Skip to main content

The Devil Drives a Lada: The Social Construction of Hackers as Cybercriminals

  • Chapter
Constructing Crime

Abstract

A senior police officer recently described to me a serious dilemma that he had just faced. The officer had received reliable intelligence that a serious financial crime had been committed by an East European Mafia group using a computer located within his police force area. Early one morning, anticipating stiff resistance, he sent an armed unit to the house containing the computer. After breaking down the door, his officers were shocked to find a sleepy breakfasting family, rather than the violent mafia gang they had expected to meet. On this occasion, the police had chosen the wrong course of action, because the family’s computer had been infected by malicious software and used remotely by fraudsters as part of a botnet (robot network).

For the uninitiated, the title of this chapter is a pun on David Frankel’s film The Devil Wears Prada (2006). For those too young to remember, a Lada is the colloquial term for a car based on a box-like Fiat 124 design that was manufactured by the Russian Lada Car Company in the 1970s and 1980s. This chapter develops the discussion found in the first section of Wall (2011[2008]).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 16.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Barlow, John Perry. (1996). A declaration of the independence of cyberspace. John Perry Barlow Library. Available at https://projects.eff.org/~barlow/Declaration-Final.html [accessed June 2011].

    Google Scholar 

  • Baudrillard, Jean. (1994). Simulacra and Simulation. Ann Arbor: University of Michigan Press.

    Google Scholar 

  • Baudrillard, Jean. (1998). The Consumer Society: Myths and Structures. London: Sage.

    Google Scholar 

  • Beck, Ulrich. (1992). Risk Society: Towards a New Modernity. New Delhi: Sage.

    Google Scholar 

  • Bell, Daniel. (2001). An Introduction to Cybercultures. London: Routledge.

    Google Scholar 

  • Bethke, Bruce. (1997). The etymology of ‘cyberpunk’. Available at http://www.brucebethke.com/articles/re_cp.html [accessed June 2011].

    Google Scholar 

  • Burrows, Roger. (1997). Cyberpunk as social theory. In Sallie Westwood and John Williams (eds). Imagining Cities: Scripts, Signs and Memories. London: Routledge, 235–48.

    Google Scholar 

  • Davies, Nick. (2010). Flat Earth News. London: Chatto.

    Google Scholar 

  • Furedi, Frank. (1997). Culture of Fear: Risk Taking and the Morality of Low Expectation. London: Continuum.

    Google Scholar 

  • Furedi, Frank. (2002). Culture of Fear. London: Continuum.

    Google Scholar 

  • Furedi, Frank. (2006). What is distinct about our rules of fear? Leeds Social Sciences Institute Public Guest Lecture, Leeds, 23 October.

    Google Scholar 

  • Garland, David. (2001). The Culture of Control. Oxford: Oxford University Press.

    Google Scholar 

  • Garland, David. (2008). On the concept of moral panic. Crime Media Culture, 4(1), 9–30.

    Article  Google Scholar 

  • Gibson, William. (1982). Burning chrome. Omni Magazine, July. [Reproduced in William Gibson. (1986b). Burning Chrome. New York: Arbor House, 169–91.]

    Google Scholar 

  • Gibson, William. (1984). Neuromancer. London: Grafton.

    Google Scholar 

  • Gibson, William. (1986a). Count Zero. London: Grafton.

    Google Scholar 

  • Gibson, William. (1988). Mona Lisa Overdrive. London: Grafton.

    Google Scholar 

  • Giddens, Anthony. (1999). Runaway World: How Globalization Is Reshaping Our Lives. London: Profile Books.

    Google Scholar 

  • Glassner, Barry. (2009). Culture of Fear: Why Americans Are Afraid of the Wrong Things. New York: Basic Books.

    Google Scholar 

  • Gordon, Damian. (2010). Forty years of movie hacking: Considering the potential implications of the popular media representation of computer hackers from 1968 to 2008. International Journal of Internet Technology and Secured Transactions 2(1/2), 59–87.

    Article  Google Scholar 

  • Harvey, Brian. (1985). Computer hacking and ethics, ACM Select Panel on Hacking. Available at http://www.cs.berkeley.edu/~bh/hacker.html [accessed September 2011].

  • HOC. (2009). Press standards, privacy and libel, Second report of session 2009–10, Volume 2. Unprinted Evidence, House of Commons: Culture, Media and Sport Committee, HC 362-II, April. [Nick Davies’ evidence on Tuesday 21 April 2009, Q402–Q495, 125–49.] Available at http://www.publications.parliament.uk/pa/ cm200910/cmselect/cmcumeds/362/362ii.pdf [accessed June 2011].

