Abstract
Cybercrime is no longer just a societal problem. In the globalized world of the twenty-first century and given the democratization of technology, individuals as well as nation-state can carry out their nefarious activities without fear of protection or detention. Cybercrime is becoming a major issue in Latin America. Several Latin American countries are investigated here to illustrate their cyber issues and how they have created laws to mitigate cyber concerns. Again, cybercrime can never be eliminated. But, nation-state can mitigate and take actions to protect their critical infrastructure.
Keywords
- Cybesecurity
- Latin America
- Cybercrime
An early version of this paper was published in the Marine Corps University Journal Vo. 6, No. 2, Fall 2015. The views expressed in this essay are those of the author and do not necessarily reflect the official policy or position of the Department of the Army, the Department of Defense, or the US government.
This is a preview of subscription content, access via your institution.
Buying options
References
About PeCERT. (2019). https://www.pecert.gob.pe/index.php/acerca-de-nosotros/acerca-del-pecert
Abreu, J. (2012). Mexican drug cartels and cyberspace: Opportunity and threat. InfoSec Institute, 21 March 2012, Retrieved from http://resources.infosecinstitute.com/mexican-cartels
Benítez, S. (2014). Venezuela: Spying in Venezuela through social networks and emails. In global information society watch 2014: Communications surveillance in the digital age (pp. 270–275). Melville: Association for Progressive Communications and Humanist Institute for Cooperation with Developing Countries. Retrieved from http://www.giswatch.org/sites/default/files/spying_in_venezuela_through_social_networks_and_emails.pdf
Carnegie Mellon University. (2019). Retrieved from https://www.sei.cmu.edu/education-outreach/computer-security-incident-response-teams/national-csirts/
Carter, D. L., & Carter, J. G. (2009). The intelligence fusion process for state, local, and tribal law enforcement. Criminal Justice and Behavior 36(12), 1323–1339.
Cavelty, M. D. (2015). The normalization of cyber-international relations. In O. Thranert & M. Zapfe (Eds.), Strategic Trends 2015: Key developments in global affairs. Zurich: Center for Security Studies, 94, Retrieved from http://www.css.ethz.ch/publications/pdfs/Strategic-Trends-2015.pdf
CIA World Fact Book (Argentina). (2019). Retrieved from https://www.cia.gov/library/publications/resources/the-world-factbook/attachments/summaries/AR-summary.pdf
CIA World Fact Book (Cuba). (2019). Retrieved from https://www.cia.gov/library/publications/resources/the-world-factbook/attachments/summaries/CU-summary.pdf
CIA World Fact Book (Mexico). (2019). Retrieved from https://www.cia.gov/library/publications/resources/the-world-factbook/attachments/summaries/MX-summary.pdf
Clapper, J. R. (2015). Opening Statement to the Worldwide Threat Assessment Hearing (remarks, Senate Armed Services Committee, 26 February 2015), Retrieved from http://www.dni.gov/index.php/newsroom/testimonies/209-congressional-testimonies-2015/1175-dni-clapper-opening-statement-on-the-worldwide-threat-assessment-before-the-senate-armed-services-committee
Conan, R. (2013). Defending Mexico’s critical infrastructure against threats. Report company, 22 July 2013, Retrieved from http://www.the-report.net/mexico-prw/600-defending-mexico-s-critical-infrastructure-against-threats
da Cruz, J. A., & Alvarez, T. (2015). Cybersecurity Initiatives in the Americas. Marine Corps University Journal 6(2), 45–68
Demchak, C. C., & Peter Dombrowski, P. (2011). Rise of a Cybered westphalian age. Strategic Studies Quarterly 5(1 (Spring 2011)), 32–61. Retrieved from http://www.au.af.mil/au/ssq/2011/spring/spring11.pdf
Department of Homeland Security Science & Technology. (2019). Retrieved from https://www.dhs.gov/science-and-technology/csd-csirt
Diniz, G., & Muggah, R. (2012). A fine balance: Mapping Cyber (In)Security in Latin America (Strategic paper 2). Rio de Janeiro: Igarapé Institute.
