Between Hackers and White-Collar Offenders

Between Hackers and White-Collar Offenders

Orly Turgeman-Goldschmidt (Bar-Ilan University, Israel)
Copyright: © 2012 |Pages: 20
DOI: 10.4018/978-1-61350-323-2.ch708
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Scholars often view hacking as one category of computer crime, and computer crime as white-collar crime. However, no study to date has examined the extent to which hackers exhibit the same characteristics as white-collar offenders. This chapter looks at empirical data drawn from 54 face-to-face interviews with Israeli hackers, in light of the literature in the field of white-collar offenders, concentrating on their accounts and socio-demographic characteristics. Hackers and white-collar offenders differ significantly in age and in their accounts. White-collar offenders usually act for economic gain; hackers act for fun, curiosity, and opportunities to demonstrate their computer virtuosity. Hackers, in contrast to white-collar offenders, do not deny their responsibility, nor do they tell a “sad tale.”
Chapter Preview
Top

Introduction

Today, the falsified ledger, long the traditional instrument of the embezzler, is being replaced by corrupted software programs. The classic weapons of the bank robber can now be drawn from a far more sophisticated arsenal containing such modern tools as automatic teller machines and electronic fund transfers. In short, white-collar crime has entered the computer age. (Rosoff, Pontell, & Tillman, 2002, p. 417)

The National Institute of Justice defines “computer crime” as any violation of criminal law that involves the knowledge of computer technology for their perpetration, investigation, or prosecution (NIJ, 2000). Computer crime is usually classified as white-collar crime (WCC), in which the perpetrators gain from offenses committed against individual victims or organizations and is usually done as part of someone’s occupational activity (Clinard & Quinney, 1973). According to Bequai (1987), computer crime is a part of WCC, since WCC is defined as unlawful activities characterized by fraud and deception, and no direct violence. McEwen (1989) claims that the advent and proliferation of computer crimes have become as costly as WCC, equally obscure in the public’s mind, and similarly underreported. Duff and Gardiner (1996) state that, due to the advent of computers, WCC has become more visible, with the media having an important role in presenting computer crimes as an acute social problem in the new information age. Recent publicized scandals in major corporations have increased public awareness to WCC (Holtfreter, Slyke, Bratton & Gertz, 2008). Duff and Gardiner claim that the “criminalizing of unauthorized access to computer systems, hacking, is one step in this process to the city of surveillance” (p. 212). Recently, Pontell and Rosoff (2009) labeled the term “white-collar delinquency” as the committing of computer crimes (such as piracy, securities fraud, auction fraud, espionage, and Denial of Service attacks) by middle and upper-class youthful offenders.

In this chapter, I view the phenomenon of hacking with regard to that of WCC to learn whether hacking should really be included in the same category. Duff and Gardiner (1996) argued that hacking should not be considered as criminal, and that most forms of hacking cannot be seen as WCC (p. 214). Other scholars, however, view hacking as one of the categories of computer crime (e.g., Rosoff et al., 2002), and computer crime generally as WCC (Bequai, 1987; Clinard & Quinney, 1973; Parker, 1989; Rosoff et al., 2002). No study to date, has been completed pairing hackers and white-collar offenders.

This chapter looks at empirical data drawn from interviews with Israeli hackers in light of the literature in the field of white-collar offenders, concentrating on socio-demographic characteristics and accounts. The roots of the term ‘account’ can be traced back to Mills’ work (1940), who claimed that vocabularies of motives are used to determine behaviors and expectations when faced by other people’s responses, regarding different situations (p. 911). “Account” is a statement made by a social actor to explain unanticipated or untoward behavior. An account is not called for when people engage in routine, commonsense behavior in a cultural environment that recognizes the particular behavior as such (Scott & Lyman, 1968, p. 46-7).

I refer to hackers as possible white-collar offenders on three dimensions: content, form, and structure. In the first dimension, the content of the accounts is examined; that is, the language offenders use to explain and justify their behavior to themselves and to others. The second dimension of form relates to whether hackers, as in WCC, employ the “techniques of neutralization” (Sykes & Matza, 1957; Scott & Lyman, 1968). The third dimension of structure deals with the construction of identity (i.e., the way hackers that structure their self-identity and their formation, relative to white-collar offenders).

Complete Chapter List

Search this Book:
Reset