Skip to main content

Breaking the Walls of Silence: Analyzing Criminal Investigations to Improve Our Understanding of Cybercrime

  • Chapter
  • First Online:
Researching Cybercrimes

Abstract

A major problem in cybercrime research is that it is simply difficult to study the criminals committing cybercrimes: Criminals try to hide their illegal activities and are usually not disposed to talking openly to researchers, which limits the usefulness of the more traditional social sciences’ research methods. Furthermore, the innovative methods used in cybercrime research come with their own limitations: Although they usually provide big datasets with sometimes hundreds of thousands of data points, they only provide superficial data or, in the case of scraped data, only contain information about one very small step in the crime scrips of cybercriminals. Police investigations, therefore, provide unique knowledge about criminal networks and their members due to the wide use of intrusive investigative methods such as wiretaps and IP taps, observations, undercover policing, and house searches. This chapter describes the pros and cons of using police investigations to shed light on cybercrimes.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Andresen, M. A., & Felson, M. (2010). Situational crime prevention and co-offending. Crime Patterns and Analysis,3(1), 3–13.

    Google Scholar 

  • Best, J., & Luckenbill, D. F. (1994). Organizing deviance (2nd ed.). Prentice Hall.

    Google Scholar 

  • Bouchard, M., & Morselli, C. (2014). Opportunistic structures of organized crime. In L. Paoli (Ed.), The Oxford handbook of organized crime. Oxford University Press.

    Google Scholar 

  • Bulanova-Hristova, G., Kasper, K., Odinot, G., Verhoeven, M., Pool, R., de Poot, C., Werner, W., & Korsell, L. (Eds.). (2016). Cyber-OC—Scope and manifestations in selected EU member states. Bundeskriminalamt.

    Google Scholar 

  • DĂ©cary-HĂ©tu, D., & Dupont, B. (2012). The social network of hackers. Global Crime,13(3), 160–175.

    Article  Google Scholar 

  • DĂ©cary-HĂ©tu, D., Morselli, C., & Leman-Langlois, S. (2012). Welcome to the scene: A study of social organization and recognition among Warez hackers. Journal of Research in Crime and Delinquency,49(3), 359–382.

    Article  Google Scholar 

  • Dupont, B., CĂ´tĂ©, A. M., Boutin, J. I., & Fernandez, J. (2017). Darkode: Recruitment patterns and transactional features of “the most dangerous cybercrime forum in the world.” American Behavioral Scientist,61(11), 1219–1243.

    Article  Google Scholar 

  • Fijnaut, C., Bovenkerk, F., Bruinsma, G., & van de Bunt, H. (1996). Bijlage VII: Eindrapport Onderzoeksgroep Fijnaut. In Parlementaire EnquĂŞtecommissie Opsporingsmethoden (PEO), Inzake opsporing: EnquĂŞte opsporingsmethoden. Sdu Uitgevers.

    Google Scholar 

  • Fijnaut, C., Bovenkerk, F., Bruinsma, G., & van de Bunt, H. (1998). Organized crime in the Netherlands. Kluwer Law International.

    Google Scholar 

  • Gadd, D., Karstedt, S., & Messner, S. F. (Eds.). (2012). The SAGE handbook of criminological research methods. https://doi.org/10.4135/9781446268285.

  • Holt, T. J. (2009). Lone hacks or group cracks: Examining the social organization of computer hackers. Crimes of the Internet, 336–355.

    Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior,35(1), 20–40.

    Article  Google Scholar 

  • Holt, T. J., & Smirnova, O. (2014). Examining the structure, organization, and processes of the international market for stolen data. U.S. Department of Justice.

    Google Scholar 

  • Hutchings, A., & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology,55(3), 596–614.

    Article  Google Scholar 

  • Ianni, F. A. J., & Reuss-Ianni, E. (1972). A family business: Kinship and social control in organized crime. Routledge and Kegan Paul.

    Google Scholar 

  • Kleemans, E. R. (2007). Organized crime, transit crime, and racketeering. In M. Tonry & C. J. Bijleveld (Eds.), Crime and justice: A review of research 35. The University of Chicago Press.

    Google Scholar 

  • Kleemans, E. R. (2014). Organized crime research: Challenging assumptions and informing policy. In J. Knutsson & E. Cockbain (Eds.), Applied police research: Challenges and opportunities. Crime Science Series. Willan.

    Google Scholar 

  • Kleemans, E. R., Brienen, M. E. I., & Van de Bunt, H. G. (2002). Georganiseerde criminaliteit in Nederland: Tweede rapportage op basis van de WODC-monitor. WODC.

    Google Scholar 

  • Kleemans, E. R., & De Poot, C. J. (2008). Criminal careers in organized crime and social opportunity structure. European Journal of Criminology,5(1), 69–98.

    Article  Google Scholar 

  • Kleemans, E. R., van den Berg, E. I. A. M., & Van de Bunt, H. G. (1998). Georganiseerde criminaliteit in Nederland: Rapportage op basis van de WODC-monitor. WODC.

    Google Scholar 

  • Kruisbergen, E. W., Leukfeldt, E. R., Kleemans, E. R., & Roks, R. (2018). Georganiseerde criminaliteit en ICT. Rapportage in het kader van de vijfde ronde van de Monitor Georganiseerde Criminaliteit. WODC.

    Google Scholar 

  • Kruisbergen, E. W., Leukfeldt, E. R., Kleemans, E. R., & Roks, R. (2019a). Money talks: Money laundering choices of organized crime offenders in a digital age. Journal of Crime and Justice, 42(5), 569–581.

