<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>2422-4200</journal-id>
<journal-title><![CDATA[Revista Logos Ciencia & Tecnología]]></journal-title>
<abbrev-journal-title><![CDATA[Rev. logos cienc. tecnol.]]></abbrev-journal-title>
<issn>2422-4200</issn>
<publisher>
<publisher-name><![CDATA[Policía Nacional de Colombia]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S2422-42002021000200103</article-id>
<article-id pub-id-type="doi">10.22335/rlct.v13i2.1391</article-id>
<title-group>
<article-title xml:lang="es"><![CDATA[Perfil del modus operandi de los criminales de la extorsión en Caquetá, Colombia]]></article-title>
<article-title xml:lang="en"><![CDATA[Profile of the extortionists' modus operandi in Caquetá, Colombia]]></article-title>
<article-title xml:lang="pt"><![CDATA[Perfil do modus operandi dos criminosos de extorsão em Caquetá, Colômbia]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Ochoa-Díaz]]></surname>
<given-names><![CDATA[Alex Gabriel]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Páramo]]></surname>
<given-names><![CDATA[Pablo]]></given-names>
</name>
<xref ref-type="aff" rid="Aff"/>
</contrib>
</contrib-group>
<aff id="Af1">
<institution><![CDATA[,Policía Nacional de Colombia  ]]></institution>
<addr-line><![CDATA[Medellín ]]></addr-line>
<country>Colombia</country>
</aff>
<aff id="Af2">
<institution><![CDATA[,Universidad Pedagógica Nacional  ]]></institution>
<addr-line><![CDATA[Bogotá ]]></addr-line>
<country>Colombia</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>08</month>
<year>2021</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>08</month>
<year>2021</year>
</pub-date>
<volume>13</volume>
<numero>2</numero>
<fpage>103</fpage>
<lpage>114</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_arttext&amp;pid=S2422-42002021000200103&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_abstract&amp;pid=S2422-42002021000200103&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.co/scielo.php?script=sci_pdf&amp;pid=S2422-42002021000200103&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="es"><p><![CDATA[RESUMEN El presente estudio tiene como propósito caracterizar el fenómeno de la extorsión como práctica delictiva en el departamento del Caquetá (Colombia), a partir del perfil general derivado de la identificación de algunas variables que diferencian los modus operandi de los principales autores de este flagelo. Se realizó el análisis de 52 casos de extorsión en la región a partir de la sistematización de las denuncias interpuestas por las víctimas, lo cual permitió identificar las variables que caracterizan el delito. La información fue sistematizada y analizada con el programa Multidimensional Scalogram Analysis (MSA), con el cual se evidencia que el delito de extorsión es estructurado al mostrar similitud en el accionar de los distintos grupos criminales que actúan en la zona, lo que contribuye a esclarecer en cierto grado el responsable y su modalidad extorsiva. Se discute la importancia del análisis centrado en el MSA para la perfilación de la extorsión y sus implicaciones en el esclarecimiento de otros delitos dentro de la investigación criminal.]]></p></abstract>
<abstract abstract-type="short" xml:lang="en"><p><![CDATA[ABSTRACT The purpose of this article was to characterizes the phenomenon of extortion as a criminal practice in the department of Caquetá, Colombia, from a general profile derived from the identification of some variables differentiating the modus operandi of the main authors of this felony. The analysis of 52 cases of extortion in the region was carried out based on the systematization of the complaints filed by the victims, which allowed extracting the variables that characterize this crime. The information was systematized and analyzed with the Multidimensional Scalogram Analysis (Msa) software which allowed to presume that extortion is structured showing the similarity in the actions of the different criminal groups and the modalities of extortion they use. The importance of the analysis focused on the Msa for the profiling of the crime of extortion and its implications for other crimes within the criminal investigation is discussed.]]></p></abstract>
<abstract abstract-type="short" xml:lang="pt"><p><![CDATA[RESUMO O presente estudo tem como objetivo caracterizar o fenômeno da extorsão como prática criminosa no departamento do Caquetá (Colômbia), a partir do perfil geral derivado da identificação de algumas variáveis que diferenciam o modus operandi dos principais autores deste flagelo. A análise de 52 casos de extorsão na região foi realizada a partir da sistematização das denúncias das vítimas, o que permitiu identificar as variáveis que caracterizam o crime. As informações foram sistematizadas e analisadas com o programa Multidimensional Scalogram Analysis (MSA), que mostra que o crime de extorsão se estrutura por apresentar semelhanças nas ações dos diferentes grupos criminosos que atuam na área, o que ajuda a esclarecer em certa medida o responsável e sua modalidade de extorsão. Discute-se a importância da análise centrada no MSA para perfilar a extorsão e suas implicações no esclarecimento de outros crimes no âmbito da investigação criminal.]]></p></abstract>
<kwd-group>
<kwd lng="es"><![CDATA[criminalidad]]></kwd>
<kwd lng="es"><![CDATA[extorsión]]></kwd>
<kwd lng="es"><![CDATA[crimen]]></kwd>
<kwd lng="es"><![CDATA[perfil criminológico]]></kwd>
<kwd lng="es"><![CDATA[perfiles de terroristas]]></kwd>
<kwd lng="es"><![CDATA[MSA]]></kwd>
<kwd lng="en"><![CDATA[criminality]]></kwd>
<kwd lng="en"><![CDATA[extortion]]></kwd>
<kwd lng="en"><![CDATA[guerrilla]]></kwd>
<kwd lng="en"><![CDATA[criminological profile]]></kwd>
<kwd lng="en"><![CDATA[terrorists' profiles]]></kwd>
<kwd lng="en"><![CDATA[MSA]]></kwd>
<kwd lng="pt"><![CDATA[criminalidade]]></kwd>
