Skip to main content

Fighting Cybercrime: A Joint Effort

  • Chapter
  • First Online:
Cyber-Physical Security

Part of the book series: Protecting Critical Infrastructure ((PCIN,volume 3))

Abstract

This chapter describes the fight against cybercrime from a European perspective. Law enforcement agencies always have had an important role when it comes to fighting crime. However, in this digital era, several problems hamper the effectiveness of the police combating crime. Therefore, the first part of this chapter describes the difficulties the police have in fighting cybercrime. The second part of the chapter focuses on one of the strategies to overcome some of these difficulties, namely forming alliances with private institutes. This joint-up approach is mostly realized by public–private partnerships (PPPs), consisting of formalized cooperation between governmental authorities and important stakeholders. Cooperation between governmental and private actors is no sinecure, as will appear from a public administration perspective. Successful cooperation depends on several factors, which will be theoretically described and practically illustrated. Conclusively, the discussion paragraph handles the common dilemma of the extent to which the government should play a leading role in the fight against (cyber) crime.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    This section is based on Leukfeldt et al. (2013a, b) and Veenstra et al. (2014), studies which describe the functioning of law enforcement agencies when handling cybercrimes.

  2. 2.

    Nowadays, CPNI is part of the Dutch National Cyber Security Centre (NCSC).

  3. 3.

    ENISA is an agency of the European Union, serving as expertise center for the European Union Member States and European institutions.

  4. 4.

    ISACs are not typically Dutch, but an international phenomenon.

  5. 5.

    This refers to a consensus model, which reflects the striving for consensus in Dutch politics and society.

Abbreviations

CERT:

Computer and Emergency Response Team

CPNI:

Centre for Protection of the National Infrastructure

DDoS:

Distributed Denial of Service

ECTF:

Electronic Crimes Task Force

ENISA:

European Network and Information Security Agency

GOVCERT:

Government Computer Emergency Response Teams

IP:

Internet Protocol

ISAC:

Information Sharing and Analysis Center

ISP:

Internet Service Provider

NCSC:

National Cyber Security Centre

NPM:

New Public Management

NSP:

National Skimming Point

PPP:

Public–Private Partnership

SME:

Small and Medium-sized Enterprise

References

  • Bekkers, V., van Sluis, A., & Siep, P. (2006). De nodale oriëntatie van de Nederlandse Politie: Over criminaliteitsbestrijding in de netwerksamenleving: Bouwstenen voor een beleidstheorie. [The nodal orientation of the Dutch police: About crime fighting in the network society]. Rotterdam: Erasmus Universiteit Rotterdam.

    Google Scholar 

  • Boonstra, J. J. (2007). Ondernemen in allianties en netwerken: Een multidisciplinair perspectief. [Undertaking in alliances and networks. A multidisciplinary approach]. M&O, 3/4, 5–25.

    Google Scholar 

  • Bossler, A. M., & Holt, T. J. (2012). Patrol officers’ perceived role in responding to cybercrime. Policing: An International Journal of Police Strategies & Management, 35(1), 165–181.

    Article  Google Scholar 

  • Boutellier, H. (2005). Meer dan veilig. Over bestuur, bescherming en burgerschap. [More than safe. About governance, protection and citizenship]. Den Haag: Boom Juridische Uitgevers.

    Google Scholar 

  • Brinkerhoff, D. W., & Brinkerhoff, J. M. (2011). Public-private partnerships: Perspectives on purposes, publicness, and good governance. Public Administration and Development, 31, 2–14.

    Article  Google Scholar 

  • Capeller, W. (2001). Not such a neat net: Some comments on virtual criminality. Social and Legal Studies, 10, 229–242.

    Google Scholar 

  • Clark, K., Stikvoort, D., Stofbergen, E., & van den Heuvel, E. (2014). A Dutch approach to cybersecurity through participation. IEEE Security and Privacy, 12, 27–34.

    Article  Google Scholar 

  • Décary-Hetú, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13(3), 160–175.

