Document Type : Research Paper

Authors

1 Criminal law and Criminology. Faculty of Law and Political Sciences, Ferdowsi University of Mashhad. Mashhad, Iran

2 Full Professor of Criminal Law and Criminology, Ferdowsi University of Mashhad,Iran

3 Criminal law and Criminology. Faculty of Law and Political Sciences, Ferdowsi University of Mashhad. ,Iran

Abstract

This study places itself within the scope of cultural criminology approach, a multidisciplinary research field that explores crime and reactions to its control from an anarchist view. Cultural criminology places the issues of meaning in the hearts of its studies. Cultural criminologists propose that both crime and its control operate as cultural processes. In this theoretical approach, crime and its control are conceptualized as creative cultural products which are changing in the dynamics of social interactions. It examines how the meaning of crime and its control is continuously constructed in the nonlinear cultural, criminal, and crime control processes. It focuses on the convergence of criminal subcultures, control agents and media processes. For cultural criminologists, the media-based images of crime are one of the main sources of mediated constructions of meaning. They emphasize the centrality of media representations in the construction of crime. In this regard, it chooses an interdisciplinary approach with sociological criminology, cultural studies and media Criminology.
This study sought to analyze the media-constructed lived experience of Iranian hackers by using the theoretical approach of cultural criminology. Cultural criminologists draw attention, particularly mainstream variants of criminology, to the fact that the crime control agencies are not the only creators of the meaning of crime and its control. Proposing the idea of commodification and hall of mirrors, they argue that the media representations of criminals and criminal events become a tool for creating the meaning of crime. These images create and consume by criminals, criminal subcultures and control agents. In today's highly controlled world which subcultures become marginalized, media representations become significant, exceptional sources for creating deviant subcultural reality. These images are continuously recycling and reproducing by control agents and subcultures and even other media images. Hence, we are being surrounded in a world in which saturated by different, nonhomogeneous images of crime and its control.
This research is accomplished via anarchist methodology of cultural criminology. To this end, we have used the ethnographic content analysis (­ECA­) developed by David Altheide (1980s) and virtual ethnography of hacker subculture. Due to the qualitative nature of the research, the Blue Whale television series were analyzed by using the purposive sampling method. Researches conducted in this area must focus not only on the everyday media images, but also on the complex set of reciprocal and interdependent subcultural relationships which together constitute the dynamic meaning of crime. In this regard, in the subcultural studies section, fifty-four in-depth, semi-structured interviews were conducted with hackers during the six months, and their behaviors were simply observed. All data were coded and analyzed using MAXQDA software.
Our findings indicated that the meaning of the hacking is also created through the consumption of media products. Entertainment media can represent the real dimensions of criminal subcultures in the form of attractive media products. In many ways, Blue Whale blend the real-life and movie created footage and blurs the lines between reality and fantasy. The hacker represents a personality similar to many young people, which can evoke audience emotion. According to our virtual ethnography research, some hackers are students or graduates of various fields, especially computers, who suffer from economic problems like the character of the hacker shown in this series. They are humiliated by powerful adults and at the same time, have a creative mind. The fictional hacker of this film, like many hackers in the real world, feels prosperous and empowered by taking risks as part of edgework activities. The combination of skill, creative impulsive behavior, and economic problems lead the hacker to greater ambitions in the criminal profession, and finally, the metaphorical incident of the death of the whale occurs. Moreover, the Blue Whale provides information about the lesser-known dimensions of criminal edge workers that the criminal justice system seeks to distort to prevent delinquency. It also found that by representing parts of the realities of hackers' lived experiences and looping back to the content and form of previous media loops, the series screening a dystopia that provides the possibility of transcending established norms and rules of the life for the offender and the audience.

