Abstract
A senior police officer recently described to me a serious dilemma that he had just faced. The officer had received reliable intelligence that a serious financial crime had been committed by an East European Mafia group using a computer located within his police force area. Early one morning, anticipating stiff resistance, he sent an armed unit to the house containing the computer. After breaking down the door, his officers were shocked to find a sleepy breakfasting family, rather than the violent mafia gang they had expected to meet. On this occasion, the police had chosen the wrong course of action, because the family’s computer had been infected by malicious software and used remotely by fraudsters as part of a botnet (robot network).
For the uninitiated, the title of this chapter is a pun on David Frankel’s film The Devil Wears Prada (2006). For those too young to remember, a Lada is the colloquial term for a car based on a box-like Fiat 124 design that was manufactured by the Russian Lada Car Company in the 1970s and 1980s. This chapter develops the discussion found in the first section of Wall (2011[2008]).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barlow, John Perry. (1996). A declaration of the independence of cyberspace. John Perry Barlow Library. Available at https://projects.eff.org/~barlow/Declaration-Final.html [accessed June 2011].
Baudrillard, Jean. (1994). Simulacra and Simulation. Ann Arbor: University of Michigan Press.
Baudrillard, Jean. (1998). The Consumer Society: Myths and Structures. London: Sage.
Beck, Ulrich. (1992). Risk Society: Towards a New Modernity. New Delhi: Sage.
Bell, Daniel. (2001). An Introduction to Cybercultures. London: Routledge.
Bethke, Bruce. (1997). The etymology of ‘cyberpunk’. Available at http://www.brucebethke.com/articles/re_cp.html [accessed June 2011].
Burrows, Roger. (1997). Cyberpunk as social theory. In Sallie Westwood and John Williams (eds). Imagining Cities: Scripts, Signs and Memories. London: Routledge, 235–48.
Davies, Nick. (2010). Flat Earth News. London: Chatto.
Furedi, Frank. (1997). Culture of Fear: Risk Taking and the Morality of Low Expectation. London: Continuum.
Furedi, Frank. (2002). Culture of Fear. London: Continuum.
Furedi, Frank. (2006). What is distinct about our rules of fear? Leeds Social Sciences Institute Public Guest Lecture, Leeds, 23 October.
Garland, David. (2001). The Culture of Control. Oxford: Oxford University Press.
Garland, David. (2008). On the concept of moral panic. Crime Media Culture, 4(1), 9–30.
Gibson, William. (1982). Burning chrome. Omni Magazine, July. [Reproduced in William Gibson. (1986b). Burning Chrome. New York: Arbor House, 169–91.]
Gibson, William. (1984). Neuromancer. London: Grafton.
Gibson, William. (1986a). Count Zero. London: Grafton.
Gibson, William. (1988). Mona Lisa Overdrive. London: Grafton.
Giddens, Anthony. (1999). Runaway World: How Globalization Is Reshaping Our Lives. London: Profile Books.
Glassner, Barry. (2009). Culture of Fear: Why Americans Are Afraid of the Wrong Things. New York: Basic Books.
Gordon, Damian. (2010). Forty years of movie hacking: Considering the potential implications of the popular media representation of computer hackers from 1968 to 2008. International Journal of Internet Technology and Secured Transactions 2(1/2), 59–87.
Harvey, Brian. (1985). Computer hacking and ethics, ACM Select Panel on Hacking. Available at http://www.cs.berkeley.edu/~bh/hacker.html [accessed September 2011].
HOC. (2009). Press standards, privacy and libel, Second report of session 2009–10, Volume 2. Unprinted Evidence, House of Commons: Culture, Media and Sport Committee, HC 362-II, April. [Nick Davies’ evidence on Tuesday 21 April 2009, Q402–Q495, 125–49.] Available at http://www.publications.parliament.uk/pa/ cm200910/cmselect/cmcumeds/362/362ii.pdf [accessed June 2011].
Home Office. (2010). Cyber Crime Strategy, Cm 7842, London: Office of Public Sector Information, March. Available at http://www.official-documents.gov.uk/document/cm78/7842/7842.pdf [accessed June 2011].
Innes, M. (2004). Reinventing tradition? Reassurance, neighbourhood security and policing. Criminology and Criminal Justice 4(2), 151–71.
