No one in the street has any idea at that moment that the Cybercrime team from East Brabant is already close to the house. The cyber specialists are waiting to go inside together with members of the Support Group. The Support Group will go in first and ensure that the Cybercrime team can enter safely afterward. An Officer of Justice and a Judge-Commissioner are also present. The police cannot just enter a home to arrest someone or search a property. The cyber team has been preparing for this moment for three months. Does the man suspect anything? Has he prepared with a so-called kill switch that can wipe his computer clean in one go? Is he in possession of a firearm? All questions that were considered during the preparation.

It is 6:00 AM. Time to go inside. While the Support Group is busy at the door, they quickly see the suspect looking out the window above. “Police, I want to see your hands. Hands forward!” is shouted. The suspect remains standing. Within seconds, officers from the Support Group are inside and head upstairs. “Hands on your head and on your knees.” The young man is arrested. The rest of the house is checked. Only the mother of the young man turns out to be home and is woken up.

Meanwhile, the digital specialists can get to work and start searching the house. Anything that could contain any trace and could contribute as evidence for the investigation is seized.

The mother, who is now sitting downstairs on the couch, has no idea what has just happened and why. She sees her son being escorted outside by officers and how police officers are going through their belongings in the house. She is explained about the suspicion against her son and why he has been arrested. Drawers are meticulously searched, and items such as phones, laptops, and other data carriers are seized. The search can take hours.

Digital specialists are meanwhile busy with a network search. They look at the modem of the house and scan all internet connections that exist (or have existed) with various devices. They also manage to open the laptop and search for traces and evidence. Financial specialists look for evidence of the suspects earnings. From previous research, they know that he most likely had his earnings paid out in cryptocurrency. They are also looking for a safe containing hardware where this cryptocurrency is securely stored.

Everyone involved in the search is aware of the intrusion they are making into the familys life. During a house search, personal belongings are searched, and various documents such as bank statements are reviewed. Matters that people might not even discuss with their best friends are suddenly visible to the police and the Public Prosecution Service.

The search is the final piece of a long preparation and marks the beginning of the next phase of the investigation. In this phase, attention is also paid to any other criminal offenses committed by the suspect and possibly other individuals. This is reflected in the investigation of all seized items and communication devices. This often brings to light the buyers of the app built by the young man.

Team leader Anouk from the Cybercrime Team East Brabant: “Cybercriminals are often young and can, without their parents knowing, cause many victims, inflicting not only financial damage but also much (emotional) harm. Creating an app is therefore not innocent, but sometimes software developers are unaware that the software is used for committing serious offenses. People capable of creating such apps that defraud others sometimes do not realize that their apps cause harm to others. Also, creating apps for committing cybercrime is punishable. More and more investigations are being conducted in which young cybercriminals are being unmasked. And this is often a surprise for their families. They are mostly unaware of the invisible world in which their son or daughter is involved.”