Keywords

Main Subjects

  •  

    • Aron, Raymond, Main Currents in Sociological Thought, 10th Publication, (Tehran: Elmi Farhangi Pub, 1390), In Persia.
    • Aghaei, Sara, (2018). "Using Cultural Criminology in Analysis Minor and Juvenile Delinquency by Relay on Carnival, Adrenaline and Second Life Concepts", Journal of Criminal Law and Criminology, 6,11, (1397), In Persia.
    • Allahverdi, Farhad; Farajiha, Mohammad, "Media Criminalization: Encoding and Decoding the Shock Documentary", Global Media Jurnal, 9, 1 (1393), In Persia.
    • Allahverdi, Farhad, The Approach of Cultural Criminology to the Youth Offences, Tarbiat Modares University, (1393), In Persia.
    • Beck, Ulrich, Risk Society: Towards a New Modernity, 1st Publication, (Tehran: Sales Pub, 1397), In Persia.
    • Farajiha, Mohammad, 'The Media Reflection of Crime', Social welfare, 6, 22 (1385), In Persia.
    • Garland, David, The Culture of Control: Crime and Social Order in Contemporary Society, 1st Publication, (Tehran: Mizan Pub, 1397), In Persia.
    • Jame Jam online. FATA police chief announced: Internet fraud accounts for 60% of cyber Crimes, Retrieved from ‌‌‌‌https://jamejamonline.ir/005B9F, Access date June 1, 2022, In Persia.
    • Marx, Karl; Engels, Friedrich, The German Ideology, 3rd publication (Tehran: Cheshmeh Pub, 1386), In Persia.
    • Maguire, ‏Mike; Morgan, Rod; Reiner, ‏Robert, Oxford Handbook of Criminology, 1st Vol, 1st Publication, (Tehran: Mizan Pub, 1389), In Persia.
    • Namvar Motlagh, Bahman, An Introduction to Intertextuality: Theories and Applications, 2end Publication, (Tehran: Sokhan Pub, 1394), In Persia.
    • Radio Goftogo, Decreasing the age of computer crimes/ the existence of hacker children under 10 years' old, Retrieved from http://seda.ir/sh/?3359432, Access date June 1, 2022, In Persia.
    • Sadeghi Fassaei, Soheila, "Beyond Conventional Approaches: Murder as Interaction", Sociological Review, 21, 2 (1395), In Persia.
    • Weber, Marx, The Protestant Ethic and the Spirit of Capitalism, 1st Publication, (Tehran: Elmi Farhangi Pub, 1385), In Persia.
    • Zeimaran, Mohammad, Jacques Derrida and the metaphysics of presence, (Tehran: Hermes Pub, 1379), In Persia.
    • Altheide, D. (1987). ‘Ethnographic content analysis’. Qualitative Sociology, 10(1), 65–
    • Braun, V., & Clarke, V. (2006). ‘Using thematic analysis in psychology’. Qualitative Research in Psychology, 3(2), 77–
    • Creswell, J. W. (2013). Qualitative Inquiry & Research Design: Choosing among Five Approaches (3rd ed.). California: SAGE.
    • (2019). CrowdStrike Annual Threat Report Details Attacker Insights and Reveals Industry’s First Adversary Rankings. Retrieved from https://www.crowdstrike.com/press-releases/crowdstrike-annual-threat-report-details-attacker-insights-and-reveals-industrys-first-adversary-rankings/. Access date June 1, 2022.
    • Chiesa, R., Ducci, S., & Ciappi, S. (2008). Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking. Florida: CRC Press.
    • Coleman, G. E. (2013). Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton, NJ: Princeton University Press.
    • Farrington, D.P. (1996). Understanding and Preventing Youth Crime.York: Joseph Rowntree Foundation.
    • Ferrell, J. (1997). ‘Criminological verstehen: Inside the immediacy of crime’. Justice Quarterly, 14 (1), 3-23.
    • Ferrell, J. (1999). ‘Cultural Criminology’. Annual Review of Sociology, 25, 395-418.
    • Ferrell, J. (2010). Cultural criminology: The loose can(n)on. In: McLaughlin E, and Newburn, T. (eds). SAGE Handbook of Criminological Theory. London: SAGE.
    • Ferrell, J. (2013). ‘Cultural Criminology and the Politics of Meaning’. Critical Criminology: An International Journal, 21(3), 257–271
    • Ferrell, J. & Sanders, C. R. (1995). Culture, Crime and Criminology. In J. Ferrell, & C. R. Sanders(Eds.),Cultural Criminology (pp. 169-190). Boston: Northeastern University Press.
