Skip to main content

Fieldwork Experiences Researching Cybercriminals

  • Chapter
  • First Online:
Fieldwork Experiences in Criminology and Security Studies

Abstract

Cybercriminals are an elusive population to study. This makes social research with cybercriminals as valuable as it is scarce. To stimulate research on cybercriminals, it is important that researchers share their insights on successful and unsuccessful approaches, strategies, and techniques. This chapter collects our fieldwork experiences researching cybercriminals, potential cybercriminals, hackers, and hacktivists. After presenting the phases of our fieldwork, we outline six research techniques we have applied and discuss the ethical issues involved. We conclude with some lessons learned and methodological perspectives to guide future research.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 139.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See http://www.zone-h.org/. Last accessed on February 27, 2023.

References

  • Bekkers, L. M. J., & Leukfeldt, E. R. (2022). Recruiting money mules on Instagram: A qualitative examination of the online involvement mechanisms of cybercrime. Deviant Behavior, 1–17. https://doi.org/10.1080/01639625.2022.2073298

  • Bekkers, L. M. J., Moneva, A., & Leukfeldt, E. R. (2022). Understanding cybercrime involvement: A quasi-experiment on engagement with money mule recruitment ads on Instagram. Journal of Experimental Criminology, 1–20. https://doi.org/10.1007/s11292-022-09537-7

  • Bookstaver, M. (2021). Secondary data analysis. In J. C. Barnes & D. R. Forde (Eds.), The encyclopedia of research methods in criminology and criminal justice (pp. 531–534). Wiley. https://doi.org/10.1002/9781119111931.ch107

    Chapter  Google Scholar 

  • Bujlow, T., Carela-Espanol, V., Lee, B.-R., & Barlet-Ros, P. (2017). A survey on web tracking: Mechanisms, implications, and defenses. Proceedings of the IEEE, 105, 1476–1510. https://doi.org/10.1109/JPROC.2016.2637878

    Article  Google Scholar 

  • Castro-Toledo, F. J., & Gómez-Bellvís, A. B. (in press). Ethics of covert surveillance in online deviance research using honeypots. In R. Graham, S. G. Humer, C. S. Lee, & V. Nagy (Eds.), Routledge international handbook of online deviance. Routledge/Taylor & Francis Group.

    Google Scholar 

  • Castro-Toledo, F. J., & Miró-Llinares, F. (2021). Researching cybercrime in the European Union: Asking the right ethics questions. In A. Lavorgna & T. J. Holt (Eds.), Researching cybercrimes (pp. 327–345). Springer. https://doi.org/10.1007/978-3-030-74837-1_16

    Chapter  Google Scholar 

  • Chua, Y. T., & Holt, T. J. (2016). A cross-national examination of the techniques of neutralization to account for hacking behaviors. Victims & Offenders, 11, 534–555. https://doi.org/10.1080/15564886.2015.1121944

    Article  Google Scholar 

  • Del-Real, C., & Rodriguez Mesa, M. J. (2022). From black to white: The regulation of ethical hacking in Spain. Information & Communications Technology Law.

    Google Scholar 

  • European Parliament, Council of the European Union. (2016). General data protection regulation. Official Journal of the European Union, 59, 1–88.

    Google Scholar 

  • Fourie, I., & Bothma, T. (2007). Information seeking: An overview of web tracking and the criteria for tracking software. ASLIB Proceedings, 59, 264–284. https://doi.org/10.1108/00012530710752052

    Article  Google Scholar 

  • Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198. https://doi.org/10.1080/01639620601131065

    Article  Google Scholar 

  • Holt, T. J. (2017). Cybercrime through an interdisciplinary lens (Routledge studies in crime and society). Routledge/Taylor & Francis Group.

    Google Scholar 

  • Holt, T. J. (2020). Computer hacking and the hacker subculture. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance (pp. 725–742). Springer. https://doi.org/10.1007/978-3-319-78440-3_31

    Chapter  Google Scholar 

  • Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses (Crime science series) (1st ed., p. 17). Routledge.

