Problems in Investigating and Prosecuting Hackers from Abroad under Thai Laws

Authors

  • Kitsuron Sangsuvan Independent Scholar

DOI:

https://doi.org/10.14456/mfulj.2022.7

Keywords:

Hacking, Cybercrime, Hacker

Abstract

The objective of this research is to study and analyze the problems in investigating and prosecuting foreign hackers under Thai laws. Qualitative research has been used as a methodological approach in this research. It has relied on relevant regulations, books, research articles, academic articles, reports, and news from around the world. Knowledge or information based on those documents has been used to analyze the problems and establish conceptions.

This research found that the problems do not result from the Computer-related Crime Act B.E. 2550 (2007). In fact, this Act is the effective regulation. However, the problems result from Thai officers themselves. They do not have sufficient knowledge and capabilities to investigate and prosecute hackers from abroad. In addition, the problems involve the investigation and collection of digital evidence located in other countries. This process has to rely on the Act on Mutual Assistance in Criminal Matters B.E. 2535 (1992). The problems also include the extradition of foreign hackers under the Extradition Act, B.E. 2551 (2008).

This research offers the resolutions of the problems. Those may include the development of officers’ capabilities, participation in international cooperation, and a decrease in legal processes.

Downloads

References

กระทรวงการต่างประเทศ, การแลกเปลี่ยนสัตยาบันสารสนธิสัญญาระหว่างราชอาณาจักรไทยกับยูเครนว่าด้วยความช่วยเหลือซึ่งกันและกันทางกฎหมายในเรื่องทางอาญา, [ออนไลน์], แหล่งที่มา: https://www.mfa.go.th/th/content/5d5bd27c15e39c3060029b77

เกชา สุขรมย์. การส่งผู้ร้ายข้ามแดน: วิธีเอาตัวผู้กระทำผิดที่หลบหนีในต่างประเทศกลับมาเพื่อดำเนินคดีหรือลงโทษ [ออนไลน์], แหล่งที่มา: https://www.fad.go.th/th/articles/108431

ข่าวไทยพีบีเอส, ดีอีเอส ล่าแฮ็กเกอร์ขโมยข้อมูล รพ. เพชรบูรณ์ - ปูดกองทัพโดนด้วย [ออนไลน์], แหล่งที่มา: https://news.thaipbs.or.th/content/307715

จิตชนก อินถามา และวงศ์ยศ เกิดศรี, การศึกษาแนวทางการตรวจพิสูจน์หลักฐานทางดิจิทัลในงานนิติวิทยาศาสตร์, วารสารวิชาการอาชญาวิทยาและนิติวิทยาศาสตร์โรงเรียนนายร้อยตำรวจ, ปีที่ 7 ฉบับที่ 1 (มิถุนายน 2564).

ไทยรัฐ ออนไลน์, รพ. เพชรบูรณ์แจงหลังถูกแฮ็ก ยันข้อมูลที่หลุดไม่กระทบต่อการรักษาคนไข้ [ออนไลน์], แหล่งที่มา: https://www.thairath.co.th/news/society/2187423

ผู้จัดการออนไลน์, แฉ! กลโกงดูดเงินผ่าน “บัตรตี๊ด” บัตรอยู่ในกระเป๋าก็แฮ็กข้อมูลได้ [ออนไลน์], แหล่งที่มา: https://mgronline.com/specialscoop/detail/9640000103836

พงศ์กุลธร โรจน์วิรุฬห์ วีรพล กุลบุตร และชวนัสถ์ เจนการ, ปัญหาและอุปสรรคในการดำเนินความร่วมมือระหว่างประเทศในเรื่องทางอาญาในกลุ่มประเทศอาเซียน, วารสารกระบวนการยุติธรรม, ปีที่ 11 ฉบับที่ 3 (กันยายน 2561).

Alaa Hussein Al-Hamami and Ghossoon M. Waleed Al-Saadoon, Handbook of Research on Threat Detection and Countermeasures in Network Security, First Edition (Hershey: Information Science Reference, 2014).

