This document discusses the evolution of trust-based collaboration to combat cybercrime. It begins by describing how attacks typically occur and the advantages attackers have over responders by moving faster and without legal constraints. It then explains how responders can still monitor internet traffic and work to mitigate attacks. Currently, most effective intervention relies on trust-based collaboration between private and public sector through information sharing. However, this model does not scale well. The document proposes further evolving collaboration to public-private partnerships and finding ways to accelerate legal processes to match the fast pace of attacks and internet.