Abstract
Cybercriminals are an elusive population to study. This makes social research with cybercriminals as valuable as it is scarce. To stimulate research on cybercriminals, it is important that researchers share their insights on successful and unsuccessful approaches, strategies, and techniques. This chapter collects our fieldwork experiences researching cybercriminals, potential cybercriminals, hackers, and hacktivists. After presenting the phases of our fieldwork, we outline six research techniques we have applied and discuss the ethical issues involved. We conclude with some lessons learned and methodological perspectives to guide future research.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
See http://www.zone-h.org/. Last accessed on February 27, 2023.
References
Bekkers, L. M. J., & Leukfeldt, E. R. (2022). Recruiting money mules on Instagram: A qualitative examination of the online involvement mechanisms of cybercrime. Deviant Behavior, 1–17. https://doi.org/10.1080/01639625.2022.2073298
Bekkers, L. M. J., Moneva, A., & Leukfeldt, E. R. (2022). Understanding cybercrime involvement: A quasi-experiment on engagement with money mule recruitment ads on Instagram. Journal of Experimental Criminology, 1–20. https://doi.org/10.1007/s11292-022-09537-7
Bookstaver, M. (2021). Secondary data analysis. In J. C. Barnes & D. R. Forde (Eds.), The encyclopedia of research methods in criminology and criminal justice (pp. 531–534). Wiley. https://doi.org/10.1002/9781119111931.ch107
Bujlow, T., Carela-Espanol, V., Lee, B.-R., & Barlet-Ros, P. (2017). A survey on web tracking: Mechanisms, implications, and defenses. Proceedings of the IEEE, 105, 1476–1510. https://doi.org/10.1109/JPROC.2016.2637878
Castro-Toledo, F. J., & Gómez-Bellvís, A. B. (in press). Ethics of covert surveillance in online deviance research using honeypots. In R. Graham, S. G. Humer, C. S. Lee, & V. Nagy (Eds.), Routledge international handbook of online deviance. Routledge/Taylor & Francis Group.
Castro-Toledo, F. J., & Miró-Llinares, F. (2021). Researching cybercrime in the European Union: Asking the right ethics questions. In A. Lavorgna & T. J. Holt (Eds.), Researching cybercrimes (pp. 327–345). Springer. https://doi.org/10.1007/978-3-030-74837-1_16
Chua, Y. T., & Holt, T. J. (2016). A cross-national examination of the techniques of neutralization to account for hacking behaviors. Victims & Offenders, 11, 534–555. https://doi.org/10.1080/15564886.2015.1121944
Del-Real, C., & Rodriguez Mesa, M. J. (2022). From black to white: The regulation of ethical hacking in Spain. Information & Communications Technology Law.
European Parliament, Council of the European Union. (2016). General data protection regulation. Official Journal of the European Union, 59, 1–88.
Fourie, I., & Bothma, T. (2007). Information seeking: An overview of web tracking and the criteria for tracking software. ASLIB Proceedings, 59, 264–284. https://doi.org/10.1108/00012530710752052
Holt, T. J. (2007). Subcultural evolution? Examining the influence of on- and off-line experiences on deviant subcultures. Deviant Behavior, 28, 171–198. https://doi.org/10.1080/01639620601131065
Holt, T. J. (2017). Cybercrime through an interdisciplinary lens (Routledge studies in crime and society). Routledge/Taylor & Francis Group.
Holt, T. J. (2020). Computer hacking and the hacker subculture. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance (pp. 725–742). Springer. https://doi.org/10.1007/978-3-319-78440-3_31
Holt, T. J., & Bossler, A. M. (2016). Cybercrime in progress: Theory and prevention of technology-enabled offenses (Crime science series) (1st ed., p. 17). Routledge.