Alison Bisset, Truth Commissions and Criminal Courts, First Edition (New York: Cambridge University Press, 2012).

Andreas Mitrakas and Damian Zaitch, Law, Cyber Crime and Digital Forensics: Trailing Digital Suspects in Digital Crime and Forensic Science in Cyberspace, Edited by Panagiotis Kanellis and Others, First Edition (London: IDEA Group Publishing, 2006).

Apoorva Kaul, India and New Zealand Agree To Deepen Cooperation in Virtual Bilateral Cyber Dialogue [Online], Source: https://www.republicworld.com/world-news/rest-of-the-world-news/india-and-new-zealand-agree-to-deepen-cooperation-in-virtual-bilateral-cyber-dialogue.html

Balsing Rajput, Cyber Economic Crime in India: An Integrated Model for Prevention and Investigation, First Edition (Cham: Springer, 2021).

Carlson Anyangwe, Criminal Law: The General Part, First Edition (Bamenda: Langaa RPCIG, 2015).

Catherine D. Marcum, Cyber Crime, Second Edition (New York: Wolters Kluwer, 2019).

Christina Voigt, Up in the Air: Aviation, the EU Missions Trading Scheme and the Question of Jurisdiction in Cambridge Yearbook of European Legal Studies, Edited by Catherine Barnard, Markus Gehring, and Iyiola Solanke, First Edition (Oregon: Hart Publishing, 2012).

Christopher Wray, The FBI and the Private Sector: Battling the Cyber Threat Together [Online], Source: https://www.fbi.gov/news/speeches/the-fbi-and-the-private-sector-battling-the-cyber-threat-together-012821

Council of Europe, Budapest Convention [Online], Source: https://www.coe.int/en/web/impact-convention-human-rights/convention-on-cybercrime#/

Council of Europe, Convention on Cybercrime [Online], Source: https://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680081561

Danielle Ireland-Piper, Extraterritoriality in East Asia: Extraterritorial Criminal Jurisdiction in China, Japan, and South Korea, First Edition (Massachusetts: Edward Elgar Publishing, 2021).

David J. Engebretson, Technician’s Guide to Physical Security Networking: Enterprise Solutions, First Edition (Indiana: Author House, 2008).

Don Kerr, John Gammack, and Richard Boddington, Overview of Digital Business Security Issues in Digital Business Security Development: Management Technologies, Edited by Don Kerr, John G. Gammack, and Kay Bryant, First Edition (New York: Business Science Reference, 2010).

Harshit Yadav and Others, Various Types of Cybercrime and Its Affected Area in Emerging Technologies in Data Mining and Information and Security, Edited by Joao Manuel R.S. Tavares and Others, First Edition (Cham: Springer, 2021).

Hiromi Sato, Multilayered Structures of International Criminal Law, First Edition (Cham: Springer, 2021).

IBM, What is A Cyber Attack? [Online], Source: https://www.ibm.com/topics/cyber-attack

IIias Bantekas and Susan Nash, International Criminal Law, Third Edition (New York: Routledge, 2009).

James E. Girard, Criminalistics, Fifth Edition (Burlington: World Headquarters, 2021).

Jason Sachowski, Implementing Digital Forensic Readiness: From Reactive to Proactive Process, Second Edition (New York: CRC Press, 2019).

Joakim Kavrestad, Fundamentals of Digital Forensics: Theory, Methods, and Real-Life Applications, First Edition (Cham: Springer, 2020).

Joanna Harrington, Extradition of Transnational Criminals in Routledge Handbook of Transnational Criminal Law, Edited by Neil Boister and Robert J. Currie, First Edition (New York: Routledge, 2015).

John E. Hess, Interrogation for Law Enforcement, Second Edition (New Jersey: Matthew Bender & Company, Inc., 2010).

Joseph Migga Kizza, Computer Network Security and Cyber Ethics, Fourth Edition (North Carolina: McFarland & Company, 2014).

