Un estudio exploratorio de los delitos de suplantación de identidad policial: delincuentes confrontativos y ofensas

Autores/as

DOI:

https://doi.org/10.22335/rlct.v15i2.1721

Palabras clave:

delito de suplantación de identidad, imitadores de policías, aplicación de la ley, COVID-19

Resumen

Esta investigación se centra en los delitos de suplantación de identidad policial por confrontación, que incluyen agentes federales, personal oficial y estatal, y agentes del orden público locales o nacionales. La investigación existente que examina a los imitadores de policías sugiere que el alcance de este delito está más extendido de lo que comúnmente se cree y rara vez se investiga. Este estudio intenta ofrecer una perspectiva más amplia en comparación con investigaciones anteriores y examina diferentes tipos de actos fraudulentos de manera más global. Los datos de los incidentes de suplantación informados en los medios de comunicación internacionales se recopilaron mediante el sistema Google Alert. Los artículos de noticias de febrero de 2016 a mayo de 2020 se codificaron empleando un análisis de contenido. Los resultados indican que los delitos de suplantación de identidad policial varían en tipo y motivo. La discusión ofrece sugerencias para futuras investigaciones, políticas y regulaciones.

Descargas

Los datos de descarga aún no están disponibles.

Referencias

Anderson, K. B., Durbin, E., & Salinger, M. A. (2008). Identity theft. Journal of Economic Perspectives, 22(2), 171-192. https://doi.org/10.1257/jep.22.2.171

Bassey, I., Ohaeri, I., & Elegbeleye, F. (2015). A novel RFID-based design – theoretical framework for combating police impersonation. International Journal of Computer Science and Information Security, 13(10), 1-9.

BBC News Europe (2011, July 23). Norway police say 85 killed in island youth camp attack. https://www.bbc.com/news/world-europe-14259356

Benson, M. L., & Simpson, S. S. (2018). White-collar crime: An opportunity perspective. Routledge.

Berg, B. L. (2007). Qualitative research methods for the social sciences (6th ed.). Pearson.

Bharat, K. (2012, September 22). F. S. Stinson turns 10 [Web log post]. Google News Blog. https://news.googleblog.com/2012/09/google-news-turns-10.html

Cohen, L. E., & Felson, M. (1979). Social change and crime rate trends: A routine activity approach. American Sociological Review, 44(4), 588-605. https://doi.org/10.2307/2094589

Cornish, D. B., & Clarke, R. V. (1987). Understanding crime displacement: an application of rational choice theory. Criminology, 25(4), 933-948.

Crime Museum. (2017). Ted Bundy: serial killers: crime library. https://www.crimemuseum.org/crime-library/serial-killers/ted-bundy/

Cruywagen, V. (2019, July 3). Beware of bogus police cars that look exactly like the real thing, Capetonians warned. IOLNews. https://acortar.link/sjEk6Zv

Del Collo, C. (2016). Identity theft. Colorado Legislative Council.

https://leg.colorado.gov/sites/default/files/update_identity_theft_ib_7272016.pdf

Felson, M. (2006). Crime and nature. Sage Publications.

Gellately, R. (2000). Crime, identity and power: Stories of police imposters in Nazi Germany. Crime, History & Societies, 4(2), 5-18. https://doi.org/10.4000/chs.821

Hurl-Eamon, J. (2005). The Westminster imposters: Impersonating law enforcement in early Eighteenth-Century London. Eighteenth-Century Studies, 38(3), 461-483. https://doi.org/10.1353/ecs.2005.0026

Indian Penal Code (IPC). Personating a public servant. Chapter 9, Section 170. https://acortar.link/tkL2mG

Jones, D. N. (2014). Predatory personalities as behavioral mimics and parasites: Mimicry-deception theory. Perspectives on Psychological Science, 9(4), 445-451. https://doi.org/10.1177/1745691614535936

Kapan, D. D. (2001). Three-butterfly system provides a field test of Mullerian mimicry. Nature, 409, 338-340. https://doi.org/10.1038/35053066

Levinson-King, R. (2020, July 17). Could Canada's worst mass shooting have been avoided. BBC News. https://www.bbc.com/news/world-us-canada-53411315

Marx, G. (1980). The new police undercover work. Urban Life, 8(4), 399–446. https://doi.org/10.1177/089124168000800402

Marx, G. (2005). Are you for real? Police and other impersonators.

https://web.mit.edu/gtmarx/www/newsday11605.html

Neuendorf, K. A. (2002). The content analysis guidebook. Sage.

Ojedokun, U. A. (2018). Situational and contextual factors sustaining police impersonation in Nigeria. Policing: A Journal of Policy and Practice, 14(2), 428–437. https://doi.org/10.1093/police/pay024

Payne, B. K. (2017). White-collar crime: The essentials. Sage.

Rakestraw, D., & Cameron, B. (2019). Ted Bundy: The development of a serial murderer. Posters. 52. https://digitalcommons.pittstate.edu/posters_2019/52

Rennison, C. M., & Dodge, M. (2012). Police impersonation: Pretenses and predators. American Journal of Criminal Justice. 37(4), 505-522. https://doi.org/10.1007/s12103-011-9153-z

Rennison, C. M., & Hart, T. C. (2019). Research methods in criminal justice and criminology. Sage.

Reynolds, R. G., Jr. (2014). Caryl Chessman: Red light bandit‪?‬ Apple Books.‬‬‬‬‬‬‬‬‬ ‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬‬

Salmon, O. (2020). The laws for South African police services. In Law Made Simple – Compliance for Business, Citizens and for our Government. https://acortar.link/ana5SD

Trugman, K. (1999). Power lures police impersonators. The Washington Times, p. C1.

US Legal, Inc. (n.d.). Criminal impersonation law and legal definition. https://definitions.uslegal.com/c/criminal-impersonation/

Van Natta, D. (2011). In Florida, criminals pose as police more frequently and for more violent ends. http://www.nytimes.com/2011/05/29/us/29fakecops.html?pagewanted=all

Walckner, J. (2006). Understanding police impersonators: Common motives, characteristics, and patterns [Unpublished Master’s Thesis, Curry College, Milton, MA].

Zarei, K., Farahbakhsh, R., & Crespi, N. (2019). Deep dive on politician impersonating accounts in social media. In 2019 IEEE Symposium on Computers and Communications (ISCC), pp. 1-6. IEEE. https://doi.org/10.1109/ISCC47284.2019.8969645

Zarei, K., Farahbakhsh, R., & Crespi, N. (2020). How impersonators exploit Instagram to generate fake engagement? In ICC 2020-2020 IEEE International Conference on Communications (ICC), pp. 1-6. IEEE. https://doi.org/10.1109/ICC40277.2020.9149431

Publicado

2023-07-28

Número

Sección

Artículos de investigación / Artículos Originales

Cómo citar

Un estudio exploratorio de los delitos de suplantación de identidad policial: delincuentes confrontativos y ofensas. (2023). Revista Logos Ciencia & Tecnología, 15(2), 70-85. https://doi.org/10.22335/rlct.v15i2.1721