Holt, T. J., Bossler, A. M., & May, D. C. (2012). Low self-control, deviant peer associations, and juvenile cyberdeviance. The American Journal of Criminal Justice, 37, 378–395. https://doi.org/10.1007/s12103-011-9117-3
Holt, T. J., Leukfeldt, E. R., & van de Weijer, S. G. A. (2020). An examination of motivation and routine activity theory to account for cyberattacks against Dutch web sites. Criminal Justice and Behavior, 47, 487–505. https://doi.org/10.1177/0093854819900322
Hutchings, A., & Holt, T. J. (2018). Interviewing cybercrime offenders.
Internet Crime Complaint Center. (2021). 2021 Internet Crime Report. Federal Bureau of Investigation.
Jordan, T. (2017). A genealogy of hacking. Convergence, 23, 528–544. https://doi.org/10.1177/1354856516640710
Kleemans, E. R. (2014). Organized crime research: Challenging assumptions and informing policy. In E. Cockbain & J. Knutsson (Eds.), Applied police research (pp. 57–67). Routledge. https://doi.org/10.4324/9781315815305
Kruisbergen, E. W., Leukfeldt, E. R., Kleemans, E. R., & Roks, R. A. (2019). Money talks money laundering choices of organized crime offenders in a digital age. Journal of Crime and Justice, 42, 569–581. https://doi.org/10.1080/0735648X.2019.1692420
Lavorgna, A., & Holt, T. J. (Eds.). (2021). Researching cybercrimes: Methodologies, ethics, and critical approaches. Springer. https://doi.org/10.1007/978-3-030-74837-1
Lavorgna, A., & Sugiura, L. (2022). Direct contacts with potential interviewees when carrying out online ethnography on controversial and polarized topics: A loophole in ethics guidelines. International Journal of Social Research Methodology, 25(2), 261–267. https://doi.org/10.1080/13645579.2020.1855719
Leukfeldt, E. R., & Holt, T. J. (2022). Cybercrime on the menu? Examining cafeteria-style offending among financially motivated cybercriminals. Computers in Human Behavior, 126, 106979. https://doi.org/10.1016/j.chb.2021.106979
Leukfeldt, E. R., & Kleemans, E. R. (2021). Breaking the walls of silence: Analyzing criminal investigations to improve our understanding of cybercrime. In A. Lavorgna & T. J. Holt (Eds.), Researching cybercrimes: Methodologies, ethics, and critical approaches (pp. 127–144). Springer. https://doi.org/10.1007/978-3-030-74837-1
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017a). Cybercriminal networks, social ties and online forums: Social ties versus digital ties within phishing and malware networks. British Journal of Criminology, 57, 704–722. https://doi.org/10.1093/bjc/azw009
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017b). The use of online crime markets by cybercriminal networks: A view from within. American Behavioral Scientist, 61, 1387–1402. https://doi.org/10.1177/0002764217734267
Leukfeldt, E. R., Kleemans, E. R., & Stol, W. P. (2017c). Origin, growth and criminal capabilities of cybercriminal networks. An international empirical analysis. Crime, Law and Social Change, 67, 39–53. https://doi.org/10.1007/s10611-016-9663-1
Levy, S. (1984). Hackers: Heroes of the computer revolution (1st ed.). Anchor Press/Doubleday.
Maimon, D., & Louderback, E. R. (2019). Cyber-dependent crimes: An interdisciplinary review. Annual Review of Criminology, 2, 191–216. https://doi.org/10.1146/annurev-criminol-032317-092057
Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology, 52, 33–59. https://doi.org/10.1111/1745-9125.12028
Maimon, D., Howell, C. J., Moloney, M., & Park, Y. S. (2020). An examination of email fraudsters’ modus operandi. Crime & Delinquency, 001112872096850. https://doi.org/10.1177/0011128720968504
Marcum, C. D., Higgins, G. E., Ricketts, M. L., & Wolfe, S. E. (2014). Hacking in high school: Cybercrime perpetration by juveniles. Deviant Behavior, 35, 581–591. https://doi.org/10.1080/01639625.2013.867721
McGuire, M. R. (2020). It ain’t what it is, it’s the way that they do it? Why we still don’t understand cybercrime. In E. R. Leukfeldt & T. J. Holt (Eds.), The human factor of cybercrime (Routledge studies in crime and society) (pp. 3–28). Routledge.
