Skip to main content
Log in

Criminals seeking ICT-expertise: an exploratory study of Dutch cases

  • Published:
European Journal on Criminal Policy and Research Aims and scope Submit manuscript

Abstract

Which opportunities due to digitization are exploited by criminals? And how do criminals gather the required ICT-expertise to take advantage of these opportunities? This exploratory study provides insight into criminals seeking ICT-expertise by analyzing five Dutch cases. This paper shows that criminals seeking ICT-expertise take advantage of companies and employees in the ICT-sector that act in a gray area. It is noteworthy that the initial contact of criminals seeking ICT-expertise is often immediately directed to criminal collaboration. In these cases, ‘capacity’ is more important than ‘contact’. Furthermore, this paper discusses the role of forums for criminals seeking ICT-expertise. Criminals take advantage of the transfer of knowledge on forums and the existence of crimeware-as-a-service. Finally, this study falsifies the statement that there is a clear division between traditional offender groups taking advantage of the possibilities arising from ICT, and crime groups operating exclusively online. In practice, there are many connections between online and offline activities.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  • Ablon, L., Libicki, M. C., & Golay, A. A. (2014). Markets for Cybercrime Tools and Stolen Data. Hackers’ bazaar. Santa Monica, CA: RAND Corporation.

    Google Scholar 

  • Bernaards, F., Monsma, E., & Zinn, P. (2012). High tech crime Criminaliteitsbeeldanalyse 2012 high tech crime. In Crime threat analysis. Driebergen: KLPD, DNRI.

    Google Scholar 

  • Brenner, S. W. (2001). Is there such a thing as 'Virtual Crime'? California Criminal Law Review, 4(1), 1–72.

    Google Scholar 

  • Bruinsma, G., & Bernasco, W. (2002). Dadergroepen en transnationale illegale markten. Tijdschrift voor Criminologie, 44(2), 128–140.

    Google Scholar 

  • Choo, K. K. R. (2008). Organised crime groups in cyberspace: A typology. Trends in Organized Crime, 11(3), 270–295.

    Article  Google Scholar 

  • Clarke, R. V. (1997). Situational Crime Prevention: Successful Case Studies. New York: Criminal Justice Press.

    Google Scholar 

  • Clarke, R., & Felson, M. (1993). Routine activity and rational choice. London: Transaction Press.

    Google Scholar 

  • Décary-Hetú, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13(3), 160–175.

    Article  Google Scholar 

  • Dupont, B., Côté, A., Savine, C., & Décary-Hétu, D. (2016). The ecology of trust among hackers. Global Crime, 17(2), 129–151.

    Article  Google Scholar 

  • Europol. (2014). Internet facilitated organized crime (IOCTA). The Hague: European Police Office.

    Google Scholar 

  • Europol. (2016). Internet facilitated organized crime (IOCTA). The Hague: European Police Office.

    Google Scholar 

  • Felson, M. (2003). The process of co-offending. In M. J. Smith & D. B. Cornish (Eds.), Theory for practice in situational crime prevention (volume 16) (pp. 149–168). Devon: Willan.

  • Felson, M. (2006). Crime and nature. Thousand Oaks: Sage.

    Google Scholar 

  • George, A. L., & Bennett, A. (2005). Case studies and theory development in the social sciences. London: MIT Press.

    Google Scholar 

  • Glaser, B. G., & Strauss, A. L. (1967). The discovery of grounded theory: Strategies for qualitative research. Chicago: Aldine.

    Google Scholar 

  • Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360–1380.

    Article  Google Scholar 

  • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28(2), 171–198.

    Article  Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.

    Article  Google Scholar 

  • Holt, T. J., & Lampke, E. (2009). Exploring stolen data markets online: Products and market forces. Criminal Justice Studies, 23(1), 33–50.

    Article  Google Scholar 

  • Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 378–395.

    Article  Google Scholar 

  • Holt, T. J., Smirnova, O., Chua, Y. T., & Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets. Global Crime, 16(2), 81–103.

