Abstract
By using social media and crime prevention through environmental design (CPTED) principles, issue motivated groups (IMGs) and non-government organizations (NGOs) can develop cyber defense mechanisms and security measures. In contrast to military and governments, non-state actors should not require secrecy to protect its interests—rather secrecy is counter to the aims and objectives of those organisations or groups. Subsequently, the greater the transparency of action, the better for organizations and groups working against hostile governments. This chapter examines the possibilities of using social media and CPTED principles to enable issue motivated groups and non-government organizations to develop cyber defenses against hostile governments or agent provocateurs. It illustrates some possibilities and options available including using social media platforms and mixed technological networks. A central element to developing cyber defense is ensuring the online spaces are designed and administrated in a manner that allows users a sense of inclusiveness, transparency and security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Anonymous (2011) Guide to protecting the Tunisian revolution, part one: initial security. https://www.youtube.com/watch?v=imvfXtTkZv8
Blake M (2015) Agent provocateur? PETA claims SeaWorld employee infiltrated protests. https://www.rt.com/usa/273676-seaworld-spy-peta-protests/
Crider J (2015) Social media and protest movements. Number 13, Fall p 1. https://pdfs.semanticscholar.org/cc7f/689a495aeaba7cb99cfabc255b5b8696eced.pdf
Demidov O (2011) Social networks in international and national security. Security Index No 1 18(98):24
Heid B (2011) How to identify an agent provocateur. http://takethesquare.net/2011/08/14/how-to-identify-an-agent-provocateur/
Howard P, Hussain M (2013) Information infrastructure and the organisation of protest in democracy’s forth wave?: digital media and the Arab spring, Oxford Scholarship Online May
Jose V (2010) Accidential activists: using facebook to drive change. J Int Aff Fall 64:177–180
Papic M, Noonan S (2011) Social media as a tool for protest, Stratfor. https://www.stratfor.com/weekly/20110202-social-media-tool-protest
Phair N (2012) Cutting cybercrime is a question of smart design. The Conversation. https://theconversation.com/cutting-cybercrime-is-a-question-of-smart-design-9013
Stalder F (2012) Anonymous power. https://snuproject.wordpress.com/2012/02/22/anonymous-power-by-felix-stalder-via-viewpoint/
State of Queensland, Australia (2007) Crime prevention through environmental design guidelines for Queensland. https://www.police.qld.gov.au/programs/cscp/safetyPublic/Documents/CPTEDPartA.pdf
Sutton A, David T, Shane M, Fiona B (1998) Internet crime prevention paper presented at the conference: internet crime held in Melbourne, 16–17 February 1998, by the Australian Institute of Criminology. http://www.aic.gov.au/media_library/conferences/internet/sutton.pdf
Tormsen D (2015) 10 authoritarian government attempts to control the internet. http://listverse.com/2015/07/16/10-authoritarian-government-attempts-to-control-the-internet/
Watson S (2014) US protests infiltrated by agents provocateurs: undercover cops attempt to incite crime, pull gun on #ICan’tBreathe Protesters. http://www.globalresearch.ca/us-protests-infiltrated-by-agents-provocateurs-undercover-cops-attempt-to-incite-crime-pull-gun-on-icantbreathe-protesters/5419449
Whitford T, Prunckun H (2017) Discreet not covert: reflections on teaching intelligence analysis in a non-government setting. Salus J 5(1):4861
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Whitford, T. (2018). Cyber Defense for IMGs and NGOs Using Crime Prevention Through Environmental Design. In: Prunckun, H. (eds) Cyber Weaponry. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-74107-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-74107-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-74106-2
Online ISBN: 978-3-319-74107-9
eBook Packages: Law and CriminologyLaw and Criminology (R0)