Abstract
Which opportunities due to digitization are exploited by criminals? And how do criminals gather the required ICT-expertise to take advantage of these opportunities? This exploratory study provides insight into criminals seeking ICT-expertise by analyzing five Dutch cases. This paper shows that criminals seeking ICT-expertise take advantage of companies and employees in the ICT-sector that act in a gray area. It is noteworthy that the initial contact of criminals seeking ICT-expertise is often immediately directed to criminal collaboration. In these cases, ‘capacity’ is more important than ‘contact’. Furthermore, this paper discusses the role of forums for criminals seeking ICT-expertise. Criminals take advantage of the transfer of knowledge on forums and the existence of crimeware-as-a-service. Finally, this study falsifies the statement that there is a clear division between traditional offender groups taking advantage of the possibilities arising from ICT, and crime groups operating exclusively online. In practice, there are many connections between online and offline activities.
Similar content being viewed by others
References
Ablon, L., Libicki, M. C., & Golay, A. A. (2014). Markets for Cybercrime Tools and Stolen Data. Hackers’ bazaar. Santa Monica, CA: RAND Corporation.
Bernaards, F., Monsma, E., & Zinn, P. (2012). High tech crime Criminaliteitsbeeldanalyse 2012 high tech crime. In Crime threat analysis. Driebergen: KLPD, DNRI.
Brenner, S. W. (2001). Is there such a thing as 'Virtual Crime'? California Criminal Law Review, 4(1), 1–72.
Bruinsma, G., & Bernasco, W. (2002). Dadergroepen en transnationale illegale markten. Tijdschrift voor Criminologie, 44(2), 128–140.
Choo, K. K. R. (2008). Organised crime groups in cyberspace: A typology. Trends in Organized Crime, 11(3), 270–295.
Clarke, R. V. (1997). Situational Crime Prevention: Successful Case Studies. New York: Criminal Justice Press.
Clarke, R., & Felson, M. (1993). Routine activity and rational choice. London: Transaction Press.
Décary-Hetú, D., & Dupont, B. (2012). The social network of hackers. Global Crime, 13(3), 160–175.
Dupont, B., Côté, A., Savine, C., & Décary-Hétu, D. (2016). The ecology of trust among hackers. Global Crime, 17(2), 129–151.
Europol. (2014). Internet facilitated organized crime (IOCTA). The Hague: European Police Office.
Europol. (2016). Internet facilitated organized crime (IOCTA). The Hague: European Police Office.
Felson, M. (2003). The process of co-offending. In M. J. Smith & D. B. Cornish (Eds.), Theory for practice in situational crime prevention (volume 16) (pp. 149–168). Devon: Willan.
Felson, M. (2006). Crime and nature. Thousand Oaks: Sage.
George, A. L., & Bennett, A. (2005). Case studies and theory development in the social sciences. London: MIT Press.
Glaser, B. G., & Strauss, A. L. (1967). The discovery of grounded theory: Strategies for qualitative research. Chicago: Aldine.
Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360–1380.
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28(2), 171–198.
Holt, T. J., & Bossler, A. M. (2014). An assessment of the current state of cybercrime scholarship. Deviant Behavior, 35(1), 20–40.
Holt, T. J., & Lampke, E. (2009). Exploring stolen data markets online: Products and market forces. Criminal Justice Studies, 23(1), 33–50.
Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. American Journal of Criminal Justice, 37(3), 378–395.
Holt, T. J., Smirnova, O., Chua, Y. T., & Copes, H. (2015). Examining the risk reduction strategies of actors in online criminal markets. Global Crime, 16(2), 81–103.
Hutchings, A. (2014). Crime from the keyboard: organised cybercrime, co-offending, initiation and knowledge transmission. Crime, Law and Social Change 62(1), 1–20.
Hutchings, A., & Holt, T. J. (2015). A crime script analysis of the online stolen data market. British Journal of Criminology, 55(3), 596–614.
Kenney, M. (2007). From Pablo to Osama: Trafficking and terrorist networks, government bureaucracies, and competitive adaptation. University Park: Penn State Press.
Kleemans, E. R. (2014). Organized crime research: Challenging assumptions and informing policy. In J. Knutsson & E. Cockbain (Eds.), Applied police research: Challenges and opportunities, Crime science series (pp. 57–67). Cullompton: Willan.
Kleemans, E. R., & De Poot, C. J. (2008). Criminal careers in organized crime and social opportunity structure. European Journal of Criminology, 5(1), 69–98.
Kleemans, E. R., & Van de Bunt, H. G. (1999). The social embeddedness of organized crime. Transnational Organized Crime, 5(2), 19–36.
Kruisbergen, E. W., Van de Bunt, H. G., & Kleemans, E. R. (2012). Georganiseerde criminaliteit in Nederland. Vierde rapportage op basis van de monitor Georganiseerde Criminaliteit [organized crime in the Netherlands. Fourth report of the organized crime monitor]. Den Haag: Boom Lemma.
Lavorgna, A. (2015a). Organised crime goes online: realities and challenges. Journal of Money Laundering Control, 18(2), 153–168.
Lavorgna, A. (2015b). The online trade in counterfeit pharmaceuticals: New criminal opportunities, trends and challenges. European Journal of Criminology, 12(2), 226–241.
Lavorgna, A., & Sergi, A. (2014). Types of organized crime in Italy. The multifaceted spectrum of Italian criminal associations and their different attitudes in the financial crisis and in the use of internet technologies. International Journal of Law, Crime and Justice, 42(1), 16–32.
