures that contravene the principle of law and values”, Valls added.

Obama Cybersecurity

With new measures, France and the UK are placed on the same path that the US, where Barack Obama on Tuesday promoted a series of reforms on Internet security after Recent attacks against Sony and the Pentagon, the latter work, supposedly, Islamic State. US President showed that cybersecurity is one of his legislative priorities in relation to the new Republican Congress in both houses that was installed last week at the Capitol.

Advocacy organizations privacy claim that the reform of President
US will mean a massive transfer
Personal data

The president proposed to pass a law“encourage” the private sector “share information” on cyber threats with the Government, in particular with the National Center for Cybersecurity and Communications Integration (NCCIC), which in turn share such data with other federal agencies. What companies would deliver to the Administration would “IP addresses, About 'routers’ and data on dates and times”, but not the “content” messages, according to a senior US official.

Obama's proposal is a revamped version of a bill of 2011 which failed. This time, White House hopes to find room for consensus on a Republican-led Congress, have also expressed alarm at the recent cyberattacks. The initiative, however, has received a cool reception in organizations defending privacy as Electronic Frontier Foundation, which considered “unnecessary” reform, He called for strengthening the existing mechanisms for exchanging information between government and private sector and warned that the measures announced will involve a massive transfer of personal data.

Controls and DNI airline passenger record

In addition to controls on Internet, Valls also said the intention of the French Government to extend to the whole territory a pilot program in two prisons in the Paris region, whereby detainees radicalized They are grouped and isolated from other prisoners in the same wing of the prison. It is also contemplated creating a file members convicted of terrorism or battle group that requires them to declare their registered and undergo regular checks.

also, record the controversial airline passenger data, “PNR”, blocked tool in the European parliamentary process, It will be operational in France from September, Valls added. The French prime minister made in this regard calls “solemn” to the Parliament for approval also.

France will be operating in September a record of airline passenger data was blocked by the European Parliament

For its part, The German Government intends to adopt a legal reform that will allow removing the national identity card deemed radical Islamists seeking to travel abroad to fight alongside jihadi groups.The initiative includes the cancellation of the DNI to control and prevent the possible return of the fundamentalists.

The Cabinet will also take forward two projects from which terrorist financingIt will become specific criminal offense, a new category that includes collecting donations to cover the travel of jihadists.

Similarly, may be prosecuted by the Justice not only those returning to Germany after fighting with fundamentalists, but also those who want to leave the country to participate in terrorist acts abroad. This last point includes attending terrorist training camps.

Last September, the Department of Interior of the countrywith immediate effect banned the activities of the Islamic State, which he made it a crime to display their symbols and badges, collecting funds for jihadist organization or proselytizing on internet.

http://www.publico.es/internacional/occidente-internet-punto-mira-lucha.html


Traducir/Translate
EnglishEspañolFrançaisPortuguês


Gurruchaga 483 - Capital Federal.