DIG DEEPER TO FIND WATER & NOT WIDER -P.M.PATEL

Monday, August 31, 2020

How To Track Iphone Without Them Knowing

Few feelings are as stomach-sinkingly awful as the thought of losing an expensive new iPhone. Whether you left it on the bus or someone slid it out of your back pocket, we put so much store in our phones that their loss leaves is saddened and angered. Most of us keep at least copies of everything in our lives on our phones, from personal conversations to emails, 


To say nothing of all our personal information and social media accounts. Of course there are security measures in place, but nobody wants to risk having all that information fall into the hands of the wrong people. In this article, I will show you how to find a phone that has been lost, whether your own phone or the phone of a friend or family member.

Can you track an iPhone without them knowing?

First off, hopefully you activated the Find My Phone feature of your iPhone when you still had it in your possession. Secondly, if your phone doesn't have service (and thus a connection to the Internet) or if you don't have iCloud set up, then these solutions are not going to work for you. Unfortunately phone technology is advanced but it isn't magical; if your phone isn't talking to the network or if you haven't turned on Find My Phone, then unfortunately the technological solution is probably not going to work. (Seriously. If you have possession of your phone(s) then stop reading this article, pick up your devices, go to Settings and select "Find My Phone" (iPhone) or "Find My Device" (Android) and make sure they are toggled on. TTjem upi cam dp ot/"

Without further ado, let's find your phone!

Can I Tell if Someone is Tracking my iPhone?

 

image1-3

Usually yes, if someone is using the "Find my Phone" feature, it will be displaying things on the iPhone screen. Thankfully, "Find My iPhone" comes pre-loaded on all phones with iOs 9 or newer. "Find my iPhone" is the gold standard when it comes to locating your lost iPhone. The service is integrated as part of iCloud. Here's how to use it to find your missing iPhone then track down your phone's exact location.

Step 1: Open up the "Find My iPhone" on a different device

It doesn't matter if you decide to use your iPad, your laptop, or a friend's iPhone – you can run the Find My Phone app fr0m Mac. You can use the Find my Phone app.

If you are using an Apple product like another phone or an iPad, you can simply click on the app.

If you are using a computer (even a Windows PC will work), go to icloud.com then click on the "Find iPhone" icon. Once you've clicked on the "Find iPhone" icon the website process and "Find my iPhone" app process are the same.

Step 2: Input Your Apple ID Credentials (they are the same as your iCloud info)

Since you are not using your phone, you won't be automatically logged in.

Once you log in to the app, select the "All Devices" drop-down option and then find the device that you want to locate.

Step 3: Once You Select Your Phone, Options Will Appear

As soon as you select your device on the page, iCloud will begin to search for it. If the search is successful, you will see your device on a map, pinpointing it's location. Before you sprint out the door to get it, there are some other options you should take a look at.

Once you select your device you will have three additional options in addition to seeing your phone's location. These options are playing a sound, activating "Lost Mode" and erase the phone.

Playing the sound is a great way to find your phone if you lost it somewhere around your house. If you click the option, an audio alert will go off on your phone which will hopefully help you find it. The alert will sound like a loud pinging noise alerting you that your phone is at home with you and not at the coffee shop you just visited. If you hear the pinging sound then you'll quickly find your phone by just following the sound.

When enabled, Lost Mode will lock your phone with a passcode and will display a message of your choice. This can either ensure it will be safe until you can find it, or will alert the thief what you expect of them and that you know where they are. This mode can also enable location services on your phone too.

However, if things have gone too far and you think there is a very slim chance you will ever get your device back – perhaps your phone has already crossed an international border – the best course of action is to simply erase it. Yes, this is giving up, but it also prevents your personal information getting into the hands of someone who could abuse it.

If you follow these steps, you should have your phone back in your pocket in no time. 

Is there an app to track someones phone without them knowing?

maxresdefault-11

What if you're looking for someone else's phone? I'm sorry to burst your bubble, but you are not allowed to track someone else's phone without their knowledge. While there are supposedly apps that you can install on a target's phone to track it and keep tabs on what they are doing on it, that is completely illegal and immoral. In addition to the moral issue, there is the practical fact that they could find the app which could lead to a very awkward situation, possibly one involving the police.

However, there are times when you want to find a friend's phone and you have a legitimate reason, and (the important part) they have given you permission to find it. Just as when you were looking for your own phone, there is an app that can help you find the phones of your friends and family with ease. The "Find My Friends" app used to be an extra download, but now it comes with iOS, so if your friends have ever updated their phone, they should have it.