    Google Scholar 

  • Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. The American Journal of Criminal Justice, 37, 378–395. https://doi.org/10.1007/s12103-011-9117-3

    Article  Google Scholar 

  • Holt, T. J., Leukfeldt, E. R., & van de Weijer, S. G. A. (2020). An examination of motivation and routine activity theory to account for cyberattacks against Dutch web sites. Criminal Justice and Behavior, 47, 487–505. https://doi.org/10.1177/0093854819900322

    Article  Google Scholar 

  • Hutchings, A., & Holt, T. J. (2018). Interviewing cybercrime offenders.

    Google Scholar 

  • Internet Crime Complaint Center. (2021). 2021 Internet Crime Report. Federal Bureau of Investigation.

    Google Scholar 

  • Jordan, T. (2017). A genealogy of hacking. Convergence, 23, 528–544. https://doi.org/10.1177/1354856516640710

    Article  Google Scholar 

  • Kleemans, E. R. (2014). Organized crime research: Challenging assumptions and informing policy. In E. Cockbain & J. Knutsson (Eds.), Applied police research (pp. 57–67). Routledge. https://doi.org/10.4324/9781315815305

    Chapter  Google Scholar 

  • Kruisbergen, E. W., Leukfeldt, E. R., Kleemans, E. R., & Roks, R. A. (2019). Money talks money laundering choices of organized crime offenders in a digital age. Journal of Crime and Justice, 42, 569–581. https://doi.org/10.1080/0735648X.2019.1692420

    Article  Google Scholar 

  • Lavorgna, A., & Holt, T. J. (Eds.). (2021). Researching cybercrimes: Methodologies, ethics, and critical approaches. Springer. https://doi.org/10.1007/978-3-030-74837-1

    Book  Google Scholar 

  • Lavorgna, A., & Sugiura, L. (2022). Direct contacts with potential interviewees when carrying out online ethnography on controversial and polarized topics: A loophole in ethics guidelines. International Journal of Social Research Methodology, 25(2), 261–267. https://doi.org/10.1080/13645579.2020.1855719

  • Leukfeldt, E. R., & Holt, T. J. (2022). Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals. Computers in Human Behavior, 126, 106979. https://doi.org/10.1016/j.chb.2021.106979

    Article  Google Scholar 

  • Leukfeldt, E. R., & Kleemans, E. R. (2021). Breaking the walls of silence: Analyzing criminal investigations to improve our understanding of cybercrime. In A. Lavorgna & T. J. Holt (Eds.), Researching cybercrimes: Methodologies, ethics, and critical approaches (pp. 127–144). Springer. https://doi.org/10.1007/978-3-030-74837-1

    Chapter  Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017a). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. British Journal of Criminology, 57, 704–722. https://doi.org/10.1093/bjc/azw009

    Article  Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017b). The use of online crime markets by cybercriminal networks: A view from within. American Behavioral Scientist, 61, 1387–1402. https://doi.org/10.1177/0002764217734267

    Article  Google Scholar 

  • Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017c). Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis. Crime, Law and Social Change, 67, 39–53. https://doi.org/10.1007/s10611-016-9663-1

    Article  Google Scholar 

  • Levy, S. (1984). Hackers: Heroes of the computer revolution (1st ed.). Anchor Press/Doubleday.

    Google Scholar 

  • Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, 2, 191–216. https://doi.org/10.1146/annurev-criminol-032317-092057

    Article  Google Scholar 

  • Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology, 52, 33–59. https://doi.org/10.1111/1745-9125.12028

    Article  Google Scholar 

  • Maimon, D., Howell, C. J., Moloney, M., & Park, Y. S. (2020). An examination of email fraudsters’ modus operandi. Crime & Delinquency, 001112872096850. https://doi.org/10.1177/0011128720968504

  • Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35, 581–591. https://doi.org/10.1080/01639625.2013.867721

    Article  Google Scholar 

  • McGuire, M. R. (2020). It ain’t what it is, it’s the way that they do it? Why we still don’t understand cybercrime. In E. R. Leukfeldt & T. J. Holt (Eds.), The human factor of cybercrime (Routledge studies in crime and society) (pp. 3–28). Routledge.

