Abstract
A major problem in cybercrime research is that it is simply difficult to study the criminals committing cybercrimes: Criminals try to hide their illegal activities and are usually not disposed to talking openly to researchers, which limits the usefulness of the more traditional social sciences’ research methods. Furthermore, the innovative methods used in cybercrime research come with their own limitations: Although they usually provide big datasets with sometimes hundreds of thousands of data points, they only provide superficial data or, in the case of scraped data, only contain information about one very small step in the crime scrips of cybercriminals. Police investigations, therefore, provide unique knowledge about criminal networks and their members due to the wide use of intrusive investigative methods such as wiretaps and IP taps, observations, undercover policing, and house searches. This chapter describes the pros and cons of using police investigations to shed light on cybercrimes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Andresen, M. A., & Felson, M. (2010). Situational crime prevention and co-offending. Crime Patterns and Analysis,3(1), 3–13.
Best, J., & Luckenbill, D. F. (1994). Organizing deviance (2nd ed.). Prentice Hall.
Bouchard, M., & Morselli, C. (2014). Opportunistic structures of organized crime. In L. Paoli (Ed.), The Oxford handbook of organized crime. Oxford University Press.
Bulanova-Hristova, G., Kasper, K., Odinot, G., Verhoeven, M., Pool, R., de Poot, C., Werner, W., & Korsell, L. (Eds.). (2016). Cyber-OC—Scope and manifestations in selected EU member states. Bundeskriminalamt.
Décary-Hétu, D., & Dupont, B. (2012). The social network of hackers. Global Crime,13(3), 160–175.
Décary-Hétu, D., Morselli, C., & Leman-Langlois, S. (2012). Welcome to the scene: A study of social organization and recognition among Warez hackers. Journal of Research in Crime and Delinquency,49(3), 359–382.
Dupont, B., Côté, A. M., Boutin, J. I., & Fernandez, J. (2017). Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world.” American Behavioral Scientist,61(11), 1219–1243.
Fijnaut, C., Bovenkerk, F., Bruinsma, G., & van de Bunt, H. (1996). Bijlage VII: Eindrapport Onderzoeksgroep Fijnaut. In Parlementaire EnquĂŞtecommissie Opsporingsmethoden (PEO), Inzake opsporing: EnquĂŞte opsporingsmethoden. Sdu Uitgevers.
Fijnaut, C., Bovenkerk, F., Bruinsma, G., & van de Bunt, H. (1998). Organized crime in the Netherlands. Kluwer Law International.
Gadd, D., Karstedt, S., & Messner, S. F. (Eds.). (2012). The SAGE handbook of criminological research methods. https://doi.org/10.4135/9781446268285.
Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of computer hackers. Crimes of the Internet, 336–355.
Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior,35(1), 20–40.
Holt, T. J., & Smirnova, O. (2014). Examining the structure, organization, and processes of the international market for stolen data. U.S. Department of Justice.
Hutchings, A., & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology,55(3), 596–614.
Ianni, F. A. J., & Reuss-Ianni, E. (1972). A family business: Kinship and social control in organized crime. Routledge and Kegan Paul.
Kleemans, E. R. (2007). Organized crime, transit crime, and racketeering. In M. Tonry & C. J. Bijleveld (Eds.), Crime and justice: A review of research 35. The University of Chicago Press.
Kleemans, E. R. (2014). Organized crime research: Challenging assumptions and informing policy. In J. Knutsson & E. Cockbain (Eds.), Applied police research: Challenges and opportunities. Crime Science Series. Willan.
Kleemans, E. R., Brienen, M. E. I., & Van de Bunt, H. G. (2002). Georganiseerde criminaliteit in Nederland: Tweede rapportage op basis van de WODC-monitor. WODC.
Kleemans, E. R., & De Poot, C. J. (2008). Criminal careers in organized crime and social opportunity structure. European Journal of Criminology,5(1), 69–98.
Kleemans, E. R., van den Berg, E. I. A. M., & Van de Bunt, H. G. (1998). Georganiseerde criminaliteit in Nederland: Rapportage op basis van de WODC-monitor. WODC.
Kruisbergen, E. W., Leukfeldt, E. R., Kleemans, E. R., & Roks, R. (2018). Georganiseerde criminaliteit en ICT. Rapportage in het kader van de vijfde ronde van de Monitor Georganiseerde Criminaliteit. WODC.
Kruisbergen, E. W., Leukfeldt, E. R., Kleemans, E. R., & Roks, R. (2019a). Money talks: Money laundering choices of organized crime offenders in a digital age. Journal of Crime and Justice, 42(5), 569–581.
