Advertisement

Cyber Defense for IMGs and NGOs Using Crime Prevention Through Environmental Design

  • Troy Whitford
Chapter
Part of the Advanced Sciences and Technologies for Security Applications book series (ASTSA)

Abstract

By using social media and crime prevention through environmental design (CPTED) principles, issue motivated groups (IMGs) and non-government organizations (NGOs) can develop cyber defense mechanisms and security measures. In contrast to military and governments, non-state actors should not require secrecy to protect its interests—rather secrecy is counter to the aims and objectives of those organisations or groups. Subsequently, the greater the transparency of action, the better for organizations and groups working against hostile governments. This chapter examines the possibilities of using social media and CPTED principles to enable issue motivated groups and non-government organizations to develop cyber defenses against hostile governments or agent provocateurs. It illustrates some possibilities and options available including using social media platforms and mixed technological networks. A central element to developing cyber defense is ensuring the online spaces are designed and administrated in a manner that allows users a sense of inclusiveness, transparency and security.

Keywords

Cyber defense Non-government organizations Issue motivated groups Crime prevention through environmental design NGO CPTED 

References

  1. Anonymous (2011) Guide to protecting the Tunisian revolution, part one: initial security. https://www.youtube.com/watch?v=imvfXtTkZv8
  2. Blake M (2015) Agent provocateur? PETA claims SeaWorld employee infiltrated protests. https://www.rt.com/usa/273676-seaworld-spy-peta-protests/
  3. Crider J (2015) Social media and protest movements. Number 13, Fall p 1. https://pdfs.semanticscholar.org/cc7f/689a495aeaba7cb99cfabc255b5b8696eced.pdf
  4. Demidov O (2011) Social networks in international and national security. Security Index No 1 18(98):24Google Scholar
  5. Heid B (2011) How to identify an agent provocateur. http://takethesquare.net/2011/08/14/how-to-identify-an-agent-provocateur/
  6. Howard P, Hussain M (2013) Information infrastructure and the organisation of protest in democracy’s forth wave?: digital media and the Arab spring, Oxford Scholarship Online MayGoogle Scholar
  7. Jose V (2010) Accidential activists: using facebook to drive change. J Int Aff Fall 64:177–180Google Scholar
  8. Papic M, Noonan S (2011) Social media as a tool for protest, Stratfor. https://www.stratfor.com/weekly/20110202-social-media-tool-protest
  9. Phair N (2012) Cutting cybercrime is a question of smart design. The Conversation. https://theconversation.com/cutting-cybercrime-is-a-question-of-smart-design-9013
  10. State of Queensland, Australia (2007) Crime prevention through environmental design guidelines for Queensland. https://www.police.qld.gov.au/programs/cscp/safetyPublic/Documents/CPTEDPartA.pdf
  11. Sutton A, David T, Shane M, Fiona B (1998) Internet crime prevention paper presented at the conference: internet crime held in Melbourne, 16–17 February 1998, by the Australian Institute of Criminology. http://www.aic.gov.au/media_library/conferences/internet/sutton.pdf
  12. Tormsen D (2015) 10 authoritarian government attempts to control the internet. http://listverse.com/2015/07/16/10-authoritarian-government-attempts-to-control-the-internet/
  13. Watson S (2014) US protests infiltrated by agents provocateurs: undercover cops attempt to incite crime, pull gun on #ICan’tBreathe Protesters. http://www.globalresearch.ca/us-protests-infiltrated-by-agents-provocateurs-undercover-cops-attempt-to-incite-crime-pull-gun-on-icantbreathe-protesters/5419449
  14. Whitford T, Prunckun H (2017) Discreet not covert: reflections on teaching intelligence analysis in a non-government setting. Salus J 5(1):4861Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Charles Sturt UniversityCanberraAustralia

Personalised recommendations