McGuire, M. R., & Dowling, S. (2013). Cyber crime: A review of the evidence (No. 75). Home Office, United Kingdom.
Miró-Llinares, F., & Johnson, S. D. (2018). Cybercrime and place: Applying environmental criminology to crimes in cyberspace. In G. J. N. Bruinsma & S. D. Johnson (Eds.), The Oxford handbook of environmental criminology (pp. 883–906). Oxford University Press. https://doi.org/10.1093/oxfordhb/9780190279707.013.39
Moneva, A. (2020). Cyber places, crime patterns, and cybercrime prevention: An environmental criminology and crime analysis approach through data science. Doctoral thesis. Miguel Hernandez University, Elche.
Moneva, A., Leukfeldt, E. R., & Klijnsoon, W. (2022a). Alerting consciences to reduce cybercrime: A quasi-experimental design using warning banners. Journal of Experimental Criminology. https://doi.org/10.1007/s11292-022-09504-2
Moneva, A., Leukfeldt, E. R., van de Weijer, S. G. A., & Miró-Llinares, F. (2022b). Repeat victimization by website defacement: An empirical test of premises from an environmental criminology perspective. Computers in Human Behavior, 126. https://doi.org/10.1016/j.chb.2021.106984
Moneva, A., Ruiter, S., & Meinsma, D. (2022c). Hacker mobility in cyberspace and the least effort principle: examining efficiency in the journey to cybercrime. https://doi.org/10.17605/OSF.IO/UFDP8
Nosek, B. A., Hardwicke, T. E., Moshontz, H., Allard, A., Corker, K. S., Dreber, A., Fidler, F., Hilgard, J., Kline Struhl, M., Nuijten, M. B., Rohrer, J. M., Romero, F., Scheel, A. M., Scherer, L. D., Schönbrodt, F. D., & Vazire, S. (2022). Replicability, robustness, and reproducibility in psychological science. Annual Review of Psychology, 73, 719–748. https://doi.org/10.1146/annurev-psych-020821-114157
O’Connor, H., & Madge, C. (2017). Online interviewing. In The SAGE handbook of online research methods (pp. 416–434). SAGE. https://doi.org/10.4135/9781473957992.n24
Parry, D. A., Davidson, B. I., Sewall, C. J. R., Fisher, J. T., Mieczkowski, H., & Quintana, D. S. (2021). A systematic review and meta-analysis of discrepancies between logged and self-reported digital media use. Nature Human Behaviour, 5, 1535–1547. https://doi.org/10.1038/s41562-021-01117-5
Perkins, R. C., & Howell, C. J. (2021). Honeypots for cybercrime research. In A. Lavorgna & T. J. Holt (Eds.), Researching cybercrimes (pp. 233–261). Springer. https://doi.org/10.1007/978-3-030-74837-1_12
Prichard, J., Wortley, R., Watters, P. A., Spiranovic, C., Hunn, C., & Krone, T. (2021). Effects of automated messages on internet users attempting to access “barely legal” pornography. Sexual Abuse, 107906322110138. https://doi.org/10.1177/10790632211013809
Pridemore, W. A., Makel, M. C., & Plucker, J. A. (2018). Replication in criminology and the social sciences. Annual Review of Criminology, 1, 19–38. https://doi.org/10.1146/annurev-criminol-032317-091849
Rauhala, M., & Kalokairinou, L. (2021). Ethics in social science and humanities. European Commission.