    Article  Google Scholar 

  • Domenie, M. M. L., Leukfeldt, E. R., van Wilsem, J., Jansen, J., & Stol W. P. (2013). Slachtofferschap van delicten met een digitale component onder burgers. Hacken, malware, persoonlijke en financiële delicten in kaart gebracht. [Victimization of crimes with a digital component: a report on hacking, malware, personal and financial crimes]. De Bilt/Leeuwarden: PAC/NHL Hogeschool.

    Google Scholar 

  • Dunn Cavelty, M., & Suter, M. (2009). Public-private partnerships are no silver bullet: An expanded governance model for critical infrastructure protection. International Journal of Critical Infrastructure Protection,. doi:10.1016/j.ijcip.2009.08.006.

    Google Scholar 

  • ENISA (2011). Cooperative models for effective public private partnerships. Good practice guide. Retrieved May 29, 2015 from https://www.enisa.europa.eu/activities/Resilience-and-CIIP/public-private-partnership/national-public-private-partnerships-ppps/good-practice-guide-on-cooperatve-models-for-effective-ppps.

  • Garland, D. (2001). The culture of control: Crime and social order in contemporary society. Chicago: The University Press of Chicago.

    Google Scholar 

  • Gogolin, G., & Jones, J. (2010). Law enforcement’s ability to deal with digital crime and the implications for business. Information Security Journal: A Global Perspective, 19(3), 109–117.

    Google Scholar 

  • Grabosky, P. N. (2000). Computer crime: A criminological overview. Prepared for presentation at the Workshop on Crimes Related to the Computer Network, Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders, Vienna, 15 April 2000. Retrieved August 7, 2012 from https://www.ncjrs.gov/App/publications/Abstract.aspx?id=209342.

  • Grabosky, P. N. (2001). Virtual criminality: Old wine in new bottles? Social and Legal Studies, 10, 251–256.

    Google Scholar 

  • Hagenaars, P. M. M., & Bonnes, J. M. (2014). De kracht van privaat-publieke samenwerking [The power of private-public cooperation]. Den Haag: Boom Juridische Uitgevers.

    Google Scholar 

  • Heldeweg, M., & Sanders, M. (2011). Botsende waarden bij publiek-private samenwerking. Dimensies en dilemma’s van juridisch-bestuurskundige legitimiteit, in het bijzonder bij openbaar gezag [Clashing values in public-private partnerships. Dimensions and dilemmas of judical-governmental legitimacy, especially in public authority]. Bestuurskunde, 2, 33–43.

    Google Scholar 

  • Hodge, G., & Greve, C. (2005). Introduction. In G. Hodge & C. Greve (Eds.). The challenge of public-private partnerships. Learning from international experience (pp. 1–21). Cheltenham: Edward Elgar Publishing Limited.

    Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2012). Police perceptions of computer crimes in two south-eastern cities: An examination from the viewpoint of patrol officers. American Journal of Criminal Justice, 37(3), 396–412.

    Article  Google Scholar 

  • Holt, J. T., & Lampke, E. (2009). Exploring stolen data markets online: Products and market forces. Criminal Justice Studies, 23(1), 33–50.

    Article  Google Scholar 

  • Hoogenboom, A. B., & Muller, E. R. (2002). Voorbij de dogmatiek. Publiek-private samenwerking in de veiligheidszorg. [Past dogmatic. Public-private cooperation in safety assurance]. Apeldoorn: Politie & Wetenschap.

    Google Scholar 

  • Hudson, B., Hardy, Henwood, M., & Wistow, G. (1999). In pursuit of inter-agency collaboration in the public sector. Public Management: An International Journal of Research and Theory, 1(2), 235–260.

    Google Scholar 

  • Hunton, P. (2011). The stages of cybercrime investigations: Bridging the gap between technology examination and law enforcement investigation. Computer Law & Security Review, 27(1), 61–67.

