SlideShare a Scribd company logo
1 of 20
Download to read offline
INSTITUTO TECNOLÓGICO DE
TUXTEPEC
INGENIERIA EN SISTEMAS
COMPUTACIONALES
“DELINCUENCIA CIBERNÉTICA”
PRESENTA:
CLEOTILDE JORGE RAFAEL
CYNTHIA DEL CARMEN BARRERA VILLA
EMAIL:
kleo.jorge18@gmail.com
cynthia_3888@hotmail.com
ASESOR:
I.S.C. METZLI VALERIANO OROZCO
Tuxtepec, Oax. Febrero de 2014
S.E.P D.G.E.S.T S.N.E.S.T
CYBERCRIME
KEY WORDS
 DELINQUENCY
 INTERNET
 TREATS
 PEDERASTS
 PROSTITUTION
CYBERCRIME
ABSTRACT
The present project of investigation realizes an analysis of the problematic that
presents the country with reference to the "White-slave trade"; likewise, emphasis
is done to the suitable use of the Internet in minors. The cybernetic delinquency is
a worrying topic that worries equally the industry and the governments. It is
possible to determine that it depends on two basic aspects: the safety and the
organized delinquency. Already they have given themselves some situations in that
the national and international safety has been threatened by the activity of
organized cyber delinquency. The extension of the new technologies to all the
areas of the daily life makes his constant exploitation inevitable with criminal ends.
Part of this activity can put in danger the safety, whereas other one not. It is
important to distinguish what acts cyber delinquents belong to every category to
find the suitable answers.
CYBERCRIME
INTRODUCTION
In the last years has increased his incident in Mexico, waking a great interest up in
the political and social actors, since the majority of the cybercasts do not know the
risk of the navigation for Internet. The cybernetic crime can manage to injure the
personal integrity. It treats her as persons have turned into the most lucrative third
business for the delinquency organized in the world, only below the traffic of drugs
and that of weapon. The Organization of United Nations (UNO) calculates that this
crime generates earnings of 9 thousand 500 million dollars approximately to the
year (Méndez, 2007).
The reason by which this article is realized is, to inform to the company about the
big problems that nowadays they happen in the Internet and the risk that moves
along on having sailed not knowing the minimal limits of safety; since the exchange
of information to the moment to use the social networks, has allowed the increase
in the practice of crimes since treats her as persons.
The aims of this investigation aim at the generation of information that serves as
bibliographical array it brings over of the practices executed with regard to the
phenomenon of it her treats of persons in Mexico, as well as to produce qualitative
and quantitative information that allows to visualize the growth that has taken the
delinquency, and likewise to try to anticipate that these crimes continue existing.
CYBERCRIME
METHODS AND MATERIALS
METHODOLOGY
Used methodology was a search of information in Internet, in sites relating to
“Cybernetic Delinquency ", as well as in pages of the government, who handle
information furthermore detailed, the above mentioned information I manage to
reinforce with books. With this, it is tried to emphasize to the company of the risk
that takes to use inadequately the Internet.
ANALYSIS
Nowadays, Mexico does not have special procedure to attack the cybernetic
delinquency. The Mexican Government is fighting a fierce war in opposition to the
mafia of the drug, which regularly has better technology.
From January, 2012 to March, 2013, the Federal Police have identified 548
supposed homosexuals. Nevertheless, there has been no action against them or
intervention of Internet sites that these handle. The federal authority made clear
that it detected 77 cases to more than 500 suspects of pederasty, across 306
judicial orders, 19 collaborations of investigation, by means of the National Center
of Civil Attention, 113 for electronic post office and 33 by means of telephonic
reports.
At present 27.6 millions of Mexican homes possess Internet service, which is used
in average two hours 54 minutes a day. In agreement to a study realized by the
Mexican Association of Internet (Amipci), of which they threw extremely worrying
information on the Internet use, which are: 70 % of the occasions to which one
accedes is to check electronic post office; 58 % to realize instantaneous
messages, 42 % to deposit to a room of chat, 34 % for interchange of photos, 49 %
to lower music and 10 % to look for entertainment for adults.
It is necessary to mention that the risks that move along inside the net are
innumerable, inside which they manage:
CYBERCRIME
 Easy access to a great variety of pages.
 The user can have access to inadequate, aggressive, illicit information,
pornography, between others.
Contemplating the risks that the Internet use bears for minors of age, it has
increased rapidly the exploitation of minors, of agreement with the “global Report of
monitoring of the actions against the sexual commercial exploitation of children,
girls and teenagers ", Mexico is the second country in the world with major
production of infantile pornography. Of every ten children four are contacted by
homosexuals. (Glenny, 2011)
CYBERCRIME
RISKS OF THE MOBILE TELEPHONY
 Theft of the equipment.
 To realize actions of espionage with the device.
 Facilitates the development of the ciberbullying.
 Can be used by it for the diffusion of pornographic material.
 Fraud.
 Addiction to the device.
 As the equipments of calculation the cellular telephony also can “become
infected “with different virus.
In agreement with safety experts of Kaspersky Lab, to plunder directly the pockets,
the swindlers will perfect his tools designed to accede to the bank accounts of the
owners of mobile devices with Trojans more powerful mobile bank employees.