Romagna, M. (2020). Hacktivism: Conceptualization, techniques, and historical view. In T. J. Holt & A. M. Bossler (Eds.), The Palgrave handbook of international cybercrime and cyberdeviance (pp. 1–27). Springer. https://doi.org/10.1007/978-3-319-90307-1_34-1
Romagna, M., & Leukfeldt, E. R. (2023). Becoming a hacktivist. Examining the motivations and the processes that prompt an individual to engage in hacktivism. Journal of Crime and Justice, 1–19. https://doi.org/10.1080/0735648X.2023.2216189
Romagna, M., & Van den Hout, N. J. (2017). Hacktivism and website defacement: Motivations, capabilities and potential threats. In 27th virus bulletin international conference (pp. 1–11). Madrid.
Salmons, J. (2014). Qualitative online interviews: Strategies, design, and skills (2nd ed.). SAGE.
Schell, B. H., & Dodge, J. L. (2002). The hacking of America: Who’s doing it, why, and how. Quorum Books.
Schiks, J. A. M., & van’t Hoff-de Goede, M. S., & Leukfeldt, E. R. (2021). Een alternatief voor jeugdige hackers? Plan- en procesevaluatie van Hack_Right. Sdu uitgevers, Den Haag.
Seidman, I. (2019). Interviewing as qualitative research: A guide for researchers in education and the social sciences (5th ed.). Teachers College Press.
Spitzner, L. (2002). Honeypots: Tracking hackers. Addison-Wesley.
Steinmetz, K. F. (2015). Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55, 125–145. https://doi.org/10.1093/bjc/azu061
Švábenský, V., Čeleda, P., Vykopal, J., & Brišáková, S. (2021). Cybersecurity knowledge and skills taught in capture the flag challenges. Computers & Security, 102, 102154. https://doi.org/10.1016/j.cose.2020.102154
Taylor, P. A. (1999). Hackers: Crime in the digital sublime. Routledge.
van ’t Hoff-de Goede, M. S., van der Kleij, R., van de Weijer, S. G. A., & Leukfeldt, E. R. (2019). Hoe veilig gedragen wij ons online? Een studie naar de samenhang tussen kennis, gelegenheid, motivatie en online gedrag van Nederlanders. Research and Documentation Centre (WODC).
van de Weijer, S. G. A., Holt, T. J., & Leukfeldt, E. R. (2021). Heterogeneity in trajectories of cybercriminals: A longitudinal analyses of web defacements. Computers in Human Behavior Reports, 4, 100113. https://doi.org/10.1016/j.chbr.2021.100113
Vetterl, A. (2020). Honeypots in the age of universal attacks and the Internet of Things (No. 944)., Technical reports. University of Cambridge.
Wall, D. S. (2001). Cybercrimes and the internet. In D. S. Wall (Ed.), Crime and the internet (pp. 1–17). Routledge.
Weulen Kranenbarg, M. (2021). Cyber-dependent crime versus traditional crime: Empirical evidence for clusters of offenses and related motives. In M. Weulen Kranenbarg & E. R. Leukfeldt (Eds.), Cybercrime in context, crime and justice in digital society (pp. 195–216). Springer. https://doi.org/10.1007/978-3-030-60527-8_12
Weulen Kranenbarg, M., Ruiter, S., & Van Gelder, J.-L. (2021). Do cyber-birds flock together? Comparing deviance among social network members of cyber-dependent offenders and traditional offenders. European Journal of Criminology, 18, 386–406. https://doi.org/10.1177/1477370819849677
Yar, M., & Steinmetz, K. F. (2019). Cybercrime and society (3rd ed.). Sage.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Moneva, A., Leukfeldt, E.R., Romagna, M. (2023). Fieldwork Experiences Researching Cybercriminals. In: Díaz-Fernández, A.M., Del-Real, C., Molnar, L. (eds) Fieldwork Experiences in Criminology and Security Studies. Springer, Cham. https://doi.org/10.1007/978-3-031-41574-6_27
Download citation
DOI: https://doi.org/10.1007/978-3-031-41574-6_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-41573-9
Online ISBN: 978-3-031-41574-6
eBook Packages: Behavioral Science and PsychologyBehavioral Science and Psychology (R0)