Leukfeldt, E. R. (2014). Cybercrime and social ties. Phishing in Amsterdam. Trends in Organized Crime, 17(4), 231–249.
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017a). Cybercriminal networks, social ties and online forums. Social ties versus digital ties within phishing and malware networks. British Journal of Criminology, 57(3), 704–722.
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017b). A typology of cybercriminal networks: From low-tech all-rounders to high-tech specialists. Crime, Law and Social Change, 67(1), 21–37.
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017c). Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis. Crime, Law and Social Change, 67(1), 39–53.
Longe, O., Ngwa, O., Wada, F., Mbarika, V., & Kvasny, L. (2009). Criminal uses of information & communication technologies in sub-Saharan Africa: Trends, concerns and perspectives. Journal of Information Technology Impact, 9(3), 155–172.
Lu, Y., Luo, X., Polgar, M., & Cao, Y. (2010). Social network analysis of a criminal hacker community. Journal of Computer Information Systems, 51(2), 31–41.
Lusthaus, J. (2012). Trust in the world of cybercrime. Global Crime, 13(2), 71–94.
Martin, J. (2014). Lost on the silk road: Online drug distribution and the ‘cryptomarket’. Criminology and Criminal Justice, 14(3), 351–367.
McGuire, M., & Dowling, S. (2013). Chapter 1: Cyber-dependent crimes. Cyber crime: A review of the evidence (Home Office Research Report 75 ed., pp. 4-34).
Odinot, G., Verhoeven, M. A., Pool, R. L. D., & De Poot, C. J. (2016). Cybercrime, organised crime and organised cybercrime in the Netherlands: Empirical findings and implications for law enforcement. The Hague: WODC.
Reuter, P. (1983). Disorganized crime: The economics of the visible hand. Cambridge, MA: MIT Press.
Sood, A., & Enbody, R. (2013). Crime-ware-as-a-service: A survey of commoditized crimeware in the underground market. International Journal of Critical Infrastructure Protection, 6(1), 23–38.
Soudijn, M., & Monsma, E. (2012). Virtuele ontmoetingsruimtes voor cybercriminelen. Tijdschrift voor Criminologie, 54(4), 349–360.
Soudijn, M. R. J., & Zegers, B. C. H. T. (2012). Cybercrime and virtual offender convergence settings. Trends in Organized Crime, 15(2), 111–129.
van de Bunt, H. G., & Kleemans, E. R. (2007). Georganiseerde criminaliteit in Nederland: Derde rapportage op basis van de Monitor Georganiseerde Criminaliteit organized crime in the Netherlands. In Third report based on the organized crime monitor. Den Haag: WODC.
Wall, D. (2007). Cybercrime: The transformation of crime in the information age. Cambridge: Polity.
Williams, P. (2001). Organized crime and cybercrime: Synergies, trends, and responses. Global Issues, 6(2), 22–26.
Yip, M., Shadbolt, N., & Webber, C. (2012). Structural analysis of online criminal social networks. 11-14 June 2012. Washington: ISI.
Yip, M., Webber, C., & Shadbolt, N. (2013). Trust among cybercriminals? Carding forums, uncertainty and implications for policing. Policing & Society, 23(4), 516–539.
Zabyelina, Y. G. (2017). Can criminals create opportunities for crime? Malvertising and illegal online medicine trade. Global Crime, 18(1), 31–48.
Zittrain, J. L. (2006). The generative internet. Harvard Law Review, 119(7), 1974–2040.
Author information
Authors and Affiliations
Corresponding author
Additional information
In collaboration with Team High Tech Crime (THTC) of the Dutch police.
Appendix 1
Appendix 1
List of topics
-
1.
General information
-
Total number of suspects
-
Structure of the group
-
Continuity of activities within offender group
-
Names, dates of birth, and other characteristics of main suspects
-
Qualities of the group members
-
-
2.
Main suspects
-
Profession
-
Criminal record
-
Particulars (work history, specialization, language, etc.)
-
Role within offender group
-
Motives
-
(Technical) level of expertise
-
Benefits of cooperation
-
Costs and risks of cooperation
-
-
3.
First encounter
-
Who takes the initiative?
-
Mechanism to get involved (existing social contacts, work, sidelines and leisure activities, negative life events, deliberate recruitment, etc.)
-
How and when did cooperation start?
-
-
4.
Advantages and disadvantages traditional offender group
-
Benefits of cooperation
-
Costs and risks of cooperation
-
-
5.
Advantages and disadvantages ICT-specialists
-
Benefits of cooperation
-
Costs and risks of cooperation
-
-
6.
Evaluation
-
New insights
-
Possibilities to falsify previous findings of research?
-
Possibilities to verify previous findings of research?
-
Possibilities to specify previous findings of research?
-
-
7.
Implications for policy
-
Why were criminal activities easy to carry out?
-
Why were criminal activities difficult to carry out?
-
Possibilities to increase the perceived exertion
-
Possibilities to increase the perceived risk
-
Possibilities to decrease the perceived profits
-
Possibilities to remove excuses
-
Rights and permissions
About this article
Cite this article
Bijlenga, N., Kleemans, E.R. Criminals seeking ICT-expertise: an exploratory study of Dutch cases. Eur J Crim Policy Res 24, 253–268 (2018). https://doi.org/10.1007/s10610-017-9356-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10610-017-9356-z