"Find My Friends" is an app that basically allows you to share your location with others and vice versa. It can be great for keeping track of where your kids are, knowing what your significant other is doing, or just keeping tabs on your friends. It can also help them find a lost phone (as long as you have "Shared Locations" with them). Here is how to set it up:

Step 1: Open the app on your phone and the phone of the person you want to be able to share locations with.

Step 2: Click your profile in the bottom left of the screen.

Step 3: Enable "Share My Location" and make sure AirDrop is enabled on your own phone.

Step 4: From there, your friends and family will be able to search/add you to share your location with them and vice versa. You each will need to accept the "Shared Location" request from the other. Now, you can just click on their profile in the app and keep track of them.

As you likely realized while reading this article, it is a much better idea to be proactive than reactive when it comes to tracking phones. If you set up "Find My iPhone" and "Find My Friends" before your phone gets stolen or lost, it will save you a lot of potential hassle down the road. While it may be a bit worrisome to have someone be able to see your location at all times, it can really save you once your phone goes missing and you need to track it down. It is obviously best to pick someone who you trust not to take advantage of the information an app like "Find My Friends" can provide them.

No one deserves to have their phone stolen or go missing, but thankfully, there are some ways to find it, or at least have the information deleted. Hopefully, this guide helped you be able to find your phone or the phone of your friends and family, or at least prepared you for when it may happen.

If you have other ways of finding a lost phone, please share them with us below!

@EVERYTHING NT

More articles
  1. Hacking Tools 2020
  2. Pentest Tools Linux
  3. Hackers Toolbox
  4. Pentest Box Tools Download
  5. Top Pentest Tools
  6. Hacker Techniques Tools And Incident Handling
  7. Hack Tools For Pc
  8. Hack Tools For Pc
  9. Pentest Tools List
  10. Free Pentest Tools For Windows
  11. Hacker Tools Hardware
  12. Install Pentest Tools Ubuntu
  13. Hacks And Tools
  14. Pentest Tools Kali Linux
  15. Hacking Tools For Beginners
  16. Pentest Tools Website Vulnerability
  17. Wifi Hacker Tools For Windows
  18. Hacker Tools 2019
  19. Pentest Recon Tools
  20. Underground Hacker Sites
  21. Hack Rom Tools
  22. Hack App
  23. Hack Tools For Pc
  24. Hacking Tools For Beginners
  25. Pentest Tools Website
  26. Hacking Tools Hardware
  27. Pentest Recon Tools
  28. Hacker Tools Online
  29. Hack Rom Tools
  30. Hacking Tools And Software
  31. New Hacker Tools
  32. New Hacker Tools
  33. Computer Hacker
  34. Pentest Tools Kali Linux
  35. Pentest Tools Port Scanner
  36. Hacker Tools For Pc
  37. Hack Tools For Games
  38. Top Pentest Tools
  39. Hackers Toolbox
  40. Pentest Tools Find Subdomains
  41. Ethical Hacker Tools
  42. Hack Tools For Windows
  43. Hacker Tools Apk Download
  44. Hack Tools Mac
  45. Hacker Tools Online
  46. Pentest Tools Review
  47. Hacking Tools For Mac
  48. Hacker Tools Hardware
  49. Hacking Tools For Windows
  50. How To Hack
  51. Game Hacking
  52. Hacking Tools 2019
  53. How To Install Pentest Tools In Ubuntu
  54. Tools Used For Hacking
  55. Hacker Tools Apk Download
  56. Hacker Tools Software
  57. Pentest Tools Bluekeep
  58. Hacking Tools For Games
  59. Pentest Tools Review
  60. Pentest Tools List
  61. Hacker Tools 2020
  62. How To Make Hacking Tools
  63. Hacking Tools Windows
  64. Hacks And Tools
  65. Hacker Tool Kit
  66. Game Hacking
  67. Computer Hacker
  68. Hack Tools Online
  69. Pentest Tools Android
  70. Hacker Tools 2019
  71. Hacker Tools Free
  72. Hacking Tools Hardware
  73. Pentest Tools For Android
  74. Hacking Tools Usb
  75. Pentest Tools Open Source
  76. Black Hat Hacker Tools
  77. Top Pentest Tools
  78. Pentest Tools Github
  79. Hak5 Tools
  80. Hacker Tools Free
  81. Nsa Hacker Tools
  82. Hacker Tools Apk
  83. Hackrf Tools
  84. Pentest Tools Url Fuzzer
  85. Hacker Tools Windows
  86. How To Hack
  87. Hack Tools For Mac
  88. Hack Tools Online
  89. Hacker Tools Mac
  90. Pentest Tools Url Fuzzer
  91. Pentest Tools Bluekeep
  92. Pentest Tools Free
  93. Hacker Tools Hardware
  94. Ethical Hacker Tools
  95. Hack Tools 2019
  96. Nsa Hack Tools Download
  97. Hacker Security Tools
  98. Hacker Tools Windows
  99. Best Hacking Tools 2020
  100. Pentest Reporting Tools
  101. Hacking Tools Kit
  102. Pentest Tools Website
  103. Pentest Tools Android
  104. Pentest Tools For Mac
  105. Hacking Tools 2020
  106. Pentest Tools Free
  107. Usb Pentest Tools
  108. Pentest Tools Tcp Port Scanner
  109. Blackhat Hacker Tools
  110. Pentest Tools Bluekeep
  111. Tools Used For Hacking
  112. Hacking Tools For Windows 7
  113. Hack Tools Pc
  114. Nsa Hack Tools Download
  115. How To Install Pentest Tools In Ubuntu
  116. Kik Hack Tools
  117. Hacks And Tools
  118. Hacking Tools Kit
  119. Pentest Tools Website
  120. Hacker Tools 2019
  121. Hacker Security Tools
  122. Pentest Automation Tools
  123. Nsa Hacker Tools
  124. Hack And Tools
  125. Pentest Tools Android
  126. Pentest Tools Open Source
  127. Nsa Hack Tools
  128. Growth Hacker Tools
  129. Hacker Tools Free
  130. Pentest Tools List
  131. Hacking Tools Pc
  132. Growth Hacker Tools
  133. Free Pentest Tools For Windows
  134. Hacker Tools For Mac
  135. Black Hat Hacker Tools
  136. Hack Tools For Mac
  137. Hacking Tools Kit
  138. Hacker Tools Windows
  139. Hak5 Tools
  140. Hacking Tools Mac
  141. Hacking Tools For Games
  142. Hack Tools Mac
  143. Easy Hack Tools
  144. Computer Hacker
  145. Hack Website Online Tool
  146. Hacker Tools For Windows
  147. Hacking Tools 2019
  148. Tools For Hacker
  149. Hacking App
  150. Hacking Tools Usb
  151. Hacking Tools Usb
  152. Termux Hacking Tools 2019