Innes, M. (2005). Why disorder matters? Antisocial behaviour and incivility as signals of risk. Paper given to the Social Contexts and Responses to Risk (SCARR) Conference, Kent, UK, 28–30 January. Available at http://www.kent.ac.uk/scarr/events/finalpapers/Innes.pdf [accessed June 2011].
Jordan, Tim. (1999). Cyberpower: The Culture and Politics of Cyberspace and the Internet. London: Routledge.
Leyden, John. (2001). Haxploitation: the complete Reg guide to hackers in film. The Register, 3 August. Available at http://www.theregister.co.uk/2001/08/03/haxploitation_the_complete_reg_guide/ [accessed June 2011].
Leyden, John. (2007). Tiger team brings haxploitation to TV: Penetration testing telly show up against the Queen. The Register, 19 December. Available at http://www.theregister.co.uk/2007/12/19/tiger_team/ [accessed June 2011].
Longworth, Karina. (2007). Jean Baudrillard and American popular culture, International Journal of Baudrillard Studies, 4(3). Available at http://www.ubishops.ca/baudrillardstudies/vol4_3/v4–3-article58-longworth.html [accessed June 2011].
Mackenzie, Iain. (2011). Who loves the hacktivists? BBC News Online, 22 June. Available at http://www.bbc.co.uk/news/technology-13872755 [accessed June 2011].
Mansfield-Devine, Steve. (2011). Hacktivism: Assessing the damage. Network Security, 2011(8), 5–13.
McLemee, S. (2007) Remember Baudrillard, Inside Higher Ed, 14 March. Available at http://www.insidehighered.com/views/mclemee/mclemee135 [accessed June 2011].
Mick, Jason. (2011). LulzSec, Anonymous declare ‘war’ on U.S., international gov’ts, banks. Daily Tech. Available at http://www.dailytech.com/LulzSec+Anonymous+Declare+War+on+US+International+Govts+Banks/article21952. htm [accessed June 2011].
Nissenbaum, Helen. (2004). Hackers and the contested ontology of cyberspace. New Media & Society 6(2), 195–217.
Orwell, George. (1990[1949]). 1984 Nineteen Eighty-Four. London: Penguin.
Person, Lawrence. (1998). Notes toward a postcyberpunk manifesto. Nova Express 16. Available at http://project.cyberpunk.ru/idb/notes_toward_a_postcyberpunk_ manifesto.html [accessed June 2011].
ScienceDaily. (2010). Hackers at the Movies. ScienceDaily. 8 February. Available at http://www.sciencedaily.com/releases/2010/02/100205120215.htm [accessed June 2011].
Simon, Jonathan. (2007). Governing through Crime: How the War on Crime Transformed American Democracy and Created a Culture of Fear. New York: Oxford University Press.
Stephenson, Neal. (1992). Snowcrash. London: ROC/Penguin.
Sterling, Bruce. (1994). The Hacker Crackdown: Law and Disorder on the Electronic Frontier. London: Penguin.
Taipale, Kim. (2006). Why can’t we all get along? How technology, security, and privacy can coexist in the digital age. In Jack Balkin, James Grimmelmann, Ethan Katz, Nimrod Kozlovski, Shlomit Wagman and Tal Zarsky (eds). Cybercrime: Digital Cops in a Networked Environment. New York: New York University Press, 151–83.
Toffler, Alvin. (1970). Future Shock. New York: Bantam Books.
Wall, David. (2007). Cybercrimes: The Transformation of Crime in the Information Age. Cambridge: Polity.
Wall, David. (2008) [revised 2011]. Cybercrime and the culture of fear: Social science fiction(s) and the production of knowledge about cybercrime. Information, Communication & Society 11(6), 861–84. Available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1155155 [accessed June 2011].
Editor information
Editors and Affiliations
Copyright information
© 2012 David S. Wall
About this chapter
Cite this chapter
Wall, D.S. (2012). The Devil Drives a Lada: The Social Construction of Hackers as Cybercriminals. In: Gregoriou, C. (eds) Constructing Crime. Palgrave Macmillan, London. https://doi.org/10.1057/9780230392083_2
Download citation
DOI: https://doi.org/10.1057/9780230392083_2
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-33540-4
Online ISBN: 978-0-230-39208-3
eBook Packages: Palgrave Media & Culture CollectionLiterature, Cultural and Media Studies (R0)