With the update of an operative system, a new virus arises to infect the same one;
the majority of the malicious programs ask for a quantity of money to unblock the
equipment and it to return to the normality as for functioning it refers.
In agreement to a study realized by Kaspersky Lab in this year, the mobile Botnets
will be bought and sold, and also they will be in use for distributing attached
malicious files for third. To support the indirect thefts, “it is very probable that we
see more sophisticated versions of Trojans that code the information in the mobile
devices, which prevents the access to the photos, contacts and correspondence.
The telephonic calls that the minors receive since the majority of the sexual
delinquents who harass for Internet, seek to speak with the children for telephone,
organize meetings in person and even they have obtained free numbers 01800 in
order that his potential victims could call them without his parents realize.
CYBERCRIME
IT TREATS OF PERSONS IN MEXICO
Treats her as persons is an activity of the organized delinquency that moves
thousands of million dollars and constitutes a current form of slavery. The victims
are caught and transported of a country to other one and of a region to other one
by means of deception and constraint. They meet taken off of his autonomy and
his freedom of movements and of election, and are submitted to different forms of
physical and psychological mistreatment.
Three forms exist of you treat:
 Treats of persons to submit them to forced work.
 Treats of persons for his sexual exploitation.
 Traffic of organs.
It treats her as persons, already be for sexual or labour ends, it is the most
important second crime in Mexico and in the capital of the country in terms of
earnings after the traffic of drugs, indicated the president of the Commission of
Human rights of the Federal District (CDHDF), Luis Gonzalez Placencia.
CYBERCRIME
IT TREATS OF PERSONS ACROSS INTERNET
The children, girls and teenagers are hooked easier in Internet, and the process of
conviction is not late any more than two weeks. A like from your computer, the
personal information and photography’s that they handle in the social nets or the
people with whom they contact without knowing they can lead them to remaining
caught in a net of it treats of persons or pornography. This one is the new modality
of the transactional organizations to hook, especially to children, girls and
teenagers, later to submit them to sexual or labour exploitation.
The Special District attorney's office for the Crimes of Violence against the Women
and It Treats of Persons of the General Attorney's office of the Republic (PGR),
they warn that the social nets are today the mechanism preferred to recruit victims
whom one cheats with the illusion of a relation, a false offer of work, or the promise
to turn them into famous models.
With the new strategy of these organizations, they reveal, there goes in increase
the number of minors who are contacted: of 274 victims attended from 2012 to the
date, 87 of them (31.7 %) has less than 18 years, and they all and the every some
of them were located in social nets.
The DF, it concentrates 19.6 % of the 240 investigated ones from 2012 to
February, 2014, is a center of exploitation as It Populates, but, entities like
Guanajuato and Oaxaca are points of entertainment for young men. And in 10 % of
the cases, when the victims already are ready, they are sent abroad, especially to
The United States.
CYBERCRIME
Figure1. Trafficking in persons by sex and age.
CYBERCRIME
WHAT ARE NETWORKS?
Social networking sites are virtual communities where users interact with people
around the world who find common interests or tastes. Function as a
communications platform that connects people who know or want to know, and
allowing them to centralize resources such as images and videos in one easy to
access and managed by the users themselves.
Advantage
• Can be used in the academic and labor, to exchange various innovative
experiences.
• allow users to participate in an online project from anywhere.
• Allow you to construct a personal and / or virtual identity, because they allow
users to share all types of information (hobbies, beliefs, ideologies, etc. . .) With
other surfers.
• Facilitate relationships between people, avoiding all kinds of cultural as well as
physical barriers.
• Facilitate comprehensive learning outside the classroom, and can implement the
concepts learned.
• Social networks are an opportunity to show such.
• Exchange activities, interests, hobbies.
CYBERCRIME
Disadvantages
• People with ulterior intentions can invade the privacy of others causing major
problems at once. Security experts say a company for hackers is easy to obtain
confidential user information.
• For some countries be a user of these networks becomes a threat to national
security. This has made for staff related to the security of a country is a ban.
• If not used properly it can become an addiction.
• Large number of cases of child pornography and pedophilia have manifested in
different social networks.
• Lack of privacy, being publicly displayed personal information.
Figure 2. Most popular social networks.
CYBERCRIME
GENERAL SAMPLING
In Mexico, according to INEGI millions of active users in the socio-digital media, of
which one hundred percent is under 18.
Surveys in private schools by the Federal District CENETIC program of the
Alliance for Internet Safety (ASI) reveal that 98% of students have a computer at
home, 99.8% in middle age have a cell phone and 42% have cell plan with
unlimited Internet access.
Figure 3. Principal abuses and attacks.
CYBERCRIME
Figure 4. Averange reported and unreported crimes.