    Google Scholar 

  • Home Office. (2010). Cyber Crime Strategy, Cm 7842, London: Office of Public Sector Information, March. Available at http://www.official-documents.gov.uk/document/cm78/7842/7842.pdf [accessed June 2011].

    Google Scholar 

  • Innes, M. (2004). Reinventing tradition? Reassurance, neighbourhood security and policing. Criminology and Criminal Justice 4(2), 151–71.

    Article  Google Scholar 

  • Innes, M. (2005). Why disorder matters? Antisocial behaviour and incivility as signals of risk. Paper given to the Social Contexts and Responses to Risk (SCARR) Conference, Kent, UK, 28–30 January. Available at http://www.kent.ac.uk/scarr/events/finalpapers/Innes.pdf [accessed June 2011].

    Google Scholar 

  • Jordan, Tim. (1999). Cyberpower: The Culture and Politics of Cyberspace and the Internet. London: Routledge.

    Book  Google Scholar 

  • Leyden, John. (2001). Haxploitation: the complete Reg guide to hackers in film. The Register, 3 August. Available at http://www.theregister.co.uk/2001/08/03/haxploitation_the_complete_reg_guide/ [accessed June 2011].

  • Leyden, John. (2007). Tiger team brings haxploitation to TV: Penetration testing telly show up against the Queen. The Register, 19 December. Available at http://www.theregister.co.uk/2007/12/19/tiger_team/ [accessed June 2011].

  • Longworth, Karina. (2007). Jean Baudrillard and American popular culture, International Journal of Baudrillard Studies, 4(3). Available at http://www.ubishops.ca/baudrillardstudies/vol4_3/v4–3-article58-longworth.html [accessed June 2011].

  • Mackenzie, Iain. (2011). Who loves the hacktivists? BBC News Online, 22 June. Available at http://www.bbc.co.uk/news/technology-13872755 [accessed June 2011].

    Google Scholar 

  • Mansfield-Devine, Steve. (2011). Hacktivism: Assessing the damage. Network Security, 2011(8), 5–13.

    Article  Google Scholar 

  • McLemee, S. (2007) Remember Baudrillard, Inside Higher Ed, 14 March. Available at http://www.insidehighered.com/views/mclemee/mclemee135 [accessed June 2011].

  • Mick, Jason. (2011). LulzSec, Anonymous declare ‘war’ on U.S., international gov’ts, banks. Daily Tech. Available at http://www.dailytech.com/LulzSec+Anonymous+Declare+War+on+US+International+Govts+Banks/article21952. htm [accessed June 2011].

  • Nissenbaum, Helen. (2004). Hackers and the contested ontology of cyberspace. New Media & Society 6(2), 195–217.

    Article  Google Scholar 

  • Orwell, George. (1990[1949]). 1984 Nineteen Eighty-Four. London: Penguin.

    Google Scholar 

  • Person, Lawrence. (1998). Notes toward a postcyberpunk manifesto. Nova Express 16. Available at http://project.cyberpunk.ru/idb/notes_toward_a_postcyberpunk_ manifesto.html [accessed June 2011].

  • ScienceDaily. (2010). Hackers at the Movies. ScienceDaily. 8 February. Available at http://www.sciencedaily.com/releases/2010/02/100205120215.htm [accessed June 2011].

  • Simon, Jonathan. (2007). Governing through Crime: How the War on Crime Transformed American Democracy and Created a Culture of Fear. New York: Oxford University Press.

    Google Scholar 

  • Stephenson, Neal. (1992). Snowcrash. London: ROC/Penguin.

    Google Scholar 

  • Sterling, Bruce. (1994). The Hacker Crackdown: Law and Disorder on the Electronic Frontier. London: Penguin.

    Google Scholar 

  • Taipale, Kim. (2006). Why can’t we all get along? How technology, security, and privacy can coexist in the digital age. In Jack Balkin, James Grimmelmann, Ethan Katz, Nimrod Kozlovski, Shlomit Wagman and Tal Zarsky (eds). Cybercrime: Digital Cops in a Networked Environment. New York: New York University Press, 151–83.

    Google Scholar 

  • Toffler, Alvin. (1970). Future Shock. New York: Bantam Books.

    Google Scholar 

  • Wall, David. (2007). Cybercrimes: The Transformation of Crime in the Information Age. Cambridge: Polity.

    Google Scholar 

  • Wall, David. (2008) [revised 2011]. Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information, Communication & Society 11(6), 861–84. Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1155155 [accessed June 2011].

    Article  Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2012 David S. Wall

About this chapter

Cite this chapter

Wall, D.S. (2012). The Devil Drives a Lada: The Social Construction of Hackers as Cybercriminals. In: Gregoriou, C. (eds) Constructing Crime. Palgrave Macmillan, London. https://doi.org/10.1057/9780230392083_2

Download citation

Publish with us

Policies and ethics