    Article  Google Scholar 

  • Jewkes, Y., & Leukfeldt, E. R. (2012). Policing cybercrime. In E. R. Leukfeldt & W. P. Stol (Eds.), Cyber safety: An introduction (pp. 253–266). The Hague: Eleven International Publishers.

    Google Scholar 

  • Jewkes, Y., & Yar, M. (2008). Policing cybercrime in the twenty-first century. In T. Newburn (Ed.), Handbook of policing (pp. 280–607). Cullompton, UK: William.

    Google Scholar 

  • Klijn, E. H., Edelenbos, J., Kort, M., & van Twist, M. (2008). Facing management choices. An analysis of managerial choices in 18 complex environmental public private partnership projects. International Review of Administrative Science, 74(2), 251–278.

    Article  Google Scholar 

  • Klijn, E. H., & van Twist, M. (2007). Publiek-private samenwerking in Nederland. Overzicht van theorie en praktijk. [Public-private partnerships in the Netherlands. Overview of theory and practice]. In J. J. Boonstra, (Ed.). Ondernemen in allianties en netwerken. Een multidisciplinair perspectief (pp. 156–170). Deventer: Kluwer.

    Google Scholar 

  • Koops, E. J. (2010). The internet and its opportunities for cybercrime. In M. Herzog-Evans (Ed.), Transnational criminology manual (pp. 735–754). Nijmegen: Wolf Legal Publishers.

    Google Scholar 

  • Leukfeldt, E. R., Domenie, M., & Stol, W.P. (2010). Verkenning cybercrime in Nederland 2009. [Cybercrime in the Netherlands]. Den Haag: Boom Juridische Uitgevers.

    Google Scholar 

  • Leukfeldt, E. R., Veenstra, S., Domenie, M., & Stol, W. P. (2013a). De strafrechtketen in een gedigitaliseerde samenleving. Een onderzoek naar de strafrechtelijke afhandeling van cybercrime. [Criminal justice in a digitized society. A study into the criminal prosecution of cybercrimes]. De Bilt/Leeuwarden: PAC/NHL.

    Google Scholar 

  • Leukfeldt, E. R., Veenstra, S., & Stol, W. P. (2013b). High volume cyber crime and the organization of the police. The results of two empirical studies in the Netherlands. International Journal of Cyber Criminology, 7(1), 1–17.

    Google Scholar 

  • Loader, I., & Walker, N. (2007). Civilizing security. Cambridge University Press.

    Google Scholar 

  • Lodder, A. R., & Toet, J. (2013). Cybersecurity: Europese Unie initiatieven voor een intrinsiek grensoverschrijdend fenomeen. [Cybersecurity: European Union initiatives for an intrinsic boarder-crossing phenomenon]. Tijdschrift voor internetrecht, 5/6, 135–140.

    Google Scholar 

  • Lu, Y., Luo, X., Polgar, M., & Cao, Y. (2010). Social network analysis of a criminal hacker community. Journal of Computer Information Systems, 51(2), 31–41.

    Google Scholar 

  • NCSC (2014). Cybersecuritybeeld Nederland. CSBN-4. Den Haag: Ministerie van Veiligheid en Justitie.

    Google Scholar 

  • NCSC (s.d.). ISACs. Retrieved April 23, 2015 from https://www.ncsc.nl/organisatie/publiek-private-samenwerking/isacs.html.

  • Onderzoeksraad voor Veiligheid (2012). Het Diginotarincident. Waarom digitale veiligheid de bestuurstafel te weinig bereikt [The Digitnotar incident. Why digital safety does reach the management table too little]. Retrieved April 23, 2015 from http://www.onderzoeksraad.nl/uploads/items-docs/1094/Rapport_Diginotar_NL_web_def_20062012.pdf.

  • Osborne, D., & Gaebler, T. (1992). Reinventing government. How the entrepreneurial spirit is transforming the public sector. Boston: Addison-Wesly.

    Google Scholar 

  • Peretti, K. K. (2008). Data breaches: What the underground world of “carding” reveals. Santa Clara Computer and High Technology Law Journal, 25, 345–414.