PHASES OF HACKING

What is the process of hacking or phases of hacking?
Hacking is broken up into six phases:The more you get close to all phases,the more stealth will be your attack.

1-Reconnaissance-This is the primary phase of hacking where hacker tries to collect as much as information as possible about the target.It includes identifying the target,domain name registration records of the target, mail server records,DNS records.The tools that are widely used in the process is NMAP,Hping,Maltego, and Google Dorks.

2-Scanning-This makes up the base of hacking! This is where planning for attack actually begins! The tools used in this process are Nessus,Nexpose,and NMAP. After reconnaissance the attacker scans the target for services running,open ports,firewall detection,finding out vulnerabilities,operating system detection.

3-Gaining Access-In this process the attacker executes the attack based on vulnerabilities which were identified during scanning!  After the successful, he get access to the target network or enter in to the system.The primary tools that is used in this process is Metasploit.

4-Maintaining Access-It is the process where the hacker has already gained access in to a system. After gaining access the hacker, the hacker installs some backdoors in order to enter in to the system when he needs access in this owned system in future. Metasploit is the preffered toll in this process.

5-Clearning track or Covering track-To avoid getting traced and caught,hacker clears all the tracks by clearing all kinds of logs and deleted the uploaded backdoor and anything in this process related stuff which may later reflect his presence!