    Google Scholar 

  • McGuire, M. R., & Dowling, S. (2013). Cyber crime: A review of the evidence (No. 75). Home Office, United Kingdom.

    Google Scholar 

  • Miró-Llinares, F., & Johnson, S. D. (2018). Cybercrime and place: Applying environmental criminology to crimes in cyberspace. In G. J. N. Bruinsma & S. D. Johnson (Eds.), The Oxford handbook of environmental criminology (pp. 883–906). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780190279707.013.39

    Chapter  Google Scholar 

  • Moneva, A. (2020). Cyber places, crime patterns, and cybercrime prevention: An environmental criminology and crime analysis approach through data science. Doctoral thesis. Miguel Hernandez University, Elche.

    Google Scholar 

  • Moneva, A., Leukfeldt, E. R., & Klijnsoon, W. (2022a). Alerting consciences to reduce cybercrime: A quasi-experimental design using warning banners. Journal of Experimental Criminology. https://doi.org/10.1007/s11292-022-09504-2

  • Moneva, A., Leukfeldt, E. R., van de Weijer, S. G. A., & Miró-Llinares, F. (2022b). Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective. Computers in Human Behavior, 126. https://doi.org/10.1016/j.chb.2021.106984

  • Moneva, A., Ruiter, S., & Meinsma, D. (2022c). Hacker mobility in cyberspace and the least effort principle: examining efficiency in the journey to cybercrime. https://doi.org/10.17605/OSF.IO/UFDP8

  • Nosek, B. A., Hardwicke, T. E., Moshontz, H., Allard, A., Corker, K. S., Dreber, A., Fidler, F., Hilgard, J., Kline Struhl, M., Nuijten, M. B., Rohrer, J. M., Romero, F., Scheel, A. M., Scherer, L. D., Schönbrodt, F. D., & Vazire, S. (2022). Replicability, robustness, and reproducibility in psychological science. Annual Review of Psychology, 73, 719–748. https://doi.org/10.1146/annurev-psych-020821-114157

    Article  PubMed  Google Scholar 

  • O’Connor, H., & Madge, C. (2017). Online interviewing. In The SAGE handbook of online research methods (pp. 416–434). SAGE. https://doi.org/10.4135/9781473957992.n24

    Chapter  Google Scholar 

  • Parry, D. A., Davidson, B. I., Sewall, C. J. R., Fisher, J. T., Mieczkowski, H., & Quintana, D. S. (2021). A systematic review and meta-analysis of discrepancies between logged and self-reported digital media use. Nature Human Behaviour, 5, 1535–1547. https://doi.org/10.1038/s41562-021-01117-5

    Article  PubMed  Google Scholar 

  • Perkins, R. C., & Howell, C. J. (2021). Honeypots for cybercrime research. In A. Lavorgna & T. J. Holt (Eds.), Researching cybercrimes (pp. 233–261). Springer. https://doi.org/10.1007/978-3-030-74837-1_12

    Chapter  Google Scholar 

  • Prichard, J., Wortley, R., Watters, P. A., Spiranovic, C., Hunn, C., & Krone, T. (2021). Effects of automated messages on internet users attempting to access “barely legal” pornography. Sexual Abuse, 107906322110138. https://doi.org/10.1177/10790632211013809

  • Pridemore, W. A., Makel, M. C., & Plucker, J. A. (2018). Replication in criminology and the social sciences. Annual Review of Criminology, 1, 19–38. https://doi.org/10.1146/annurev-criminol-032317-091849

    Article  Google Scholar 

  • Rauhala, M., & Kalokairinou, L. (2021). Ethics in social science and humanities. European Commission.