    Article  Google Scholar 

  • Hutchings, A. (2014). Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission. Crime, Law and Social Change 62(1), 1–20.

  • Hutchings, A., & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596–614.

  • Kenney, M. (2007). From Pablo to Osama: Trafficking and terrorist networks, government bureaucracies, and competitive adaptation. University Park: Penn State Press.

    Google Scholar 

  • Kleemans, E. R. (2014). Organized crime research: Challenging assumptions and informing policy. In J. Knutsson & E. Cockbain (Eds.), Applied police research: Challenges and opportunities, Crime science series (pp. 57–67). Cullompton: Willan.

    Google Scholar 

  • Kleemans, E. R., & De Poot, C. J. (2008). Criminal careers in organized crime and social opportunity structure. European Journal of Criminology, 5(1), 69–98.

    Article  Google Scholar 

  • Kleemans, E. R., & Van de Bunt, H. G. (1999). The social embeddedness of organized crime. Transnational Organized Crime, 5(2), 19–36.

    Google Scholar 

  • Kruisbergen, E. W., Van de Bunt, H. G., & Kleemans, E. R. (2012). Georganiseerde criminaliteit in Nederland. Vierde rapportage op basis van de monitor Georganiseerde Criminaliteit [organized crime in the Netherlands. Fourth report of the organized crime monitor]. Den Haag: Boom Lemma.

    Google Scholar 

  • Lavorgna, A. (2015a). Organised crime goes online: realities and challenges. Journal of Money Laundering Control, 18(2), 153–168.

    Article  Google Scholar 

  • Lavorgna, A. (2015b). The online trade in counterfeit pharmaceuticals: New criminal opportunities, trends and challenges. European Journal of Criminology, 12(2), 226–241.

    Article  Google Scholar 

  • Lavorgna, A., & Sergi, A. (2014). Types of organized crime in Italy. The multifaceted spectrum of Italian criminal associations and their different attitudes in the financial crisis and in the use of internet technologies. International Journal of Law, Crime and Justice, 42(1), 16–32.

    Article  Google Scholar 

  • Leukfeldt, E. R. (2014). Cybercrime and social ties. Phishing in Amsterdam. Trends in Organized Crime, 17(4), 231–249.

    Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017a). Cybercriminal networks, social ties and online forums. Social ties versus digital ties within phishing and malware networks. British Journal of Criminology, 57(3), 704–722.

    Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017b). A typology of cybercriminal networks: From low-tech all-rounders to high-tech specialists. Crime, Law and Social Change, 67(1), 21–37.

    Article  Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017c). Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis. Crime, Law and Social Change, 67(1), 39–53.

    Article  Google Scholar 

  • Longe, O., Ngwa, O., Wada, F., Mbarika, V., & Kvasny, L. (2009). Criminal uses of information & communication technologies in sub-Saharan Africa: Trends, concerns and perspectives. Journal of Information Technology Impact, 9(3), 155–172.

    Google Scholar 

  • Lu, Y., Luo, X., Polgar, M., & Cao, Y. (2010). Social network analysis of a criminal hacker community. Journal of Computer Information Systems, 51(2), 31–41.

    Google Scholar 

  • Lusthaus, J. (2012). Trust in the world of cybercrime. Global Crime, 13(2), 71–94.

    Article  Google Scholar 

  • Martin, J. (2014). Lost on the silk road: Online drug distribution and the ‘cryptomarket’. Criminology and Criminal Justice, 14(3), 351–367.

    Article  Google Scholar 

  • McGuire, M., & Dowling, S. (2013). Chapter 1: Cyber-dependent crimes. Cyber crime: A review of the evidence (Home Office Research Report 75 ed., pp. 4-34).

  • Odinot, G., Verhoeven, M. A., Pool, R. L. D., & De Poot, C. J. (2016). Cybercrime, organised crime and organised cybercrime in the Netherlands: Empirical findings and implications for law enforcement. The Hague: WODC.