6-Reporting-Reporting is the last step of finishing the ethical hacking process.Here the Ethical Hacker compiles a report with his findings and the job that was done such as the tools used,the success rate,vulnerabilities found,and the exploit process.
Related links
  1. Hack Website Online Tool
  2. Hack Tools For Mac
  3. Hack Tools Pc
  4. Hack Rom Tools
  5. Bluetooth Hacking Tools Kali
  6. Kik Hack Tools
  7. Computer Hacker
  8. Bluetooth Hacking Tools Kali
  9. Pentest Tools Online
  10. Hack Tools Github
  11. Computer Hacker
  12. Hacker Tools
  13. Hackrf Tools
  14. Hacking Apps
  15. Hacking Tools Name
  16. Hacking Tools Free Download
  17. Easy Hack Tools
  18. Pentest Tools Review
  19. Hacking Tools For Beginners
  20. How To Make Hacking Tools
  21. Nsa Hack Tools
  22. Wifi Hacker Tools For Windows
  23. Nsa Hacker Tools
  24. Pentest Tools List
  25. Pentest Tools Nmap
  26. Pentest Tools Online
  27. Hack Tool Apk No Root
  28. Hacking Tools Name
  29. Pentest Tools Android
  30. Underground Hacker Sites
  31. Hacking Tools Usb
  32. Hacker Hardware Tools
  33. Hacking Tools For Pc
  34. Pentest Tools Review
  35. Easy Hack Tools
  36. Hacking Tools Windows
  37. Pentest Tools Github
  38. What Are Hacking Tools
  39. Pentest Tools For Mac
  40. Pentest Tools Github
  41. Hacking Tools Windows 10
  42. Hack Tools For Windows
  43. Pentest Automation Tools
  44. Hacker Security Tools
  45. Hacker Tools Mac
  46. Usb Pentest Tools
  47. Hacking Tools Free Download
  48. Hacker Tools Online
  49. Hacker Tools For Ios
  50. Hacking Tools For Pc
  51. Hacking Tools Usb
  52. Hack App
  53. Hacking Tools For Windows
  54. Hacker Techniques Tools And Incident Handling
  55. Hack Website Online Tool
  56. Growth Hacker Tools
  57. Hacker Tools For Ios
  58. Hacking Tools Kit
  59. Hacker Tools For Ios
  60. Hack Website Online Tool
  61. New Hacker Tools
  62. Pentest Tools Framework
  63. Pentest Reporting Tools
  64. Pentest Tools Website Vulnerability
  65. Pentest Reporting Tools
  66. How To Install Pentest Tools In Ubuntu
  67. Pentest Box Tools Download
  68. Growth Hacker Tools
  69. Hacking Tools For Mac
  70. Hacking Tools Kit
  71. Hack And Tools
  72. Hackrf Tools
  73. Hacker Tools Apk
  74. Pentest Tools Review
  75. Hack App
  76. Hacks And Tools
  77. Ethical Hacker Tools
  78. Hack Tools 2019
  79. Hacker Tools For Ios
  80. Hacker Tools
  81. Hack Rom Tools
  82. Hacking Tools Windows
  83. Hacking Tools And Software
  84. Hacker Tools For Ios
  85. Pentest Tools Kali Linux
  86. Hacker Tools 2019
  87. Hack Tools Pc
  88. Computer Hacker
  89. Hacker Tools
  90. Hackers Toolbox
  91. Hack Tools Online
  92. Hacking Tools For Windows Free Download
  93. Pentest Tools List
  94. Hack Tool Apk No Root
  95. Best Hacking Tools 2020
  96. Wifi Hacker Tools For Windows
  97. Pentest Recon Tools
  98. Pentest Tools Online
  99. What Are Hacking Tools
  100. Hacker Tools For Mac
  101. Hack Tools
  102. Hacking Tools For Kali Linux
  103. Android Hack Tools Github
  104. Hacking Tools For Windows 7
  105. Pentest Tools Windows
  106. Computer Hacker
  107. Tools 4 Hack
  108. Hacker Tools
  109. Nsa Hack Tools
  110. Hacking Tools Software
  111. Pentest Tools
  112. Beginner Hacker Tools
  113. Underground Hacker Sites
  114. Pentest Tools Online
  115. Underground Hacker Sites
  116. Hack Tools For Ubuntu
  117. Android Hack Tools Github
  118. Hacker Tools 2020
  119. Hacking Tools Github
  120. Hacking Tools For Kali Linux
  121. Pentest Tools
  122. Hacker Tools For Windows
  123. Hacking Tools Kit
  124. Computer Hacker
  125. Pentest Tools
  126. Hacker Security Tools
  127. Hacker Tools For Windows
  128. Hack Tools Online
  129. Hacker Tools Hardware
  130. Install Pentest Tools Ubuntu
  131. Hacker Tools For Windows
  132. Hacker Tools 2019
  133. Pentest Tools List
  134. Usb Pentest Tools
  135. Pentest Tools Framework
  136. Hacks And Tools
  137. Hacking Tools For Pc
  138. Hacker Tools Linux
  139. New Hacker Tools
  140. Hack Tools Github
  141. Pentest Tools For Mac
  142. Hacking Tools Online
  143. Pentest Tools Port Scanner
  144. Pentest Tools Framework
  145. Github Hacking Tools
  146. Game Hacking
  147. How To Make Hacking Tools
  148. Hack Tools Github
  149. Hacker Tools
  150. Hacking Tools Mac
  151. Hacker Tools Online
  152. Pentest Tools Open Source
  153. Nsa Hacker Tools
  154. Hacking Tools Github
  155. Hack Tools Download
  156. Pentest Tools Website Vulnerability
  157. Pentest Box Tools Download
  158. Hacker Tools Online
  159. Pentest Tools Port Scanner
  160. Hacking Tools
  161. Hack Tools
  162. Hacker Tool Kit
  163. How To Install Pentest Tools In Ubuntu
  164. Tools Used For Hacking

Sunday, August 30, 2020

Las Criptodivisas Y Los Delitos De Financiación Del Terrorismo Y El Blanqueo De Capitales

La semana pasada funcionarios de diferentes agencias gubernamentales estadounidenses (HSI, FBI y el RSI) incautaron los fondos de varios cientos de direcciones de criptomonedas como parte de una amplia campaña de captación de fondos destinada a la financiación del terrorismo. Los documentos judiciales establecieron redes de financiación operadas por grupos vinculados a al-Qaeda e ISIS, así como a las Brigadas al-Qassam.

Figura 1: Las criptodivisas y los delitos de financiación del terrorismo y el blanqueo de capitales

Dichas agencias han identificado casi trescientas direcciones de bitcoin como parte de una gran investigación contra tres redes de financiación del terrorismo. Representando la incautación de criptomonedas más grande jamás realizada por el gobierno en el contexto del terrorismo. Estas redes comprendían varias fuentes de financiación para la recaudación de fondos, que incluían el uso de campañas de captación de donaciones centradas en bitcoins y las ventas ilícitas de equipos de protección personal durante la pandemia de la COVID-19.

En el contexto de al-Qaeda, los fiscales alegaron en documentos judiciales que los grupos sirios Al-Nusrah Front y Hay'at Tahrir al-Sham usaron Telegram y las redes sociales como medio para la recaudación de fondos en bitcoin a partir de 2019.

Figura 2: Hamas acepta BitCoin desde 2019

En una acción judicial separada, los fiscales persiguieron a la red operada por al-Qassam, que involucró el uso de dos sitios web, así como cinco cuentas en una "institución financiera" anónima. Además, se identificaron "más de 180 cuentas de moneda virtual".Describiéndose un sistema de tres etapas que involucraba el uso de cuentas en doce casas de cambio, así como direcciones personales y páginas web. Por otro lado, la campaña relacionada con ISIS se centró en la venta fraudulenta de PPE, específicamente máscaras N95 supuestamente aprobadas por la FDA.


Estos casos muestran que los intermediarios financieros y la infraestructura que los grupos terroristas han utilizado tradicionalmente para mover dinero, como las empresas de envío de dinero sin licencia y las redes hawala, han comenzado a migrar hacia las criptomonedas, lo que ha hecho que todos los investigadores y analistas de ciberseguridad hayan tenido que aprender cómo funcionan estas tecnologías en detalle.

Algunos ya lo veníamos advirtiendo desde hace años, recuerdo la ponencia que tuve que el honor de impartir en el 1er Congreso internacional sobre ciudad, seguridad y terrorismo global que organiza el International SecurityObservatory, donde ya definía a las criptos como el Hawala 2.0 (además, así fue el título de la ponencia) y también recuerdo el libro que tuve el honor de coescribir en el año 16, con mi buen amigo el Doctor en Economía Basilio Ramirez, que ya titulábamos BITCOIN ¿AMENAZA U OPORTUNIDAD? (Toda una declaración de intenciones, ¿verdad?) 

Figura 4: BitCoin ¿Amenaza u oportunidad?

Tanto era así que la directiva 2018/843 del parlamento europeo y del consejo de 30 de mayo de 2018, trataba por fin, las criptomonedas como amenaza y como herramienta utilizada en algunos procesos de lavado de dinero Fiat. Dicha directiva está en un proceso muy avanzado de transposición a nuestra ley y su entrada en vigor en España será, probablemente, antes de final de este año.