    Google Scholar 

  • Kruisbergen, E. W., Roks, R. A., & Kleemans, E. R. (2019b). Georganiseerde criminaliteit in Nederland: daders,verwevenheid en opsporing. Rapportage in het kader van de vijfde ronde van de Monitor Georganiseerde Criminaliteit. Boom.

    Google Scholar 

  • Kruisbergen, E. W., van de Bunt, H. G., & Kleemans, E. R. (2012). Georganiseerde criminaliteit in Nederland. Vierde rapportage op basis van de Monitor Georganiseerde Criminaliteit. Boom.

    Google Scholar 

  • Leukfeldt, E. R. (2014). Phishing for suitable targets in the Netherlands: Routine activity theory and phishing victimization. Cyberpsychology Behavior and Social Networking, 17(8), 551–555.

    Google Scholar 

  • Leukfeldt, E. R. (2016). Cybercriminal networks: Origin, growth and criminal capabilities. Eleven International Publishing.

    Google Scholar 

  • Leukfeldt, E. R. (Ed.). (2017). Research agenda: The human factor in cybercrime and cybersecurity. Eleven International Publishers.

    Google Scholar 

  • Leukfeldt, E. R., & Holt, T. J. (2019). Examining the social organization practices of cybercriminals in the Netherlands online and offline. International Journal of Offender Therapy and Comparative Criminology,64(5), 522–538.

    Article  Google Scholar 

  • Leukfeldt, E. R., & Kleemans, E. R. (2019). Cybercrime, money mules and situational crime prevention. In S. Hufnagel & A. Moiseienko (Eds.), Criminal networks and law enforcement: Global perspectives on illicit enterprise. Routledge.

    Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017a). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. British Journal of Criminology,57(3), 704–722.

    Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017b). Origin, growth and criminal capabilities of cybercriminal networks: An international empirical analysis. Crime, Law and Social Change,67, 39–53.

    Article  Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017c). The use of online crime markets by cybercriminal networks: A view from within. American Behavioral Scientist,61(11), 1387–1402.

    Article  Google Scholar 

  • Leukfeldt, E. R., Lavorgna, A., & Kleemans, E. R. (2017). Organised cybercrime or cybercrime that is organised? An assessment of the conceptualisation of financial cybercrime as organised crime. European Journal on Criminal Policy and Research,23(3), 287–300.

    Article  Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., Kruisbergen, E. W., & Roks, R. (2019). Criminal networks in a digitized world: On the nexus of borderless opportunities and local embeddedness. Trends in Organized Crime. https://doi.org/10.1007/s12117-019-09366-7.

  • Leukfeldt, E. R., & Roks, R. (2020). Cybercrimes on the streets of the Netherlands? An exploration of the intersection of cybercrimes and street crimes. Deviant Behavior (online first).

    Google Scholar 

  • Lusthaus, J. (2018). Industry of anonymity: Inside the business of cybercrime. Harvard University Press.

    Book  Google Scholar 

  • Lusthaus, J., & Varese, F. (2017). Offline and local: The hidden face of cybercrime. Policing: A Journal of Policy and Practice (online first).

    Google Scholar 

  • Maimon, D., & Louderback, E. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology,2, 191–216.

    Article  Google Scholar 

  • Odinot, G., Verhoeven, M. A., Pool, R. L. D., & De Poot, C. J. (2016). Cybercrime, organised crime and organised cybercrime in the Netherlands: Empirical findings and implications for law enforcement. WODC.

    Google Scholar 

  • PEO. (1996). Parlementaire EnquĂŞtecommissie Opsporingsmethoden. In Inzake opsporing:EnquĂŞte opsporingsmethoden. Sdu Uitgevers.

    Google Scholar 

  • Reiss, A. J., & Farrington, D. P. (1991). Advancing knowledge about co-offending: Results from a prospective longitudinal survey of London males. Journal of Criminal Law and Criminology,82(2), 360–395.

    Article  Google Scholar 

  • Shaw, C. R., & McKay, H. D. (1931). Report on the causes of crime: Volume II. Government Printing Office.

    Google Scholar 

  • Sutherland, E. H. (1937). The professional thief. The University of Chicago Press.

    Google Scholar 

  • Sutherland, E. H. (1945). Is “white collar crime” crime? American Sociological Review,10, 132–139.

    Article  Google Scholar 

  • Tappan, P. (1947). Who is the criminal? American Sociological Review,12, 96–102.

    Article  Google Scholar 

  • Van de Bunt, H. G., & Kleemans, E. R. (2007). Georganiseerde criminaliteit in Nederland. Derde rapportage op basis van de Monitor Georganiseerde Criminaliteit. Reeks Onderzoek en Beleid 252. WODC/Boom Juridische Uitgevers.

    Google Scholar 

  • Weulen, M. (2018). Cyber-offenders versus traditional offenders: An empirical comparison. VU University.

    Google Scholar 

  • Yip, M., Shadbolt, N., & Webber, C. (2012). Structural analysis of online criminal social networks. In IEEE International Conference on Intelligence and Security Informatics (ISI) (pp. 60–65).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Rutger Leukfeldt .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Leukfeldt, E.R., Kleemans, E.R. (2021). Breaking the Walls of Silence: Analyzing Criminal Investigations to Improve Our Understanding of Cybercrime. In: Lavorgna, A., Holt, T.J. (eds) Researching Cybercrimes. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-030-74837-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-74837-1_7

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-030-74836-4

  • Online ISBN: 978-3-030-74837-1

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics