La cuestionable regulación penal de los delitos de financiación ilegal de partidos políticos
Main Article Content
Abstract
The reform realized by the L.O. 1/2015, of March 30 incorporated for the first time in our Criminal Law, the crime of illegal financing of political parties, which was constituting one of the topics most troubled and questioned by the society in relation with this type of organizations, from the perspective of his consideration as a manifestation of the public existing corruption in our country. Nevertheless, neither the technique of criminalization, nor the conducts includes are adequated to face it, but, on the contrary has been made an incoherent, insufficient regulation, which will give place to important absences as well as to a serious question of his criminal legitimacy. Therefore, the subject of this article, in addition to an analysis of the typical elements of each of the crimes of illegal financing, is dedicated to highlighting the most questionable and controversial aspects of the regulation itself.
Downloads
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
References
"Cano Paños, M. Á. El binomio internet/terrorismo islamista. en Iter Criminis, año 4, número 21, INACIPE, mayo-junio 2011.
Conway, M.Cyberterrorism: The Story So Far. Department of Political Science 1, Trinity College, Dublin, Ireland, 2013. Disponible en: http://doras.dcu.ie/496/1/info_warfare_2_2_2003.pdf.
Guibourg, R. A. Informática Jurídica Decisoria, Astrea, Buenos Aires, 1993.
Hargreaves C. y D. P. Understanding cyber criminals and measuring their future activity developing cybercrime research. Security Lancaster, Lancaster University. Disponible en: http://eprints.lancs.ac.uk/65477/1/Final_version_Understanding_cyber_criminals_and_measuring_ their_activity.pdf
http://www.insightmx.com.mx/detallenota.php?id_ news=125
http://www.insightmx.com.mx/detallenota.php?id_ news=125. Consultado el 16 de abril de 2017; 17:30 hrs.
http://www.policia.cl/paginas/brigadas/bg-bricib/bgbricib.htm
http://www.policiaiformatica.gob.pe/nosotros.asp
http://www.ured.org.mx/ured/breves-consideracionessobre-la-ciberdelincuencia-y-el-ciberterrorismo/
Jalil S.A. Countering Cyber Terrorism Effectively: Are We Ready To Rumble? GIAC Security Essentials Certification (GSEC) Practical Assignment, Version 1.4b, Option 1, junio 2003. Disponible en: http://www.giac.org/paper/gsec/3108/counteringcyber-terrorism-effectively-ready-rumble/105154.
Koops, B.-J. The Internet and its Opportunities for Cybercrime, 2010.
Krasavin, S. en Pollitt, M. What is Cyberterrorism? Computer Crime Research Centre. Disponible en: http://www.crime-research.org/library/ Cyber-terrorism.htm
Lessig, L. Code and other Laws of cyberspace, Basic books, U.S.A, 1999.
Luciano Salellas. Delitos Informáticos, Ciberterrorismo, V.1.201. Boletín Informativo de Seguridad (http://www.cabinas.net/monografias/informatica/delitos_informativos_ciberterrorismo.pdf).
Porte Petit Candaudap, C. Programa de Derecho Penal, Parte General, 3ª ed. Trillas, México, 1990.
Vangie, B. Cyberspace. En Webopedia. 24 de mayo, 2021. Disponible en: https://www.webopedia.com/definitions/cyberspace/
Vasconcelos Santillán, J. Informática I, Computación Básica, Publicaciones Cultural, México, 2002."