Cyber Defense for IMGs and NGOs Using Crime Prevention Through Environmental Design

  • Troy Whitford
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)


By using social media and crime prevention through environmental design (CPTED) principles, issue motivated groups (IMGs) and non-government organizations (NGOs) can develop cyber defense mechanisms and security measures. In contrast to military and governments, non-state actors should not require secrecy to protect its interests—rather secrecy is counter to the aims and objectives of those organisations or groups. Subsequently, the greater the transparency of action, the better for organizations and groups working against hostile governments. This chapter examines the possibilities of using social media and CPTED principles to enable issue motivated groups and non-government organizations to develop cyber defenses against hostile governments or agent provocateurs. It illustrates some possibilities and options available including using social media platforms and mixed technological networks. A central element to developing cyber defense is ensuring the online spaces are designed and administrated in a manner that allows users a sense of inclusiveness, transparency and security.


Cyber defense Non-government organizations Issue motivated groups Crime prevention through environmental design NGO CPTED 


  1. Anonymous (2011) Guide to protecting the Tunisian revolution, part one: initial security.
  2. Blake M (2015) Agent provocateur? PETA claims SeaWorld employee infiltrated protests.
  3. Crider J (2015) Social media and protest movements. Number 13, Fall p 1.
  4. Demidov O (2011) Social networks in international and national security. Security Index No 1 18(98):24Google Scholar
  5. Heid B (2011) How to identify an agent provocateur.
  6. Howard P, Hussain M (2013) Information infrastructure and the organisation of protest in democracy’s forth wave?: digital media and the Arab spring, Oxford Scholarship Online MayGoogle Scholar
  7. Jose V (2010) Accidential activists: using facebook to drive change. J Int Aff Fall 64:177–180Google Scholar
  8. Papic M, Noonan S (2011) Social media as a tool for protest, Stratfor.
  9. Phair N (2012) Cutting cybercrime is a question of smart design. The Conversation.
  10. State of Queensland, Australia (2007) Crime prevention through environmental design guidelines for Queensland.
  11. Sutton A, David T, Shane M, Fiona B (1998) Internet crime prevention paper presented at the conference: internet crime held in Melbourne, 16–17 February 1998, by the Australian Institute of Criminology.
  12. Tormsen D (2015) 10 authoritarian government attempts to control the internet.
  13. Watson S (2014) US protests infiltrated by agents provocateurs: undercover cops attempt to incite crime, pull gun on #ICan’tBreathe Protesters.
  14. Whitford T, Prunckun H (2017) Discreet not covert: reflections on teaching intelligence analysis in a non-government setting. Salus J 5(1):4861Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Charles Sturt UniversityCanberraAustralia

Personalised recommendations