Criminality New Script -
Routine activity theory (Cohen & Felson, 1979) must be re-specified. The “suitable target” is no longer just a person or property; it is a vulnerable API, a weak password hash, or an unpatched firmware . The “capable guardian” is not just a police officer or a neighbor; it is a firewall, an intrusion detection system, or a platform’s content moderation algorithm . The “motivated offender” may be a bot, a state-sponsored hacker, or a decentralized autonomous organization (DAO) of pseudonymous actors.
Criminologists have a choice: continue analyzing the old script as if it were the only one, or learn the new grammar of harm. This paper has argued for the latter. The new script does not replace the old—physical crimes still occur—but it increasingly dominates high-impact, high-volume, and transnational offending. If we fail to understand the script, we cede the stage to those who write it best: the offenders. Criminality New Script
A stalker uses a compromised smart lock (IoT device) to unlock a victim’s front door remotely. The intrusion is physical, but the means are purely digital. Conversely, a riot incited by a disinformation campaign on Telegram has digital origins but physical outcomes (looting, arson). Routine activity theory (Cohen & Felson, 1979) must
In high-frequency trading (HFT) fraud, a trader uses a latency arbitrage algorithm to front-run orders—not by lying, but by exploiting the microsecond differences in how exchanges process data. Is this theft? It feels like theft, but it looks like code. Similarly, an AI-generated child sexual abuse material (CSAM) may depict no real child, yet it trains on and perpetuates harm. The “motivated offender” may be a bot, a
Actor-Network Theory (Latour, 2005) becomes criminologically useful. Non-human actors (algorithms, smart contracts, blockchain validators) are actants that shape criminal outcomes. A poorly coded smart contract is not just a tool; it is a co-producer of the crime.