    Google Scholar 

  • Romagna, M. (2020). Hacktivism: Conceptualization, techniques, and historical view. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance (pp. 1–27). Springer. https://doi.org/10.1007/978-3-319-90307-1_34-1

    Chapter  Google Scholar 

  • Romagna, M., & Leukfeldt, E. R. (2023). Becoming a hacktivist. Examining the motivations and the processes that prompt an individual to engage in hacktivism. Journal of Crime and Justice, 1–19. https://doi.org/10.1080/0735648X.2023.2216189

  • Romagna, M., & Van den Hout, N. J. (2017). Hacktivism and website defacement: Motivations, capabilities and potential threats. In 27th virus bulletin international conference (pp. 1–11). Madrid.

    Google Scholar 

  • Salmons, J. (2014). Qualitative online interviews: Strategies, design, and skills (2nd ed.). SAGE.

    Book  Google Scholar 

  • Schell, B. H., & Dodge, J. L. (2002). The hacking of America: Who’s doing it, why, and how. Quorum Books.

    Google Scholar 

  • Schiks, J. A. M., & van’t Hoff-de Goede, M. S., & Leukfeldt, E. R. (2021). Een alternatief voor jeugdige hackers? Plan- en procesevaluatie van Hack_Right. Sdu uitgevers, Den Haag.

    Google Scholar 

  • Seidman, I. (2019). Interviewing as qualitative research: A guide for researchers in education and the social sciences (5th ed.). Teachers College Press.

    Google Scholar 

  • Spitzner, L. (2002). Honeypots: Tracking hackers. Addison-Wesley.

    Google Scholar 

  • Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55, 125–145. https://doi.org/10.1093/bjc/azu061

    Article  Google Scholar 

  • Švábenský, V., Čeleda, P., Vykopal, J., & Brišáková, S. (2021). Cybersecurity knowledge and skills taught in capture the flag challenges. Computers & Security, 102, 102154. https://doi.org/10.1016/j.cose.2020.102154

    Article  Google Scholar 

  • Taylor, P. A. (1999). Hackers: Crime in the digital sublime. Routledge.

    Google Scholar 

  • van ’t Hoff-de Goede, M. S., van der Kleij, R., van de Weijer, S. G. A., & Leukfeldt, E. R. (2019). Hoe veilig gedragen wij ons online? Een studie naar de samenhang tussen kennis, gelegenheid, motivatie en online gedrag van Nederlanders. Research and Documentation Centre (WODC).

    Google Scholar 

  • van de Weijer, S. G. A., Holt, T. J., & Leukfeldt, E. R. (2021). Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements. Computers in Human Behavior Reports, 4, 100113. https://doi.org/10.1016/j.chbr.2021.100113

    Article  Google Scholar 

  • Vetterl, A. (2020). Honeypots in the age of universal attacks and the Internet of Things (No. 944)., Technical reports. University of Cambridge.

    Google Scholar 

  • Wall, D. S. (2001). Cybercrimes and the internet. In D. S. Wall (Ed.), Crime and the internet (pp. 1–17). Routledge.

    Google Scholar 

  • Weulen Kranenbarg, M. (2021). Cyber-dependent crime versus traditional crime: Empirical evidence for clusters of offenses and related motives. In M. Weulen Kranenbarg & E. R. Leukfeldt (Eds.), Cybercrime in context, crime and justice in digital society (pp. 195–216). Springer. https://doi.org/10.1007/978-3-030-60527-8_12

    Chapter  Google Scholar 

  • Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J.-L. (2021). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. European Journal of Criminology, 18, 386–406. https://doi.org/10.1177/1477370819849677

    Article  Google Scholar 

  • Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society (3rd ed.). Sage.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Asier Moneva .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Moneva, A., Leukfeldt, E.R., Romagna, M. (2023). Fieldwork Experiences Researching Cybercriminals. In: Díaz-Fernández, A.M., Del-Real, C., Molnar, L. (eds) Fieldwork Experiences in Criminology and Security Studies. Springer, Cham. https://doi.org/10.1007/978-3-031-41574-6_27

Download citation

Publish with us

Policies and ethics