    Google Scholar 

  • Rittel, H. W. J., & Webber, M. M. (1973). Dilemmas in a general theory of planning. Policy Sciences, 4, 155–169.

    Article  Google Scholar 

  • Schuilenburg, M. (2012). Orde in veiligheid. Een dynamisch perspectief. [Orderliness in safety. A dynamic perspective]. Den Haag: Boom Lemma Uitgevers.

    Google Scholar 

  • Shearing, C., & Wood, J. (2003). Nodal governance, democracy, and the new ‘denizens’. Journal of Law and Society, 30(3), 400–419.

    Article  Google Scholar 

  • Smit, M. (2010). Publiek belang: hoe houd je het op de rails. Een studie naar de effectiviteit van planvorming voor stationslocaties. [Public interest: how to keep it on track. A study into the effectiveness of planning of railway-station locations]. Enschedé: Gildeprint.

    Google Scholar 

  • Soudijn, M. R. J., & Monsma, E. (2012). Virtuele ontmoetingsruimten voor cybercriminelen. [Virtual meeting places for cyber criminals]. Tijdschrift voor Criminologie, 54(4), 349–360.

    Google Scholar 

  • Soudijn, M. R. J., & Zegers, B. C. H. T. (2012). Cybercrime and virtual offender convergence settings. Trends in Organized Crime, 15, 111–129.

    Article  Google Scholar 

  • Stenning, P. (2009). Governance and accountability in a plural policing environment. The story so far. Policing, 3(1), 22–33.

    Article  Google Scholar 

  • Stol, W. P., Kaspersen, H. W. K., Kerstens, J., Leukfeldt, E. R., & Lodder, A. R. (2008). Filteren van kinderporno op internet. Een verkenning van technieken en reguleringen in binnen- en buitenland. [Filtering of child pornography on the internet. Technologies and laws in the Netherlands and abroad]. Den Haag: Boom Juridische Uitgevers.

    Google Scholar 

  • Stol, W. P., Kaspersen, H. W. K., Kerstens, J., Leukfeldt, E. R., & Lodder, A. R. (2009). Governmental filtering of websites: the Dutch case. Computer Law & Security Review, 25(3), 251–262.

    Google Scholar 

  • Stol, W. P., Leukfeldt, E. R., & Klap, H. (2013). Policing a digitized society. The state of affairs in the Netherlands in 2013. In W.P. Stol & J. Jansen (Eds.), Cybercrime and the Police (pp. 61–74). Eleven International Publishing: The Hague.

    Google Scholar 

  • Struiksma, N., de Vey Mestdagh, C. N. J., & Winter, H. B. (2012). De organisatie van de opsporing van cybercrime door de Nederlandse politie. [The organization of policing cybercrime in the Netherlands] Apeldoorn: Politie & Wetenschap.

    Google Scholar 

  • Terpstra, J. (2011). Regulering in een hybride veiligheidszorg. Over de bewaking van een publiek goed in een deels geprivatiseerd bestel [Regulation in hybrid safety assurance]. Tijdschrift voor Veiligheid, 10(4), 41–58.

    Google Scholar 

  • Terpstra, J., & Kouwenhoven, R. (2004). Samenwerking en netwerken in de lokale veiligheidszorg. [Cooperation and networks in local safety assurance]. Kerckebosch: Zeist.

    Google Scholar 

  • Toutenhoofd-Visser, M. H., Veenstra, S. Domenie, M. M. L., Leukfeldt, E. R., & Stol, W.P. (2009). Politie en cybercrime. Intake en eerste opvolging. Een onderzoek naar de intake van het werkaanbod cybercrime door de politie. [Police and cybercrime. A study on the registration process with regard to cybercrime reports within the Dutch police]. Leeuwarden: NHL Hogeschool.

    Google Scholar 

  • Van Delden, P. (2009). Samenwerking in de publieke dienstverlening. Ontwikkelingsverloop en resultaten. [Cooperation in public services. Development and outcomes]. Delft: Eburon.