    Google Scholar 

  • Reuter, P. (1983). Disorganized crime: The economics of the visible hand. Cambridge, MA: MIT Press.

  • Sood, A., & Enbody, R. (2013). Crime-ware-as-a-service: A survey of commoditized crimeware in the underground market. International Journal of Critical Infrastructure Protection, 6(1), 23–38.

    Article  Google Scholar 

  • Soudijn, M., & Monsma, E. (2012). Virtuele ontmoetingsruimtes voor cybercriminelen. Tijdschrift voor Criminologie, 54(4), 349–360.

    Google Scholar 

  • Soudijn, M. R. J., & Zegers, B. C. H. T. (2012). Cybercrime and virtual offender convergence settings. Trends in Organized Crime, 15(2), 111–129.

    Article  Google Scholar 

  • van de Bunt, H. G., & Kleemans, E. R. (2007). Georganiseerde criminaliteit in Nederland: Derde rapportage op basis van de Monitor Georganiseerde Criminaliteit organized crime in the Netherlands. In Third report based on the organized crime monitor. Den Haag: WODC.

    Google Scholar 

  • Wall, D. (2007). Cybercrime: The transformation of crime in the information age. Cambridge: Polity.

    Google Scholar 

  • Williams, P. (2001). Organized crime and cybercrime: Synergies, trends, and responses. Global Issues, 6(2), 22–26.

    Google Scholar 

  • Yip, M., Shadbolt, N., & Webber, C. (2012). Structural analysis of online criminal social networks. 11-14 June 2012. Washington: ISI.

  • Yip, M., Webber, C., & Shadbolt, N. (2013). Trust among cybercriminals? Carding forums, uncertainty and implications for policing. Policing & Society, 23(4), 516–539.

    Article  Google Scholar 

  • Zabyelina, Y. G. (2017). Can criminals create opportunities for crime? Malvertising and illegal online medicine trade. Global Crime, 18(1), 31–48.

    Article  Google Scholar 

  • Zittrain, J. L. (2006). The generative internet. Harvard Law Review, 119(7), 1974–2040.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nadine Bijlenga.

Additional information

In collaboration with Team High Tech Crime (THTC) of the Dutch police.

Appendix 1

Appendix 1

List of topics

  1. 1.

    General information

    • Total number of suspects

    • Structure of the group

    • Continuity of activities within offender group

    • Names, dates of birth, and other characteristics of main suspects

    • Qualities of the group members

  2. 2.

    Main suspects

    • Profession

    • Criminal record

    • Particulars (work history, specialization, language, etc.)

    • Role within offender group

    • Motives

    • (Technical) level of expertise

    • Benefits of cooperation

    • Costs and risks of cooperation

  3. 3.

    First encounter

    • Who takes the initiative?

    • Mechanism to get involved (existing social contacts, work, sidelines and leisure activities, negative life events, deliberate recruitment, etc.)

    • How and when did cooperation start?

  4. 4.

    Advantages and disadvantages traditional offender group

    • Benefits of cooperation

    • Costs and risks of cooperation

  5. 5.

    Advantages and disadvantages ICT-specialists

    • Benefits of cooperation

    • Costs and risks of cooperation

  6. 6.

    Evaluation

    • New insights

    • Possibilities to falsify previous findings of research?

    • Possibilities to verify previous findings of research?

    • Possibilities to specify previous findings of research?

  7. 7.

    Implications for policy

    • Why were criminal activities easy to carry out?

    • Why were criminal activities difficult to carry out?

    • Possibilities to increase the perceived exertion

    • Possibilities to increase the perceived risk

    • Possibilities to decrease the perceived profits

    • Possibilities to remove excuses

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Bijlenga, N., Kleemans, E.R. Criminals seeking ICT-expertise: an exploratory study of Dutch cases. Eur J Crim Policy Res 24, 253–268 (2018). https://doi.org/10.1007/s10610-017-9356-z

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10610-017-9356-z

Keywords

Navigation