Kamlesh K. Bajaj and Debjani Nag, E-Commerce: The Cutting Edge of Business, Second Edition (New Delhi: Tata McGraw-Hill Publishing Company Limited, 2005).

Kevin Hile, Cybercrime, First Edition (Massachusetts: Cengage Learning, 2010).

Klaus von Lampe, Transnational Crime in International and Transnational Crime and Justice, Edited by Mangai Natarajan, Second Edition (New York: Cambridge University Press, 2019).

Larry Mays Jeremy Ball and Laura Fidelie, Criminal Law: Core Concepts, First Edition (New York: Wolters Kluwer Law & Business, 2015).

Legal Information Institute (LII), Extradition [Online], Source: https://www.law.cornell.edu/wex/extradition#:~:text=Extradition%20is%20the%20removal%20of,from%20one%20jurisdiction%20to%20another

Michael Abbell, Extradition to and from the United States 2010, First Edition (Boston: Martinus Nijhoff, 2010).

Michael Eck, The Internet: Inside and Out, First Edition (New York: Rosen Publishing Group, 2002).

Mikaila Mariel Lemonik, Law and Justice around the World: A Comparative Approach, First Edition (Oakland: University of California Press, 2020).

Raja Jabir and Omar Alfandi, Cloud Digital Forensics Evaluation and Crimes Detection in Emerging Technologies for Developing Countries: First International EAI Conference, AFRICATEK 2017 Marrakech, Morocco, March 27-28, 2017 Proceedings, Edited by Fatna Belqasmi and Others, First Edition (Cham: Springer, 2017).

Richard Boddington, Practical Digital Forensics, First Edition (Birmingham: Packt Publishing. 2016).

Richard Lovely, Cybercrime in International Crime and Justice, Edited by Mangai Natarajan, First Edition (New York: Cambridge University Press, 2011).

Ross M. Gardner and Donna R. Krouskup, Practical Crime Scene Processing and Investigation, Third Edition (London: CRC Press, 2018).

Samuel C. McQuade, Encyclopedia of Cybercrime, First Edition (London: Greenwood Press, 2008).

Sasa Mrdovic, IoT Forensics in Security of Ubiquitous Computing Systems: Selected Topics, Edited by Gildas Avoine and Julio Hernandez-Castro, First Edition (Cham: Springer, 2021).

Sean Lyngaas, Russian Accused of Being Part of Cybercrime Ring Extradited from South Korea to Ohio [Online], Sources: https://edition.cnn.com/2021/10/28/politics/russian-extradited-south-korea-ohio/index.html

Steve Bunting and Steve Anson, Mastering Windows Network Forensics and Investigation, First Edition (Indiana: Wiley Publishing Inc, 2007).

Susan W. Brenner, Cyberthreats and the Decline of the Nation-State, First Edition (New York: Routledge, 2014).

Thomas J. Holt, Adam M. Bossler, and Kathryn C. Seigfried-Spellar, Cybercrime and Digital Forensics: Introduction, First Edition (New York: Routledge, 2015).

Tine Munk, Policing Virtual Spaces: Public and Private Online Challenges in A Legal Perspective in Comparative Policing Form a Legal Perspective, Edited by Monica den Boer, First Edition (Cheltenham: Edward Elgar Publishing, 2018).

United Nations Office on Drugs and Crime (UNODC), Obstacles to Cybercrime Investigations [Online], Source: https://www.unodc.org/e4j/en/cybercrime/module-5/key-issues/obstacles-to-cybercrime-investigations.html

Ziska Fields, Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution, First Edition (Hershey: IGI Global, 2018).

Downloads

Published

01.07.2022

How to Cite

Sangsuvan, Kitsuron. 2022. “Problems in Investigating and Prosecuting Hackers from Abroad under Thai Laws”. Mae Fah Luang University Law Journal 5 (2):49-90. https://doi.org/10.14456/mfulj.2022.7.