The Howard Journal Vol 44 No 4. September 2005
ISSN 0265-5527, pp. 387–399
Just Another Case of
Lecturer in Criminology, School of Social Policy, Sociology and Social Research, University of Kent at Canterbury
Abstract: Recent discussions of computer ‘hacking’ make explicit reference to the disproportionate involvement of juveniles in this form of computer crime. While criminal justice, computer security, public and popular reﬂections on hacking seldom refer to formal criminological analyses of youth offending, they nonetheless offer a range of explanations for the over-representation of young people amongst computer hackers. Such accounts of hacking can be seen to converge with criminological analyses, by stressing a range of causal factors related to gender psychology, adolescent moral development, family dysfunction and peer-group and subcultural association. The homologies between ‘lay’, ‘administrative’, ‘expert’, ‘popular’ and criminological discourses, it is suggested, offer considerable scope for developing a critical, academically-informed, and policyoriented debate on young people’s participation in computer crime.
It has been noted that ‘youthfulness’ or ‘being a teenager’ appears as ‘a constant source of fascination and concern for politicians, media commentators and academic analysts’ (Muncie 1999, p.2), not least when involvement in supposedly ‘criminal’, ‘deviant’ and ‘anti-social’ activities is concerned. Whenever anxieties erupt about new threats to the moral and social order, ‘youth’ are seldom far away from the line-up of society’s ‘usual suspects’. Society’s perennial fascination with ‘youth and crime’ has itself become the object of sociological and criminological analysis, furnishing numerous explorations of the ways in which young people and their cultural commitments have become the ‘folk devils’ in successive waves of ‘moral panics’ about crime and disorder (Young 1971; Cohen 1972; Hall et al. 1978; Pearson 1983; Hay 1995; Springhall 1998). Since the 1990s, academic commentators have observed how the Internet has emerged as a new locus of criminal activity that has become the object of public and political anxieties, sometimes leading to over-reaction (Thomas and Loader 2000, p.8; Littlewood 2003). Yet again, the category of ‘youth’ has ﬁgured centrally in discussions of the threat, especially in relation to ‘computer hacking’, the unauthorised access to and manipulation of computer systems. Politicians, law enforcement ofﬁcials, computer security
r Blackwell Publishing Ltd. 2005, 9600 Garsington Road, Oxford OX4 2DQ, UK and 350 Main Street, Malden, MA 02148, USA
e xperts and journalists have identiﬁed ‘hacking’ as a form of criminal and deviant behaviour closely associated with ‘teenagers’ (see, inter alia, Bowker 1999; DeMarco 2001; Verton 2002). This association has been cemented in the realm of popular cultural representations, with Hollywood ﬁlms such as Wargames (1983) and Hackers (1995) constructing the hacker as a quintessentially teenage miscreant (Levi 2001, pp.46–7). While hacking in general has garnered considerable attention from academics working in the emergent ﬁeld of ‘cybercrime’ studies (see Taylor 1999, 2000, 2003; Thomas 2000), and some attention has been given to questions of youth (see Furnell 2002), few connections are made with the rich and extensive criminological literature of delinquency studies. On the other hand, those specialising in the study of youth crime and delinquency have largely neglected this apparently new area of juvenile offending (for an exception, see Fream and Skinner 1997). The aim of this article is not to offer such a new account of hacking as ‘juvenile delinquency’; nor is it to contest or ‘deconstruct’ the public and popular association between youth and computer crime. Rather, the article aims to map out the different modes of reasoning by which the purported involvement of...
References: Bandura, A. (1977) Social Learning Theory, Englewood Cliffs: Prentice-Hall.
Becker, H. (1963) Outsiders: Studies in the Sociology of Deviance, New York: Free Press.
Bowker, A. (1999) ‘Juveniles and computers: should we be concerned?’, Federal
Probation: A Journal of Correctional Philosophy and Practice, 63, 40–3.
Clarke, R. and Felson, M. (Eds.) (1993) Routine Activity and Rational Choice, London:
Clough, B. and Mungo, P. (1992) Approaching Zero: Data Crime in the Computer
Underworld, London: Faber and Faber.
Cloward, R. and Ohlin, L. (1961) Delinquency and Opportunity: A Theory of Delinquent
Gangs, London: Routledge.
Cohen, A. (1955) Delinquent Boys: The Culture of the Gang, New York: Free Press.
Cohen, S. (1972) Folk Devils and Moral Panics, London: Paladin.
Coldwell, R. (1993) ‘University students’ attitudes towards computer crime: a research
note’, Computers and Society, 23, 1–2.
Connell, R. (1987) Gender and Power, Cambridge: Polity Press.