Kruisbergen, E. W., Roks, R. A., & Kleemans, E. R. (2019b). Georganiseerde criminaliteit in Nederland: daders,verwevenheid en opsporing. Rapportage in het kader van de vijfde ronde van de Monitor Georganiseerde Criminaliteit. Boom.
Kruisbergen, E. W., van de Bunt, H. G., & Kleemans, E. R. (2012). Georganiseerde criminaliteit in Nederland. Vierde rapportage op basis van de Monitor Georganiseerde Criminaliteit. Boom.
Leukfeldt, E. R. (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology Behavior and Social Networking, 17(8), 551–555.
Leukfeldt, E. R. (2016). Cybercriminal networks: Origin, growth and criminal capabilities. Eleven International Publishing.
Leukfeldt, E. R. (Ed.). (2017). Research agenda: The human factor in cybercrime and cybersecurity. Eleven International Publishers.
Leukfeldt, E. R., & Holt, T. J. (2019). Examining the social organization practices of cybercriminals in the Netherlands online and offline. International Journal of Offender Therapy and Comparative Criminology,64(5), 522–538.
Leukfeldt, E. R., & Kleemans, E. R. (2019). Cybercrime, money mules and situational crime prevention. In S. Hufnagel & A. Moiseienko (Eds.), Criminal networks and law enforcement: Global perspectives on illicit enterprise. Routledge.
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017a). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. British Journal of Criminology,57(3), 704–722.
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017b). Origin, growth and criminal capabilities of cybercriminal networks: An international empirical analysis. Crime, Law and Social Change,67, 39–53.
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017c). The use of online crime markets by cybercriminal networks: A view from within. American Behavioral Scientist,61(11), 1387–1402.
Leukfeldt, E. R., Lavorgna, A., & Kleemans, E. R. (2017). Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime. European Journal on Criminal Policy and Research,23(3), 287–300.
Leukfeldt, E. R., Kleemans, E. R., Kruisbergen, E. W., & Roks, R. (2019). Criminal networks in a digitized world: On the nexus of borderless opportunities and local embeddedness. Trends in Organized Crime. https://doi.org/10.1007/s12117-019-09366-7.
Leukfeldt, E. R., & Roks, R. (2020). Cybercrimes on the streets of the Netherlands? An exploration of the intersection of cybercrimes and street crimes. Deviant Behavior (online first).
Lusthaus, J. (2018). Industry of anonymity: Inside the business of cybercrime. Harvard University Press.
Lusthaus, J., & Varese, F. (2017). Offline and local: The hidden face of cybercrime. Policing: A Journal of Policy and Practice (online first).
Maimon, D., & Louderback, E. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology,2, 191–216.
Odinot, G., Verhoeven, M. A., Pool, R. L. D., & De Poot, C. J. (2016). Cybercrime, organised crime and organised cybercrime in the Netherlands: Empirical findings and implications for law enforcement. WODC.
PEO. (1996). Parlementaire EnquĂŞtecommissie Opsporingsmethoden. In Inzake opsporing:EnquĂŞte opsporingsmethoden. Sdu Uitgevers.
Reiss, A. J., & Farrington, D. P. (1991). Advancing knowledge about co-offending: Results from a prospective longitudinal survey of London males. Journal of Criminal Law and Criminology,82(2), 360–395.
Shaw, C. R., & McKay, H. D. (1931). Report on the causes of crime: Volume II. Government Printing Office.
Sutherland, E. H. (1937). The professional thief. The University of Chicago Press.
Sutherland, E. H. (1945). Is “white collar crime” crime? American Sociological Review,10, 132–139.
Tappan, P. (1947). Who is the criminal? American Sociological Review,12, 96–102.
Van de Bunt, H. G., & Kleemans, E. R. (2007). Georganiseerde criminaliteit in Nederland. Derde rapportage op basis van de Monitor Georganiseerde Criminaliteit. Reeks Onderzoek en Beleid 252. WODC/Boom Juridische Uitgevers.
Weulen, M. (2018). Cyber-offenders versus traditional offenders: An empirical comparison. VU University.
Yip, M., Shadbolt, N., & Webber, C. (2012). Structural analysis of online criminal social networks. In IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 60–65).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Leukfeldt, E.R., Kleemans, E.R. (2021). Breaking the Walls of Silence: Analyzing Criminal Investigations to Improve Our Understanding of Cybercrime. In: Lavorgna, A., Holt, T.J. (eds) Researching Cybercrimes. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-74837-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-030-74837-1_7
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-030-74836-4
Online ISBN: 978-3-030-74837-1
eBook Packages: Law and CriminologyLaw and Criminology (R0)