Figure 5. Growth trafficking in Mexico.
CYBERCRIME
Figure 6. Operating mode trafficking networks.
CYBERCRIME
MATERIALS
For data collection the following instruments were used:
• Bibliographic
Was collected and ordered data through books that allowed us to really obtaining
the necessary information for the investigation from the information collected. As
the acquired data to dictate the necessary adjustments that will determine the
validity, reliability and accuracy of the information were compared.
• Finding information on the Internet
Finding information on the web was conducted, this, to complement the information
obtained through books.
CYBERCRIME
RESULTS
Human trafficking is a crime that arises largely as a result of the internationalization
of organized crime, and now with globalization, crimes transcend the boundaries of
states, and cause insecurity in international society.
Much of the existing ordinary communications and record keeping is based on the
Internet and related technologies. While digital technology improves the efficiency
of ordinary legitimate activities, it also improves the efficiency of criminal activities.
Cybercrime generally refers to criminal activity that uses information systems as
tools or targets of an illegality. This involves illicit access to systems, interference
with legal use and theft or destruction of the information contained therein. It can
also involve the possession or transfer of prohibited content.
Mexico is part of these international instruments and is a big step for our country in
combating trafficking in persons; however, there are several factors that become
even more complicated combat it, such as lack of information on the team. La lack
of domestic legislation and harmonization of the same, as well as internal
harmonization with the international; lack of preparation regarding trafficking in
institutions that are handling the issue, and the creation of specialized institutions
in the field; lack of awareness on the importance of the offense, that has not been
given the importance it deserves the subject; and there are no measures of care
for victims of trafficking.
CYBERCRIME
DISCUSSION
In Mexico, human trafficking is the second most profitable illegal business for
organized crime.
Today social networks and using the internet are the primary means by which this
occurs risk of falling into the hands of criminals who take advantage of netizens
innocence of some people to start illicit business with them as is the trafficking.
About 12 million people are victims of trafficking, of which 79 % are used for sexual
exploitation, removal of organs 3 % and 18 % labor exploitation; according to
INEGI figures , 3.6 million people , 31% are children , aged 5 to 17 years , and 70
% migrants and indigenous people forced to make moral dangerous to their safety,
health and conditions trafficking .
It's really distressing that despite the visibility it has had in recent years and his
fighter was presented as a priority on security, human trafficking remains
unpunished in Mexico and will not be of importance to this topic needs. Of the 31
states, 28 of them and the Federal District have in their legal regarded as
trafficking offense, of which only 13 states have a law providing special protection
to victims and four states have criminalized this crime in their penal codes or have
special Act.
A good start is the initiatives of Congress, but they still remain to be done. The
defense of human rights is very important part in our country and must remain so,
hence the non- stop working on the issue of trafficking.
CYBERCRIME
Suggest some recommendations.
• If you are offered a job, looking for as much information as possible about the
sup-ply, the employer (company, factory, agency, home address, etc.) And working
conditions.
• If the sum you offer is too high, it could be a hoax.
• Care to upload information to social networks; it can be used by mu - Chas
people with unknown intentions. Therefore it is advisable to think before posting
and do not disclose information about the places we frequent or the environment in
which we conduct our activities.
• If you're going to meet someone you met on the net, made known to al- guna
person you trust.
• If the person who gives you the job you are asked to make decisions quickly, not
giving you time to decide on your destination safely.
• If you are offered a job elsewhere in the country or abroad, Get Insider’s largest
amount of data possible destination: addresses, phone numbers, and places to fall
back on if you need help.
• If they offer to pay you the passage, be sure to know its value and the conditions
under which you must return.
• If the working conditions are not what you promised, if they control your
movements or not let you leave the place.
Are some very important points, but we must take into account, and pay attention
to anything that looks suspicious to us because anyone can be a victim of this
crime.
CYBERCRIME
BIBLIOGRAFÍA
Glenny, M. (2011). El lado oscuro de la red: La nueva mafia del ciberespacio. En M.
Glenny, El lado oscuro de la red: La nueva mafia del ciberespacio (pág. 145). Gran
Bretaña: Destino S.A.
http://www.eluniversal.com.mx/nacion-mexico/2014/impreso/tratantes-8220cazan-
8221-en-redes-sociales-214040.html
http://www.sandiegored.com/noticias/16544/El-internet-un-aliado-en-la-trata-de-
blancas/
http://www.inmujeres.gob.mx/index.php/programas/prevencion-de-la-trata-de-
personas
http://www.animalpolitico.com/2011/04/trata-de-personas-segundo-ilicito-mas-
redituable-en-mexico/#axzz32hPzMsrT
http://www.peques.com.mx/trata_de_personas_en_internet_y_redes_sociales.htm
Alicia Peressutti
Año de publicación: 2011
Esclavas
Alicia Peressutti
Año publicación: 2009
Buscando a Ana

More Related Content

What's hot

111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the WorldNitine
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonSARON MESSEMBE OBIA
 
2015 Internet Crime Report
2015 Internet Crime Report 2015 Internet Crime Report
2015 Internet Crime Report Rob Wilson
 
Crime in the Internet Age
Crime in the Internet AgeCrime in the Internet Age
Crime in the Internet Agesheilaschultz43
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)Felipe Prado
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet GovernanceDominic A Ienco
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIJames Bollen
 
Artificial Intelligence On The Dark Web
Artificial Intelligence On The Dark WebArtificial Intelligence On The Dark Web
Artificial Intelligence On The Dark Webabraxasdarknetmarket
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemLillian Ekwosi-Egbulem
 

What's hot (20)

111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Internet Censorship across the World
Internet Censorship across the WorldInternet Censorship across the World
Internet Censorship across the World
 
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
Whistle-Blowing System: A Recipe for Monitoring Corrupt Activities in Nigeria...
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
Fotn 2015 colombia
Fotn 2015 colombiaFotn 2015 colombia
Fotn 2015 colombia
 
2015 Internet Crime Report
2015 Internet Crime Report 2015 Internet Crime Report
2015 Internet Crime Report
 
Crime in the Internet Age
Crime in the Internet AgeCrime in the Internet Age
Crime in the Internet Age
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)2600 v22 n2 (summer 2005)
2600 v22 n2 (summer 2005)
 
Global Commision on Internet Governance
Global Commision on Internet GovernanceGlobal Commision on Internet Governance
Global Commision on Internet Governance
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
Great Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLIGreat Issues Reflective Essay CybersecurityLI
Great Issues Reflective Essay CybersecurityLI
 