<kwd lng="pt"><![CDATA[extorsão]]></kwd>
<kwd lng="pt"><![CDATA[crime]]></kwd>
<kwd lng="pt"><![CDATA[perfil criminológico]]></kwd>
<kwd lng="pt"><![CDATA[perfis terroristas]]></kwd>
</kwd-group>
</article-meta>
</front><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Andrade]]></surname>
<given-names><![CDATA[K]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Las pandillas salvadoreñas y el delito de extorsión. Desafíos y prioridades en relación con el fenómeno extorsivo]]></article-title>
<source><![CDATA[Policía y Seguridad Publica]]></source>
<year>2015</year>
<volume>5</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>103-47</page-range></nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Arias]]></surname>
<given-names><![CDATA[E. D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Social Responses to Criminal Governance in Rio de Janeiro, Belo Horizonte, Kingston, and Medellín]]></article-title>
<source><![CDATA[Latin American Research Review]]></source>
<year>2019</year>
<volume>54</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>165-80</page-range></nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bejarano]]></surname>
<given-names><![CDATA[A. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Pizarro]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Coming Anarchy: The Partial Collapse of the State and the Emergence of Aspiring State Makers in Colombia]]></source>
<year>2001</year>
<publisher-name><![CDATA[Universidad de Toronto]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Bradford]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[When terrorists target schools: An exploratory analysis of attacks on educational institutions]]></article-title>
<source><![CDATA[Journal of Police and Criminal Psychology]]></source>
<year>2013</year>
<numero>28</numero>
<issue>28</issue>
<page-range>127-38</page-range></nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Burbano]]></surname>
<given-names><![CDATA[N. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Correa]]></surname>
<given-names><![CDATA[C. T.]]></given-names>
</name>
<name>
<surname><![CDATA[Oviedo]]></surname>
<given-names><![CDATA[J. R.]]></given-names>
</name>
</person-group>
<source><![CDATA[Análisis de la efectividad de las políticas públicas frente al delito de extorsión en Cali durante los años 20162018]]></source>
<year>2020</year>
<publisher-name><![CDATA[Universidad Cooperativa de Colombia]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Canter]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Criminal Shadows]]></source>
<year>1994</year>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Castro]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[La extorsión y su incidencia en el desarrollo económico de Colombia en un escenario de posconflicto]]></source>
<year>2016</year>
<publisher-name><![CDATA[Universidad Militar Nueva Granada]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="book">
<collab>Centro Nacional de Memoria Histórica</collab>
<source><![CDATA[Guerrilla y población civil. Trayectoria de las Farc 1949-2013]]></source>
<year>2014</year>
<publisher-name><![CDATA[Centro Nacional de Memoria Histórica]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dammert]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Construir ciudad en contextos de alta violencia ¿Es posible? El caso del Distrito Central de Honduras]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2018</year>
<volume>60</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>177-93</page-range></nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<collab>Dirección Antisecuestro y Antiextorsión</collab>
<article-title xml:lang=""><![CDATA[El secuestro extorsivo en un escenario de posconflicto en Colombia]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2008</year>
<volume>50</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>89-102</page-range></nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<collab>Dirección Antisecuestro y Antiextorsión</collab>
<source><![CDATA[Reportes y boletines internos]]></source>
<year>2015</year>
<publisher-name><![CDATA[Policía Nacional]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="">
<collab>Fundación Ideas para la Paz</collab>
<source><![CDATA[Disidencias de las Farc: ¿Cuáles son, dónde están, qué hacen?]]></source>
<year>2017</year>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gómez]]></surname>
<given-names><![CDATA[D. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Restrepo]]></surname>
<given-names><![CDATA[C. A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ricaurte]]></surname>
<given-names><![CDATA[G. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Factores Comportamentales y de la Acción Social que Influyen en la Reincidencia Delictiva en el Delito de Extorsión]]></source>
<year>2013</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gray]]></surname>
<given-names><![CDATA[J. M.]]></given-names>
</name>
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Understanding the "War on Terrorism": Responses to 11 September 2001]]></article-title>
<source><![CDATA[Journal of Peace Research]]></source>
<year>2006</year>
<volume>43</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>23-36</page-range></nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jenkins]]></surname>
<given-names><![CDATA[B. M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The new age of terrorism]]></article-title>
<collab>RAND Corporation</collab>
<source><![CDATA[McGraw-Hill Homeland Security Hand-book]]></source>
<year>2006</year>
<page-range>117-30</page-range><publisher-name><![CDATA[McGraw-Hill]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Mantilla]]></surname>
<given-names><![CDATA[L. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[La extorsión carcelaria en Cartagena, más allá que una simple llamada]]></source>