DeMarco, J. (2001) It’s Not Just Fun and ‘‘War Games’’ – Juveniles and Computer Crime
(available online at: http://www.cybercrime.gov/usamay2001_7.htm (accessed on 1 June
Denning, D. (1991) ‘Hacker Ethics’, Proceedings of the 13th National Conference on
Computing and Values, New Haven: Research Centre on Computing and Society.
Dowland, P., Furnell, S., Illingworth, H. and Reynolds, P. (1999) ‘Computer crime
and abuse: a survey of public attitudes and awareness’, Computers and Security, 18,
Felson, M. (1998) Crime and Everyday Life, 2nd ed., Thousand Oaks, CA.: Pine Forge
Fitch, C. (2004) Crime and Punishment: The Psychology of Hacking in the New Millennium,
Bethesda, MD.: SANS Institute.
Flood-Page, C., Campbell, S., Harrington, V. and Miller, J. (2000) Youth Crime: Findings
from the 1998/00 Youth Lifestyle Survey (Home Ofﬁce Research Study No.209),
Fream, A. and Skinner, W. (1997) ‘Social learning theory analysis of computer crime
among college students’, Journal of Research in Crime and Delinquency, 34, 495–518.
Furnell, S. (2002) Cybercrime: Vandalizing the Information Society, London: Addison
Graham, J. and Bowling, B. (1995) Young People and Crime (Home Ofﬁce Research
Study No.145), London: Home Ofﬁce.
Grossman, W. (2001) From Anarchy to Power: The Net Comes of Age, New York: NYU
Hall, S. et al. (1978) Policing the Crisis, London: Macmillan.
Hay, C. (1995) ‘Mobilization through interpellation: James Bulger, juvenile crime and
the construction of a moral panic’, Social and Legal Studies, 4, 197–224.
Hirschi, T. (1969) Causes of Delinquency, Berkeley, CA.: University of California Press.
Hollin, C. (2002) ‘Criminological psychology’, in: M. Maguire, R. Morgan and
Jefferson, T. (1997) ‘Masculinities and crime’, in: M. Maguire, R. Morgan and
K, Dr (2004) Hackers Tales: Stories from the Electronic Front Line, London: Carlton Books.
Katz, J. (1988) The Seductions of Crime, New York: Basic Books.
Kovacich, G. (1999) ‘Hackers: freedom ﬁghters of the 21st century’, Computers and
Security, 18, 573–6.
Levi, P. (2001) ‘‘‘Between the risk and the reality falls the shadow’’: evidence and
urban legends in computer fraud’, in: D
Levy, S. (1984) Hackers: Heroes of the Computer Revolution, New York: Doubleday.
Littlewood, A. (2003) ‘Cyberporn and moral panic: an evaluation of press reactions to
pornography on the internet’, Library and Information Research, 27(86), 8–18.
Loeber, R. and Stouthamer-Loeber, M. (1986) ‘Family factors as correlates and
predictors of juvenile conduct problems and delinquency’, in: M
Maruna, S. (2001) Making Good: How Ex-Convicts Reform and Rebuild Their Lives,
Washington: American Psychological Association Books.
Mentor, The (1986) The Conscience of a Hacker (available online at: http://www.technozen.
com/manifesto.htm (accessed on 1 June 2004)).
Messerschmidt, J. (1993) Masculinities and Crime, Lanham: Rowan and Littleﬁeld.
Muncie, J. (1999) Youth and Crime: A Critical Introduction, London: Sage.
Naughton, J. (2000) A Brief History of the Future: The Origins of the Internet, London:
Pearson, G. (1983) Hooligan: A History of Respectable Fears, London: Macmillan.
Presdee, M. (2000) Cultural Criminology and the Carnival of Crime, London: Routledge.
Rogers, M. (2000) A New Hacker Taxonomy (available online at: http://www.cerias.purdue.
edu/homes/mkr/hacker.doc (accessed on 1 June 2004)).
Slatalla, M. and Quitner, J. (1996) Masters of Deception: The Gang That Ruled Cyberspace,
London: Harper Collins.
Springhall, J. (1998) Youth, Culture and Moral Panics: Penny Gaffs to Gangsta Rap,
1830–1996, London: Macmillan.
Sterling, B. (1994) The Hacker Crackdown: Law and Disorder on the Electronic Frontier,
Sutherland, E. and Cressey, D. (1974) Principles of Criminology, 9th ed., Philadelphia:
Sykes, G. and Matza, D. (1957) ‘Techniques of neutralization: a theory of delinquency’,
American Sociological Review, 22, 664–70.
Taylor, P. (1999) Hackers: Crime in the Digital Sublime, London: Routledge.
Taylor, P. (2000) ‘Hackers – cyberpunks or microserfs?’, in: D. Thomas and B. Loader
(Eds.), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age,
Taylor, P. (2003) ‘Maestros or misogynists? Gender and the social construction of
Please join StudyMode to read the full document