The new modi operandi of cybercriminals during the economic crisis
DOI:
https://doi.org/10.5944/rduned.12.2013.11704Keywords:
cybercrime, cyber criminals, cyberterrorists, social networks, scareware, fraud, criminal legal treatmentAbstract
With this article, we aim to raise awareness of the conflict and the challenges both police procedural, to address a varied and innovative type of crime that threatens constantly «from the dark side of the network» fundamental rights of our citizens, but especially so in the years we have economic crisis, has increased substantially. To do this, we studied computer technician and criminal procedure of the phenomena involved. Our study is based primarily on the experience gained during the previous years, in contact with the various phenomena analyzed, is based not just on research on phenomenology, but also uses the positions of those in the treated areas are specialists in the field. All this, to show work that seeks a specific exposure to the model affects the Spanish penal code, be aware that the study is not limited to developed concepts and terms, because for a greater range of phenomenology analyzed, would have needed relate with other international models, to transcend these offenses and crimes, the State boundaries. However, this study is specific for space reasons and objectives, to the extent that we present. This article has three distinct parts. First introduced and unlike a number of terms related to the phenomenon of cybercrime and cybersecurity. Second, it performs a development from a technical standpoint computer, to treat emergent problems involving a series of phenomena, for which there is no precise social awareness in our society and that requires immediate and coordinated response of all, to adopt the necessary measures, not only for fans of social networking, but also for any ordinary citizen to use new technologies for personal: find a job, perform transfers or transactions the web, etc., since there is an alarming growth of cyber criminal modus operandi in 2012. Third, we analyze what may be the most effective from the point of view of criminal law to combat and stop these illegal cyber. Finally we study with conclusions.