Artificial Intelligence On The Dark Web
Artificial Intelligence On The Dark WebArtificial Intelligence On The Dark Web
Artificial Intelligence On The Dark Web
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Oni Iran 2009
Oni Iran 2009Oni Iran 2009
Oni Iran 2009
 
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-EgbulemIT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
IT Vulnerabilities - Basic Cyberspace Attacks- by Lillian Ekwosi-Egbulem
 
Cyberspace
CyberspaceCyberspace
Cyberspace
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
INTS2310_PUNZO_EC
INTS2310_PUNZO_ECINTS2310_PUNZO_EC
INTS2310_PUNZO_EC
 

Similar to Delincuencia Cibernética- Inglés

WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxphilipnelson29183
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceMubarak Al Hadadi
 
Grant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOGrant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOEricka Rodas
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...JohnGacinya
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...JohnGacinya
 
New and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withNew and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withDr Lendy Spires
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 

Similar to Delincuencia Cibernética- Inglés (15)

Cyber Crime Essay
Cyber Crime EssayCyber Crime Essay
Cyber Crime Essay
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Essays On Cyber Crime
Essays On Cyber CrimeEssays On Cyber Crime
Essays On Cyber Crime
 
Punzo_3300_L8-RP
Punzo_3300_L8-RPPunzo_3300_L8-RP
Punzo_3300_L8-RP
 
Cybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community PeaceCybercrime is a Phenomenon that Threatens Community Peace
Cybercrime is a Phenomenon that Threatens Community Peace
 
Grant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGOGrant Proposal Excerpt Build Your Own NGO
Grant Proposal Excerpt Build Your Own NGO
 
Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...Analyzing the influence of information and communication technology on the sc...
Analyzing the influence of information and communication technology on the sc...
 
Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...Analyzing the influence of Information and communication Technology on the sc...
Analyzing the influence of Information and communication Technology on the sc...
 
New and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon withNew and emerging forms of crime threats the world must reckon with
New and emerging forms of crime threats the world must reckon with
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
Research Paper On Cybercrime
Research Paper On CybercrimeResearch Paper On Cybercrime
Research Paper On Cybercrime
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 

Recently uploaded

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 

Recently uploaded (20)

Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 

Delincuencia Cibernética- Inglés

  • 1. INSTITUTO TECNOLÓGICO DE TUXTEPEC INGENIERIA EN SISTEMAS COMPUTACIONALES “DELINCUENCIA CIBERNÉTICA” PRESENTA: CLEOTILDE JORGE RAFAEL CYNTHIA DEL CARMEN BARRERA VILLA EMAIL: kleo.jorge18@gmail.com cynthia_3888@hotmail.com ASESOR: I.S.C. METZLI VALERIANO OROZCO Tuxtepec, Oax. Febrero de 2014 S.E.P D.G.E.S.T S.N.E.S.T
  • 2. CYBERCRIME KEY WORDS  DELINQUENCY  INTERNET  TREATS  PEDERASTS  PROSTITUTION
  • 3. CYBERCRIME ABSTRACT The present project of investigation realizes an analysis of the problematic that presents the country with reference to the "White-slave trade"; likewise, emphasis is done to the suitable use of the Internet in minors. The cybernetic delinquency is a worrying topic that worries equally the industry and the governments. It is possible to determine that it depends on two basic aspects: the safety and the organized delinquency. Already they have given themselves some situations in that the national and international safety has been threatened by the activity of organized cyber delinquency. The extension of the new technologies to all the areas of the daily life makes his constant exploitation inevitable with criminal ends. Part of this activity can put in danger the safety, whereas other one not. It is important to distinguish what acts cyber delinquents belong to every category to find the suitable answers.
  • 4. CYBERCRIME INTRODUCTION In the last years has increased his incident in Mexico, waking a great interest up in the political and social actors, since the majority of the cybercasts do not know the risk of the navigation for Internet. The cybernetic crime can manage to injure the personal integrity. It treats her as persons have turned into the most lucrative third business for the delinquency organized in the world, only below the traffic of drugs and that of weapon. The Organization of United Nations (UNO) calculates that this crime generates earnings of 9 thousand 500 million dollars approximately to the year (Méndez, 2007). The reason by which this article is realized is, to inform to the company about the big problems that nowadays they happen in the Internet and the risk that moves along on having sailed not knowing the minimal limits of safety; since the exchange of information to the moment to use the social networks, has allowed the increase in the practice of crimes since treats her as persons. The aims of this investigation aim at the generation of information that serves as bibliographical array it brings over of the practices executed with regard to the phenomenon of it her treats of persons in Mexico, as well as to produce qualitative and quantitative information that allows to visualize the growth that has taken the delinquency, and likewise to try to anticipate that these crimes continue existing.
  • 5. CYBERCRIME METHODS AND MATERIALS METHODOLOGY Used methodology was a search of information in Internet, in sites relating to “Cybernetic Delinquency ", as well as in pages of the government, who handle information furthermore detailed, the above mentioned information I manage to reinforce with books. With this, it is tried to emphasize to the company of the risk that takes to use inadequately the Internet. ANALYSIS Nowadays, Mexico does not have special procedure to attack the cybernetic delinquency. The Mexican Government is fighting a fierce war in opposition to the mafia of the drug, which regularly has better technology. From January, 2012 to March, 2013, the Federal Police have identified 548 supposed homosexuals. Nevertheless, there has been no action against them or intervention of Internet sites that these handle. The federal authority made clear that it detected 77 cases to more than 500 suspects of pederasty, across 306 judicial orders, 19 collaborations of investigation, by means of the National Center of Civil Attention, 113 for electronic post office and 33 by means of telephonic reports. At present 27.6 millions of Mexican homes possess Internet service, which is used in average two hours 54 minutes a day. In agreement to a study realized by the Mexican Association of Internet (Amipci), of which they threw extremely worrying information on the Internet use, which are: 70 % of the occasions to which one accedes is to check electronic post office; 58 % to realize instantaneous messages, 42 % to deposit to a room of chat, 34 % for interchange of photos, 49 % to lower music and 10 % to look for entertainment for adults. It is necessary to mention that the risks that move along inside the net are innumerable, inside which they manage:
  • 6. CYBERCRIME  Easy access to a great variety of pages.  The user can have access to inadequate, aggressive, illicit information, pornography, between others. Contemplating the risks that the Internet use bears for minors of age, it has increased rapidly the exploitation of minors, of agreement with the “global Report of monitoring of the actions against the sexual commercial exploitation of children, girls and teenagers ", Mexico is the second country in the world with major production of infantile pornography. Of every ten children four are contacted by homosexuals. (Glenny, 2011)
