Found some extracts from the Adison-Wesley book Know Your Enemy:
Revealing the security tools, tactics and motives of the blackhat community
. This makes for some interesting reading .