<year>2016</year>
<publisher-name><![CDATA[Universidad Militar Nueva Granada]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<collab>Ministerio de Defensa Nacional</collab>
<source><![CDATA[Política nacional de defensa de la libertad personal 2011-2014.]]></source>
<year>2011</year>
<publisher-name><![CDATA[Ministerio de Defensa]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="book">
<collab>Naciones Unidas</collab>
<source><![CDATA[Manual de lucha contra el secuestro]]></source>
<year>2006</year>
<publisher-name><![CDATA[Naciones Unidas]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Neu]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Accounting for extortion]]></article-title>
<source><![CDATA[Accounting, Organizations and Society]]></source>
<year>2019</year>
<numero>76</numero>
<issue>76</issue>
<page-range>50-63</page-range></nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Norza]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Peñalosa]]></surname>
<given-names><![CDATA[M. J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Microextorsión en Colombia: Caracterizando el delito desde Medellín, Cartagena y Bogotá, 2011-2014]]></article-title>
<source><![CDATA[Revista Criminalidad]]></source>
<year>2016</year>
<volume>58</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>131-57</page-range></nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Páramo]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Roa]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[La estructura conceptual de los miedos urbanos]]></article-title>
<source><![CDATA[Revista Diversitas]]></source>
<year>2015</year>
<volume>11</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>135-46</page-range></nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pérez]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
<name>
<surname><![CDATA[Vélez Salas]]></surname>
<given-names><![CDATA[D. del M.]]></given-names>
</name>
<name>
<surname><![CDATA[Rivas Rodríguez]]></surname>
<given-names><![CDATA[F. J.]]></given-names>
</name>
<name>
<surname><![CDATA[Vélez Salas]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Evolución de la extorsión en México: un análisis estadístico regional (2012-2013).]]></article-title>
<source><![CDATA[Revista Mexicana de Opinión Pública]]></source>
<year>2015</year>
<numero>18</numero>
<issue>18</issue>
<page-range>112-35</page-range></nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Porter]]></surname>
<given-names><![CDATA[L. E.]]></given-names>
</name>
<name>
<surname><![CDATA[Warrender]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[A multivariate model of police deviance: examining the nature of corruption, crime and misconduct]]></article-title>
<source><![CDATA[An International Journal of Research and Policy]]></source>
<year>2009</year>
<volume>19</volume>
<page-range>79-99</page-range></nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="journal">
<collab>Redacción Enfoque</collab>
<article-title xml:lang=""><![CDATA[Inició en Armenia, el Encuentro Estratégico Internacional de Directores Antisecuestro y Antiextorsión]]></article-title>
<source><![CDATA[Enfoque]]></source>
<year>2018</year>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="">
<collab>República de Colombia</collab>
<source><![CDATA[Ley 282 de 1996 (art. 4).]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="">
<collab>República de Colombia</collab>
<source><![CDATA[Ley 599 de 2000 (art. 244)]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="">
<collab>República de Colombia</collab>
<source><![CDATA[Ley 733 de 2002]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B28">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ríos]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Dinámicas de la violencia guerrillera en Colombia]]></article-title>
<source><![CDATA[Revista de Ciencias Sociales]]></source>
<year>2016</year>
<volume>22</volume>
<numero>3</numero>
<issue>3</issue>
<page-range>84-103</page-range></nlm-citation>
</ref>
<ref id="B29">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Robinson]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Páramo]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Juvenile Prostitution and Community Rehabilitation: An Exploratory Analysis of beliefs and Values]]></article-title>
<source><![CDATA[Journal of Community &amp; Applied Social Psychology]]></source>
<year>2007</year>
<volume>17</volume>
<page-range>237-47</page-range></nlm-citation>
</ref>
<ref id="B30">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[M. A.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[Towards a Model of Terrorist Behavior in Hostage Taking Incidents]]></article-title>
<source><![CDATA[Journal of Conflict Resolution]]></source>
<year>2000</year>
<volume>44</volume>
<numero>4</numero>
<issue>4</issue>
<page-range>403-24</page-range></nlm-citation>
</ref>
<ref id="B31">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wilson]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<name>
<surname><![CDATA[Bradford]]></surname>
<given-names><![CDATA[E.]]></given-names>
</name>
<name>
<surname><![CDATA[Lemanski]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<article-title xml:lang=""><![CDATA[The role of group process in terrorism]]></article-title>
<person-group person-group-type="editor">
<name>
<surname><![CDATA[Wood]]></surname>
<given-names><![CDATA[J. L.]]></given-names>
</name>
<name>
<surname><![CDATA[Gannon]]></surname>
<given-names><![CDATA[T. A.]]></given-names>
</name>
</person-group>
<source><![CDATA[Crime and crime reduction: The importance of group process]]></source>
<year>2013</year>
<page-range>99-117</page-range></nlm-citation>
</ref>
</ref-list>
</back>
</article>