    • Ferrell, , Hayward, ‏K., & Young, ‏J. (2008). Cultural Criminology: An Invitation. London: SAGE.
    • Feyerabend, P. (1993). Against Method. London: Verso.
    • Hayward, K., & Young, J. (2012). Cultural Criminology. In M. Maguire, Morgan, & R. Reiner (Eds.), The Oxford Handbook of Criminology (5th ed.) (pp. 113-138). Oxford University Press.
    • Goldsmith, A., & Wall, D. S. (2019). ‘The seductions of cybercrime: Adolescence and the thrills of digital transgression’. European Journal of Criminology, 17, 1-20.
    • Gove, W. R. (1994). ‘Why we do what we do: A biopsychosocial theory of human motivation’. Social Forces, 73 (2), 363–
    • Hall, S. (1980). ‘Cultural studies: two paradigms’. Media, Culture & Society, 2(1), 57–
    • Hayward, K, (2010). Opening the lens: Cultural criminology and the image. In Hayward, K., & Presdee, M (Eds.), Framing Crime: Cultural Criminology and the Image (pp. 1-16). Oxford, UK: Routledge.
    • Hayward, K. (2012). ‘Five Spaces of Cultural Criminology’. The British Journal of Criminology, 52 (3), 441–
    • Hayward, K., & Young, J. (2004). ‘Cultural criminology: Some notes on the script’, Theoretical Criminology, 8(3), 259–
    • Hayward, K., & Young, J. (2012). Cultural Criminology. In M. Maguire, Morgan, & R. Reiner (Eds.), The Oxford Handbook of Criminology (5th ed.) (pp. 113-138). Oxford University Press.
    • Hayward, K., & Schuilenburg, M. B. (2014). To Resist = to Create? Some Thoughts on the Concept of Resistance in Cultural Criminology. Tijdschrift over cultuur & criminaliteit, 4(1), 22-36.
    • Hollander, J., & Einwohner, R. (2004). Conceptualizing resistance. Sociological Forum, 19(4), 533-554.
    • Holt, T. J. (2005). Hacks, cracks, and crime: an examination of the subculture and social organization of computer hackers. Ph.D. Thesis, University of Missouri-St. Louis, St. Louis, MO.
    • Holt, T. J. (2010). Becoming a Computer Hacker: Examining the Enculturation and Development of Computer Deviants. In P. Cromwell (Eds.), Their Own Words: Criminals on Crime: An Anthology (pp.109–23). Roxbury Publishing.
    • Jordan, T., & Taylor, P. (1998). ‘A Sociology of Hackers’. The Sociological Review, 46(4), 757–
    • Lyng, S. (1990). ‘Edgework: A Social Psychological Analysis of Voluntary Risk Taking’. American Journal of Sociology, 95(4), 851–
    • Manning, P. (1998). Media loops. In K. Hayward. (Ed.), Cultural Criminology (pp 210-224). Oxford, UK: Routledge.
    • Merton, R. K. (1938). ‘Social Structure and Anomie’. American Sociological Review, 3(5), 672–
    • Merton, R. (1957). Social Theory and Social Structure. New York: Free Press.
    • Presdee, M. (2004). ‘Cultural Criminology: The Long and Winding Road’. Theoretical Criminology, 8(3), 275–
    • Richards, I., & Wood, M.A. (2018). ‘Hacktivists against terrorism: A cultural criminological analysis of Anonymous' anti-IS campaigns’. International Journal of Cyber Criminology, 12(1): 187–
    • Saldaña, Johnny. (2013). The Coding Manual for Qualitative Researchers. California: SAGE.
    • Sibley, D.A (2002). Geographies of exclusion: Society and difference in the West. London: Routledge.
    • Taylor, P. A. (2005b). ‘From Hackers to Hacktivists: Speed Bumps on the Global Superhighway?’ New Media & Society, 7(5), 625–
    • Steinmetz, K. (2016). Hacked: A Radical Approach to Hacker Culture and Crime. New York: New York University Press.
    • Tunnell, K. (1992). ‘Film at Eleven: Recent Developments in the Commodification of Crime’. Sociological Spectrum, 12, 293–
    • Taylor, P. A. (2005b). ‘From Hackers to Hacktivists: Speed Bumps on the Global Superhighway?’ New Media & Society, 7(5), 625–
    • Weber, M. (1978). Economy and Society: An Outline of Interpretive Sociology. Berkeley: University of California Press.
    • Yar, M. (2010).Screening crime: Cultural criminology goes to the movies. In: Hayward, K.J., Presdee, M. (Eds.) Framing Crime: Cultural Criminology and the Image. London: Routledge.