  • 7. CYBERCRIME RISKS OF THE MOBILE TELEPHONY  Theft of the equipment.  To realize actions of espionage with the device.  Facilitates the development of the ciberbullying.  Can be used by it for the diffusion of pornographic material.  Fraud.  Addiction to the device.  As the equipments of calculation the cellular telephony also can “become infected “with different virus. In agreement with safety experts of Kaspersky Lab, to plunder directly the pockets, the swindlers will perfect his tools designed to accede to the bank accounts of the owners of mobile devices with Trojans more powerful mobile bank employees. With the update of an operative system, a new virus arises to infect the same one; the majority of the malicious programs ask for a quantity of money to unblock the equipment and it to return to the normality as for functioning it refers. In agreement to a study realized by Kaspersky Lab in this year, the mobile Botnets will be bought and sold, and also they will be in use for distributing attached malicious files for third. To support the indirect thefts, “it is very probable that we see more sophisticated versions of Trojans that code the information in the mobile devices, which prevents the access to the photos, contacts and correspondence. The telephonic calls that the minors receive since the majority of the sexual delinquents who harass for Internet, seek to speak with the children for telephone, organize meetings in person and even they have obtained free numbers 01800 in order that his potential victims could call them without his parents realize.
  • 8. CYBERCRIME IT TREATS OF PERSONS IN MEXICO Treats her as persons is an activity of the organized delinquency that moves thousands of million dollars and constitutes a current form of slavery. The victims are caught and transported of a country to other one and of a region to other one by means of deception and constraint. They meet taken off of his autonomy and his freedom of movements and of election, and are submitted to different forms of physical and psychological mistreatment. Three forms exist of you treat:  Treats of persons to submit them to forced work.  Treats of persons for his sexual exploitation.  Traffic of organs. It treats her as persons, already be for sexual or labour ends, it is the most important second crime in Mexico and in the capital of the country in terms of earnings after the traffic of drugs, indicated the president of the Commission of Human rights of the Federal District (CDHDF), Luis Gonzalez Placencia.
  • 9. CYBERCRIME IT TREATS OF PERSONS ACROSS INTERNET The children, girls and teenagers are hooked easier in Internet, and the process of conviction is not late any more than two weeks. A like from your computer, the personal information and photography’s that they handle in the social nets or the people with whom they contact without knowing they can lead them to remaining caught in a net of it treats of persons or pornography. This one is the new modality of the transactional organizations to hook, especially to children, girls and teenagers, later to submit them to sexual or labour exploitation. The Special District attorney's office for the Crimes of Violence against the Women and It Treats of Persons of the General Attorney's office of the Republic (PGR), they warn that the social nets are today the mechanism preferred to recruit victims whom one cheats with the illusion of a relation, a false offer of work, or the promise to turn them into famous models. With the new strategy of these organizations, they reveal, there goes in increase the number of minors who are contacted: of 274 victims attended from 2012 to the date, 87 of them (31.7 %) has less than 18 years, and they all and the every some of them were located in social nets. The DF, it concentrates 19.6 % of the 240 investigated ones from 2012 to February, 2014, is a center of exploitation as It Populates, but, entities like Guanajuato and Oaxaca are points of entertainment for young men. And in 10 % of the cases, when the victims already are ready, they are sent abroad, especially to The United States.
  • 10. CYBERCRIME Figure1. Trafficking in persons by sex and age.
  • 11. CYBERCRIME WHAT ARE NETWORKS? Social networking sites are virtual communities where users interact with people around the world who find common interests or tastes. Function as a communications platform that connects people who know or want to know, and allowing them to centralize resources such as images and videos in one easy to access and managed by the users themselves. Advantage • Can be used in the academic and labor, to exchange various innovative experiences. • allow users to participate in an online project from anywhere. • Allow you to construct a personal and / or virtual identity, because they allow users to share all types of information (hobbies, beliefs, ideologies, etc. . .) With other surfers. • Facilitate relationships between people, avoiding all kinds of cultural as well as physical barriers. • Facilitate comprehensive learning outside the classroom, and can implement the concepts learned. • Social networks are an opportunity to show such. • Exchange activities, interests, hobbies.
  • 12. CYBERCRIME Disadvantages • People with ulterior intentions can invade the privacy of others causing major problems at once. Security experts say a company for hackers is easy to obtain confidential user information. • For some countries be a user of these networks becomes a threat to national security. This has made for staff related to the security of a country is a ban. • If not used properly it can become an addiction. • Large number of cases of child pornography and pedophilia have manifested in different social networks. • Lack of privacy, being publicly displayed personal information. Figure 2. Most popular social networks.
  • 13. CYBERCRIME GENERAL SAMPLING In Mexico, according to INEGI millions of active users in the socio-digital media, of which one hundred percent is under 18. Surveys in private schools by the Federal District CENETIC program of the Alliance for Internet Safety (ASI) reveal that 98% of students have a computer at home, 99.8% in middle age have a cell phone and 42% have cell plan with unlimited Internet access. Figure 3. Principal abuses and attacks.
  • 14. CYBERCRIME Figure 4. Averange reported and unreported crimes. Figure 5. Growth trafficking in Mexico.