Pero... ¿cómo se blanquea con las criptos? Déjenme les explique antes que es el blanqueo de capitales. En España parece consolidada terminológicamente una serie de conceptos respecto del blanqueo de capitales:
  • Se trata de un proceso.
  • Este proceso pretende convertir el dinero sucio, es decir, el procedente de negocios que constituyen un delito, o que no se pueden justificar ante las autoridades competentes, en dinero que se pueda justificar fiscalmente.
  • Se marca la tendencia de unificar el concepto del dinero no declarado a la Hacienda Pública con el obtenido ilegalmente. Es decir, que no declarar a la Hacienda Pública es un delito.
  • El proceso en sí mismo es un delito.
  • En el blanqueo de capitales ha de tenerse en cuenta tanto el dinero como los bienes obtenidos ilegalmente.
Podríamos decir en una primera aproximación, sin pretensiones jurídicas, que el blanqueo de capitales es el proceso a través del cual se trata de dar apariencia de legalidad o legitimidad a unos productos (dinero, divisas, fondos, activos, capitales, bienes, etcétera). Éstos habrían sido generados como consecuencia de una actividad ilegal o injustificada. Siendo la clave del proceso de blanqueo el eliminar el rastro entre dichos productos y la actividad ilegal. Para ello se realizarían múltiples actos o negocios jurídicos cuyo objetivo es complicar o borrar cualquier relación respecto de su origen verdadero. El proceso de blanqueo se compone de varias fases:

1.- Colocación: Momento en el que los fondos son introducidos en el sistema económico o financiero.

2.- Transformación: Conjunto de operaciones dirigidas a encubrir, ocultar o hacer desaparecer el nexo entre el activo y su fuente.

3.- Integración: Retorno del activo al patrimonio de quien lo generó con toda la apariencia de legalidad.

Los métodos de blanqueo son complejos y cambiantes. Factores como la deliberada complejidad de los procesos, la modificación frecuente de la naturaleza de los activos, o el cambio en su localización geográfica, suelen verse con frecuencia asociados a esquemas de blanqueo. La lucha contra el blanqueo de capitales se basa en dos mecanismos mutuamente complementarios:

1.- El sistema represivo o penal: Que configura al blanqueo de capitales como un delito tipificado en el Código Penal. Correspondiendo a los juzgados y tribunales su represión, con el auxilio de los cuerpos policiales.

2.- El sistema preventivo o administrativo: Éste intenta dificultar o impedir el acceso al sistema financiero. También al de otros sectores de actividad, de bienes o capitales de origen delictivo, mediante la imposición de una serie de obligaciones a determinadas personas o entidades que operan en dichos sectores. De manera que el incumplimiento de estas obligaciones constituye una infracción administrativa, castigada con sanciones de multa de elevado importe.

Vamos ahora con el ejemplo de blanqueo. Tan sencillo como ir a una gran superficie de alimentación francesa, de imagen y sonido o de video juegos y solicitar tarjetas de prepago canjeables por su equivalente en criptomoneda y, por otro lado, necesitaremos tener creada una wallet o cartera de Bitcoins (1era fase, colocación), que será la que utilicemos para llevar a cabo la conversión a criptomoneda.

Acto seguido procederemos a través de mezcladoras de bitcoin su ofuscación (eliminar toda la trazabilidad posible) (2nda fase, Transformación) para que posteriormente través de un Exchange o particular cambiar a dinero Fiat, cuyo destinatario final sea una sociedad o testaferro en otra jurisdicción mas laxa con este tipo de operaciones (3era fase, Integración)

El uso de las criptodivisas, como herramienta vehicular en los procesos de ciber blanqueo de dinero, va en aumento. De hecho, es uno de los esquemas "de moda" entre los terroristas y la delincuencia organizada. No solo por su opacidad si no por el desconocimiento de jueces y fiscales a la hora de su instrucción y posterior juicio. En ocasiones la policía judicial realiza unas diligencias extraordinarias que no prosperan por la falta de información del juez de turno. 

Figura 6: La prevención en el blanqueo de capitales

La formación e información al respecto de estos esquemas emergentes es vital, no solo para su lucha, si no para su correcta comprensión y entendimiento. Las criptomonedas en su concepción primigenia son una alternativa a tener muy en cuenta como un medio de pago de elección más. Su mal uso, tan solo es responsabilidad de quien utiliza este sistema de pago como herramienta para delinquir.


Contactar con Juan Carlos Galindo

Related posts