Electronic Privacy Information Center (EPIC), EPIC–Privacy and Human Rights Report. (2006). Bolivarian Republic of Venezuela. New South Wales: World Legal Information Institute. Retrieved from http://www.worldlii.org/int/journals/EPICPrivHR/2006/PHR2006-Bolivari.html
Foltýn, T. (2019). Facebook exposed millions of user passwords to its employees. 22 March 2019. https://www.welivesecurity.com/la-es/2019/03/22/facebook-expuso-millones-de-contrasenas-de-usuarios-a-sus-empleados/
France24. (2019). Cuban government cautiously expands Internet access. Retrieved from https://www.france24.com/en/20190729-cuba-technology-government-internet-access
Geers, K. (2014). Pandemonium: Nation States, National Security, and the internet (Tallinn papers 1) (Vol. 1). Tallinn: NATO Cooperative Cyber Defence Centre of Excellence. 12, Retrieved from https://ccdcoe.org/publications/TP_Vol1No1_Geers.pdf
Glickhouse, R. (2013). Explainer: Cybercrime in Latin America. Americas Society and Council of the Americas, 21 October 2013, Retrieved from http://www.as-coa.org/articles/explainer-cybercrime-latin-america
Greenwald, G. (2014). No place to hide: Edward Snowden, the NSA, and the US Surveillance State. New York: Metropolitan Books.
Hostetler, B. (2015). International compendium of data privacy Laws (p. 1). Washington, DC: BakerHostetler Privacy and Data Protection Team. Retrieved from http://www.bakerlaw.com/files/Uploads/Documents/Data%20Breach%20documents/International-Compendium-of-Data-Privacy-Laws.pdf
International Telecommunications Union. (2018). Percentage of individuals using the internet. https://www.itu.int/en/ITU-D/Statistics/Documents/statistics/2018/Individuals_Internet_2000-2017_Dec2018.xls
Internet World Stats. (2019). Retrieved from https://www.internetworldstats.com/stats2.htm
Kaldor, M. (2012). New and Old Wars: Organized Violence in a Global Era (3d ed.). Redwood City: Stanford University Press.
Kennan, G. F. (1993). Around the Cragged Hill: A personal and political philosophy. New York: W. W. Norton.
Law 27.309 that incorporates cybercrime to the Penal Code of June 26, 2000. http://www.informatica-juridica.com/anexos/ley-27-309-que-incorpora-el-cibercrimen-al-codigo-penal-de-26-de-junio-de-2000-nbsp/
Ley de Interoperabilidad [Law of Interoperability], Gaceta Oficial N° 39.945 [National Diary Number 39.945], Decreto N° 9.051 [Decree number 9.051] (15 June 2012), Retrieved from http://interoperabilidad.gobiernoenlinea.gob.ve/index.php/conceptos/sobre-promociones/promociones/96-ley-de-interoperabilidad
Matamoros, C. A. (2019). Cubans now allowed to access the internet from their own homes, but at what price? Retrieved from https://www.euronews.com/2019/07/29/cubans-now-allowed-to-access-the-internet-from-their-own-homes-but-at-what-price
Mission, Vision and Strategic axes. 2019. https://www.senatics.gov.py/institucion/mision-y-vision
Mueller, M. L., & Hans, K. (2014). Sovereignty, national security, and internet governance: Proceedings of a workshop. In Internet governance project (Workshop). Syracuse: Syracuse University. 12 December 2014, 1, Retrieved from http://www.internetgovernance.org/wordpress/wpcontent/uploads/Proceedings-publication.pdf
Organization of American States (OAS) and Symantec. (2014). Latin American + Caribbean Cybersecurity Trends. Washington, DC: OAS Secretariat for Multidimensional Security/Symantec Corporation. 11, Retrieved from http://www.symantec.com/content/en/us/enterprise/other_resources/b-cyber-security-trends-report-lamc.pdf
Panetta, L. E. (2012). Remarks by Secretary Panetta on Cybersecurity to the Business Executives for National Security, New York City (Speech). New York: Business Executives for National Security. 11 October 2012, Retrieved from http://www.defense.gov/transcripts/trasncript.aspx?transcriptid=5136
Peru – Broadband and Broadcasting Market – Overview, Statistics and Forecasts 2019. https://www.budde.com.au/Research/Peru-Fixed-Broadband-Market-Statistics-and-Analyses#sthash.NrnVfUkJ.dpuf
Rid, T. (2013). Cyber war will not take place. Oxford: Oxford University Press.
Rodriguez, A. (2012). In Cuba, Mystery Shrouds Fate of Internet Cable. Yahoo News, 21 May 2012, Retrieved from http://news.yahoo.com/cuba-mystery-shrouds-fate-internet-cable-180553388%2D%2Dfinance.html
Semple, K. & Cohen, H. B. (2019). Cuba Expands Internet Access to Private Homes and Businesses. Retrieved from https://www.nytimes.com/2019/07/29/world/americas/cuba-internet-technology.html
Symantec Corporation. (2019). Retrieved from Symantec Corporation, 2019. http://securityresponse.symantec.com/norton/cybercrime/pharming.jsp. Card skimming is the act of stealing someone’s credit or debit card information by using a device illegally attached to machines such as an ATM or POS terminal (point of sale terminal). For more on skimming, see the antivirus company Norton’s explanation of the cybercrime concern at “What is identity theft?” Pharming is a scam where malicious software is installed on someone’s computer that redirects them from legitimate sites to fraudulent sites. For more on pharming, see the antivirus company Norton’s explanation of the cybercrime concern at “Online Fraud: Pharming,” Phishing is a type of scam where someone attempts to gain another person’s personal information, such as social security or credit card numbers, through seemingly benign means.
Taleb, N. M. (2007). The black swan: The impact of the highly improbable. New York: Random House.
Trading Economics. (2019). Retrieved from https://tradingeconomics.com/cuba/wages
United Nations Office on Drugs and Crime. (2013). Comprehensive study on cybercrime: Draft– February 2013 (p. xxiii). New York: United Nations Office on Drugs and Crime. Retrieved from https://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
White House. (2018). The comprehensive National Cybersecurity Initiative. Washington, DC: Executive Office of the President of the United States. Retrieved from https://www.whitehouse.gov/sites/default/files/cybersecurity.pdf. Cybersecurity initiatives include strategies and programs intended to protect public, private, and government technology networks. The multilayered approach to identify and respond to cyberterrorism and cybercrime involves government policymakers and technology professionals as well as users. Although the exact meaning of “cyberterrorism” is obscure, US Federal Bureau of Investigation Special Agent Mark M. Pollitt coined the working definition of a “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against noncombatant targets by subnational groups or clandestine agents.” see Serge Krasavin. (2002). What is cyber-terrorism? Zurich: Computer Crime Research Center. http://www.crime-research.org/library/Cyber-terrorism.htm. Cybercrimes are categorized by the damage inflicted on computer and technology assets, fraud targeting individuals and organizations, and perpetration of human abuse and trafficking. See Interpol, “Cybercrime,” http://www.interpol.int/Crime-areas/Cybercrime/Cybercrim
White House Office of the Press Secretary. (2014) Fact sheet: Charting a new course on Cuba, 17 December 2015, Retrieved from http://www.whitehouse.gov/the-press-office/2014/12/17/fact-sheet-charting-new-course-cuba
Willis, G. D., Muggah, R., Kosslyn, J., & Leusin, F. (2013). Smarter Policing: Tracking the Influence of New Information Technology in Rio de Janeiro (Strategic Note 10). Rio de Janeiro: Igarapé Institute. November 2013, 2, Retrieved from http://igarape.org.br/wp-content/uploads/2013/10/Smarter_Policing_ing.pdf
Willis, G. D., Muggah, R., Kossyln, J., & Leusin, F. (2014). The Changing Face of Technology Use in Pacified Communities (Strategic Note 13). Rio de Janeiro: Igarapé Institute. February 2014, 2, Retrieved from http://igarape.org.br/wpcontent/uploads/2014/01/NE-13-Changing-face-of-techology-29jan.pdf
World Bank. (2019). Households w/Internet access, %. https://tcdata360.worldbank.org/indicators/entrp.household.inet?country=BRA&indicator=3429&viz=line_chart&years=2012. 2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 This is a U.S. Government work and not under copyright protection in the U.S.; foreign copyright protection may apply
About this entry
Cite this entry
de Arimatéia da Cruz, J., Godbee, N. (2020). Cybercrime Initiatives South of the Border: A Complicated Endeavor. In: Holt, T., Bossler, A. (eds) The Palgrave Handbook of International Cybercrime and Cyberdeviance. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-78440-3_76
Download citation
DOI: https://doi.org/10.1007/978-3-319-78440-3_76
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-78439-7
Online ISBN: 978-3-319-78440-3
eBook Packages: Law and CriminologyReference Module Humanities and Social Sciences