  • 15. CYBERCRIME Figure 6. Operating mode trafficking networks.
  • 16. CYBERCRIME MATERIALS For data collection the following instruments were used: • Bibliographic Was collected and ordered data through books that allowed us to really obtaining the necessary information for the investigation from the information collected. As the acquired data to dictate the necessary adjustments that will determine the validity, reliability and accuracy of the information were compared. • Finding information on the Internet Finding information on the web was conducted, this, to complement the information obtained through books.
  • 17. CYBERCRIME RESULTS Human trafficking is a crime that arises largely as a result of the internationalization of organized crime, and now with globalization, crimes transcend the boundaries of states, and cause insecurity in international society. Much of the existing ordinary communications and record keeping is based on the Internet and related technologies. While digital technology improves the efficiency of ordinary legitimate activities, it also improves the efficiency of criminal activities. Cybercrime generally refers to criminal activity that uses information systems as tools or targets of an illegality. This involves illicit access to systems, interference with legal use and theft or destruction of the information contained therein. It can also involve the possession or transfer of prohibited content. Mexico is part of these international instruments and is a big step for our country in combating trafficking in persons; however, there are several factors that become even more complicated combat it, such as lack of information on the team. La lack of domestic legislation and harmonization of the same, as well as internal harmonization with the international; lack of preparation regarding trafficking in institutions that are handling the issue, and the creation of specialized institutions in the field; lack of awareness on the importance of the offense, that has not been given the importance it deserves the subject; and there are no measures of care for victims of trafficking.
  • 18. CYBERCRIME DISCUSSION In Mexico, human trafficking is the second most profitable illegal business for organized crime. Today social networks and using the internet are the primary means by which this occurs risk of falling into the hands of criminals who take advantage of netizens innocence of some people to start illicit business with them as is the trafficking. About 12 million people are victims of trafficking, of which 79 % are used for sexual exploitation, removal of organs 3 % and 18 % labor exploitation; according to INEGI figures , 3.6 million people , 31% are children , aged 5 to 17 years , and 70 % migrants and indigenous people forced to make moral dangerous to their safety, health and conditions trafficking . It's really distressing that despite the visibility it has had in recent years and his fighter was presented as a priority on security, human trafficking remains unpunished in Mexico and will not be of importance to this topic needs. Of the 31 states, 28 of them and the Federal District have in their legal regarded as trafficking offense, of which only 13 states have a law providing special protection to victims and four states have criminalized this crime in their penal codes or have special Act. A good start is the initiatives of Congress, but they still remain to be done. The defense of human rights is very important part in our country and must remain so, hence the non- stop working on the issue of trafficking.
  • 19. CYBERCRIME Suggest some recommendations. • If you are offered a job, looking for as much information as possible about the sup-ply, the employer (company, factory, agency, home address, etc.) And working conditions. • If the sum you offer is too high, it could be a hoax. • Care to upload information to social networks; it can be used by mu - Chas people with unknown intentions. Therefore it is advisable to think before posting and do not disclose information about the places we frequent or the environment in which we conduct our activities. • If you're going to meet someone you met on the net, made known to al- guna person you trust. • If the person who gives you the job you are asked to make decisions quickly, not giving you time to decide on your destination safely. • If you are offered a job elsewhere in the country or abroad, Get Insider’s largest amount of data possible destination: addresses, phone numbers, and places to fall back on if you need help. • If they offer to pay you the passage, be sure to know its value and the conditions under which you must return. • If the working conditions are not what you promised, if they control your movements or not let you leave the place. Are some very important points, but we must take into account, and pay attention to anything that looks suspicious to us because anyone can be a victim of this crime.
  • 20. CYBERCRIME BIBLIOGRAFÍA Glenny, M. (2011). El lado oscuro de la red: La nueva mafia del ciberespacio. En M. Glenny, El lado oscuro de la red: La nueva mafia del ciberespacio (pág. 145). Gran Bretaña: Destino S.A. http://www.eluniversal.com.mx/nacion-mexico/2014/impreso/tratantes-8220cazan- 8221-en-redes-sociales-214040.html http://www.sandiegored.com/noticias/16544/El-internet-un-aliado-en-la-trata-de- blancas/ http://www.inmujeres.gob.mx/index.php/programas/prevencion-de-la-trata-de- personas http://www.animalpolitico.com/2011/04/trata-de-personas-segundo-ilicito-mas- redituable-en-mexico/#axzz32hPzMsrT http://www.peques.com.mx/trata_de_personas_en_internet_y_redes_sociales.htm Alicia Peressutti Año de publicación: 2011 Esclavas Alicia Peressutti Año publicación: 2009 Buscando a Ana