In Mexico, it is necessary to insist that both public and private institutions and companies be protected against cyber-attacks by groups that are dedicated to organized crime in the digital world. That a culture of social responsibility to care for our citizens, who make use of digital networks, exist and be strongly created.
Mexico is the first insecure country in LATAM and the third in the world, we have in our laws, sanctions for some of the most common crimes, but there are no new crimes that are happening, I mention some of them:
- Social engineering
- It is the practice of obtaining confidential information through the manipulation of legitimate users. It is a technique that can be used by certain people, such as private investigators, criminals, or computer criminals, to obtain information, access or privileges in information systems that allow them to carry out an act that harms or exposes the person or body compromised to risk or abuse. .
- phishing scam
- It is a set of techniques and mechanisms used by intruders or hackers with the purpose of stealing personal information from a user and thus being able to impersonate their identity.
- In the first step of phishing, the attacker duplicates a web page.
- Make the mass sending of emails to an infinity of addresses.
- The user who falls for the deception accesses the false website of the intruder and enters their personal data
- DoS (Denial of Service) or DDoS (Distributed Denial of Service) attacks:
- It is an attack on a computer system or network that causes a service or resource to be inaccessible to legitimate users. It causes loss of network connectivity by consuming the victim’s network bandwidth or overloading the computational resources of the victim’s system.
spyware
- Applications that collect information about a person or organization, which are installed and run without the user’s knowledge.
- It can get to send pop-up message windows, redirect the browser.
- The computer equipment decreases its performance, becoming extremely slow.
Reviewing some Penal Codes of the States and the Federal Penal Code, here I share some of those that are mentioned:
Tabasco Penal Code, in its Article 326 Bis:
TITLE THIRTEENTH BIS
CRIMES AGAINST SECURITY IN COMPUTER AND MAGNETIC MEDIA
CHAPTER I
UNAUTHORIZED ACCESS
(Reformed PO 6855 Section E May 17, 2008)
Article 326 bis.
Whoever intercepts, interferes, receives, uses or enters by any means without due authorization or, exceeding the one he/she has, to a personal computer, or to a computer network system, a logical support of computer programs or database, he will be sentenced to six months to two years in prison and fifty to one hundred and fifty days fine.
In the Federal Penal Code:
– Art. 211 Bis 1 to 7
NINTH TITLE
Disclosure of secrets and illicit access to computer systems and equipment
CHAPTER II
Illicit access to computer systems and equipment
Article 211 bis 3.- Anyone who, being authorized to access State computer systems and equipment, improperly modifies, destroys or causes loss of information they contain, will be sentenced to two to eight years in prison and a three hundred to nine hundred day fine.
Who, being authorized to access computer systems and equipment of the State, improperly copies information they contain, they will be sentenced to one to four years in prison and one hundred and fifty to four hundred and fifty days fine.
Our legislators must address the need to classify the new crimes that are being committed and analyze them, as occurred with the recent case of the Olympia Law. Many cybercrimes are not criminalized in the Federal or local Penal Codes.