
{"id":849,"date":"2010-11-17T08:21:17","date_gmt":"2010-11-17T11:21:17","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=849"},"modified":"2010-11-17T08:21:17","modified_gmt":"2010-11-17T11:21:17","slug":"como-atraparon-al-secuestrador-de-facebook","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/","title":{"rendered":"C\u00f3mo atraparon al &#8220;secuestrador de Facebook&#8221;"},"content":{"rendered":"<p>El hombre de 38 a\u00f1os fue detenido ayer, acusado de haber mantenido  secuestrada durante seis d\u00edas a una adolescente de 16 a\u00f1os que <strong>contact\u00f3 por la red social Facebook. <\/strong>Para dar con el sospechoso, la polic\u00eda invent\u00f3 una <strong>falsa cita<\/strong>.<\/p>\n<p>La denuncia de la desaparici\u00f3n de la chica fue presentada por su madre,  que adem\u00e1s recibi\u00f3 mensajes de texto en su celular desde distintos  tel\u00e9fonos supuestamente procedente del captor de su hija.<\/p>\n<p>La v\u00edctima conoci\u00f3 al hombre que la mantuvo cautiva en la red social  Facebook, mediante la cual intercambi\u00f3 varios mensajes hasta que <strong>paut\u00f3 un encuentro despu\u00e9s del que no regres\u00f3 a su hoga<\/strong>r.<\/p>\n<p>La polic\u00eda abri\u00f3 una cuenta y logr\u00f3 contactar al sospechoso luego de  tres d\u00edas de iniciada la investigaci\u00f3n y mediante un ardid pact\u00f3 un  encuentro. &#8220;Me ped\u00eda que nos encontremos, <strong>me dec\u00eda que me pod\u00eda ir a vivir con \u00e9l<\/strong>&#8220;, F. Gonz\u00e1lez, la cita falsa que permiti\u00f3 encontrar al captor.<\/p>\n<p>&#8220;El primer d\u00eda \u00e9l ya quer\u00eda que nos encontremos&#8221;, y al otro d\u00eda ya le dio su tel\u00e9fono celular y pactaron el encuentro.<\/p>\n<p>El hombre acudi\u00f3 a la cita simulada en una estaci\u00f3n de servicio. &#8220;Cuando lleg\u00f3, <strong>inmediatamente me quer\u00eda sacar de ah\u00ed&#8221;<\/strong>, relata Gonz\u00e1lez, hija de un comisario de San Miguel. Finalmente, la chica se fue.<\/p>\n<p>A partir de ah\u00ed los investigadores policiales lo siguieron hasta su domicilio ubicado en la localidad bonaerense de La Tablada.<\/p>\n<p>La Polic\u00eda lo vigil\u00f3 durante un d\u00eda y advirti\u00f3 que la persona luego  concurri\u00f3 a un local comercial en la localidad de San Justo, hasta donde  tambi\u00e9n fue seguido. Finalmente, la Polic\u00eda realiz\u00f3 allanamientos en  ambos inmuebles y rescat\u00f3 a la adolescente, luego de seis d\u00edas de su  desaparici\u00f3n, y detuvo a su captor.<\/p>\n<p>&#8220;Me llamo la atenci\u00f3n la mirada que ten\u00eda, <strong>muy penetrante<\/strong>&#8220;, dijo la joven que ayud\u00f3 en el rescate.<\/p>\n<p><em><strong>Fuente: <a href=\"http:\/\/www.tn.com.ar\/policiales\/123968\/como-atraparon-al-secuestrador-de-facebook\" target=\"_blank\">TN<\/a><\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El hombre de 38 a\u00f1os fue detenido ayer, acusado de haber mantenido secuestrada durante seis d\u00edas a una adolescente de 16 a\u00f1os que contact\u00f3 por la red social Facebook. Para dar con el sospechoso, la polic\u00eda invent\u00f3 una falsa cita. La denuncia de la desaparici\u00f3n de la chica fue presentada por su madre, que adem\u00e1s [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-849","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - C\u00f3mo atraparon al &quot;secuestrador de Facebook&quot;<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Santiago Trigo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/\"},\"author\":{\"name\":\"Santiago Trigo\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3\"},\"headline\":\"C\u00f3mo atraparon al &#8220;secuestrador de Facebook&#8221;\",\"datePublished\":\"2010-11-17T11:21:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/\"},\"wordCount\":342,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - C\u00f3mo atraparon al \\\"secuestrador de Facebook\\\"\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2010-11-17T11:21:17+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3\",\"name\":\"Santiago Trigo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g\",\"caption\":\"Santiago Trigo\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/santiago\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - C\u00f3mo atraparon al \"secuestrador de Facebook\"","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/","twitter_misc":{"Written by":"Santiago Trigo","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/"},"author":{"name":"Santiago Trigo","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3"},"headline":"C\u00f3mo atraparon al &#8220;secuestrador de Facebook&#8221;","datePublished":"2010-11-17T11:21:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/"},"wordCount":342,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/","url":"https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - C\u00f3mo atraparon al \"secuestrador de Facebook\"","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2010-11-17T11:21:17+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/como-atraparon-al-secuestrador-de-facebook\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/3a08f80e1b2d0a00dba2a8e9ec922dd3","name":"Santiago Trigo","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12f8dd3b70a2968629380a577c36903f47a13c284bce9b94e2a842fe52a266f1?s=96&d=mm&r=g","caption":"Santiago Trigo"},"sameAs":["http:\/\/www.talsoft.com.ar"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/santiago\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=849"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/849\/revisions"}],"predecessor-version":[{"id":850,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/849\/revisions\/850"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}