    Google Scholar 

  •  Van den Heuvel, E., & Baltink, G. K. (2014). Coordination and cooperation in cyber network defense: the Dutch efforts to prevent and respond. In M. Hathaway (Ed.) Computer Network Defense: Incident Detection and Response (pp. 118–129). NATO Science for Peace and Security Series.

    Google Scholar 

  • Van der Hulst, R. C. & Neve, R. J. M. (2008). High-tech crime: Inventarisatie van literatuur over soorten criminaliteit en hun daders. [High tech crime. Literature review of cybercrimes and their offenders]. Den Haag: WODC.

    Google Scholar 

  • Van Montfort, C. J. (2008). Besturen van het onbekende. Goed bestuur bij publiek-private arrangementen. [Governing the unknown. Good governance in public-private arrangements]. Den Haag: Boom Lemma Uitgevers.

    Google Scholar 

  • Van Montfort, C., van den Brink, G., Schulz, M., & Maalsté, N. (2012). Publiek-private samenwerking in maatschappelijke veiligheid. [Public-private partnerships in social safety]. Den Haag: WODC.

    Google Scholar 

  • Van Steden, R. (2011). Sturing van lokale veiligheid: een achtergrondstudie. [Governance of local safety: a background study]. In R. van Steden (Ed.). Strategieën van lokale veiligheid. Een achtergrondstudie en drie reflecties [Strategies of local safety. A background study and three reflections] (pp. 9–51). Amsterdam: Amsterdam University Press.

    Google Scholar 

  • Veenstra, S., Zuurveen, R., Jansen, J., Kloppenburg, S., & Stol, W. P. (2014). MKB en cybercrime. Slachtofferschap onder het Nederlandse Midden- en Kleinbedrijf in een gedigitaliseerde samenleving. [SMEs and cybercrime. Victimization of the Dutch Small and Medium-sized Enterprises in a digitized society]. Leeuwarden/Apeldoorn/Heerlen: NHL Hogeschool/Politieacademie/Open Universiteit.

    Google Scholar 

  • Visser, R. A., van Gemerden, E., More, P. A., & de Roon, R. J. C. (2008). Sturing en samenwerking in handhavingsprojecten. [Governance and cooperation in enforcement projects]. Leiden: Leiden University Press.

    Book  Google Scholar 

  • Wall, D. S. (1997). Policing the virtual community: The internet, cyber crimes and the policing of cyberspace. In P. Francis, P. Davies & V. Jupp (Eds.) Policing futures, the police, law enforcement and the twenty-first century (pp. 208–236). London: Macmillan.

    Google Scholar 

  • Wall, D. S. (2007/10). Policing cybercrimes: Situating the public police in networks of security within cyberspace (Revised May 2010). Police Practice & Research: An International Journal, 8(2), 183–205.

    Google Scholar 

  • Yar, M. (2011). From the ‘governance of security’ to ‘governance failure’: refining the criminological agenda. Internet Journal of Criminology. Retrieved April 23, 2015 from http://www.academia.edu/2803630/from_the_governance_of_security_to_governance_failure_refining_the_criminological_agenda.

  • Yip, M., Shadbolt, N., & Webber, C. (2012). Structural analysis of online criminal social networks. ISI 2012. June 11–14, 2012, Washington.

    Google Scholar 

  • Zhang, L., Young, R., & Prybutok, V. (2007). Inhibitors of two illegal behaviors: Hacking and shoplifting. Journal of Organizational and End User Computing, 19(3), 24–42.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to S. Boes .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Boes, S., Leukfeldt, E.R. (2017). Fighting Cybercrime: A Joint Effort. In: Clark, R., Hakim, S. (eds) Cyber-Physical Security. Protecting Critical Infrastructure, vol 3. Springer, Cham. https://doi.org/10.1007/978-3-319-32824-9_9

Download citation

Publish with us

Policies and ethics