Abstract
This paper explores the legal challenges of combating cybercrime in Vietnam. We used a legal doctrine method to review the updated Vietnamese legal frameworks, consisting of substantive, procedural, and preventive cybercrime law. We then combined the analysis of four cybercrime cases and in-depth interviews of seven senior police officials to analyse the application of cybercrime law. The main findings reveal that by updating its legal system, Vietnam has shown a determination to prevent and disrupt cybercrime. Despite positive results, Vietnam’s fight against cybercrime still faces legal challenges, including traditional and novel ones. Moreover, active and flexible approaches within Vietnam’s cyberspace management can increase the effectiveness of combating cybercriminal activities; however, they can cause concerns in balancing cybercrime control and human rights protection. These approaches could then constitute a useful case study for other similar situations.
Similar content being viewed by others
References
Internetworldstats. (2020). World Internet usage and population statistics. https://internetworldstats.com/stats.htm#links
Google & Temasek. (2018). e-Conomy SEA 2018: Southeast Asia’s Internet economy hits an inflection point. https://www.thinkwithgoogle.com/_qs/documents/6730/Report_e-Conomy_SEA_2018_by_Google_Temasek_v.pdf
McAfee & CSIS. (2018). Economic impact of cybercrime – No slowing down. https://csis-prod.s3.amazonaws.com/s3fs-public/publication/economic-impact-cybercrime.pdf
Nguyen, T. V. (2020). Cybercrime in Vietnam: An analysis based on routine activity theory. International Journal of Cyber Criminology, 14(1), 156–173. https://doi.org/10.5281/zenodo.3747516
HTCP Department. (2010). Bao cao tong ket nam 2010 [Annual report 2010]
HTCP Department. (2013). Bao cao tong ket nam 2013 [Annual report 2013]
HTCP Department. (2014). Bao cao tong ket nam 2014 [Annual report 2014]
Nguyen, T., & Luong, H. T. (2020). The structure of cybercrime networks: Transnational computer fraud in Vietnam. Journal of Crime and Justice, 1–22.https://doi.org/10.1080/0735648X.2020.1818605
Nguyen, T. V. (2021). The modus operandi of transnational computer fraud: A crime script analysis in Vietnam. Trends in Organized Crime. https://doi.org/10.1007/s12117-021-09422-1
Goel, A. (2016). The great cyber game in South China Sea. https://cyware.com/news/the-great-cyber-game-in-south-china-sea-883f7f39?PageSpeed=noscript
HTCP Department. (2017). Bao cao tong ket nam 2017 [Annual report 2017]
Luong, H. T., Duc Phan, H., Chu, D. V., Nguyen, V. Q., Le, K. T., & Hoang, L. T. (2019). Understanding cybercrimes in Vietnam: From leading-point provisions to legislative system and law enforcement. International Journal of Cyber Criminology, 13(2), 290–308. https://doi.org/10.5281/zenodo.3700724
BSA. (2018). Software management: Security imperative, business opportunity. https://gss.bsa.org/wp-content/uploads/2018/05/2018_BSA_GSS_Report_en.pdf
Europol & Eurojust. (2019). Common challenges in combating cybercrime. https://www.europol.europa.eu/publications-documents/common-challenges-in-combating-cybercrime
FBI. (2013). Leader in $200 million international stolen data ring charged in New Jersey as part of worldwide takedown. https://archives.fbi.gov/archives/newark/press-releases/2013/leader-in-200-million-international-stolen-data-ring-charged-in-new-jersey-as-part-of-worldwide-takedown
UNODC. (2013). Comprehensive study on cybercrime - Draft. http://www.unodc.org/documents/organized-crime/UNODC_CCPCJ_EG.4_2013/CYBERCRIME_STUDY_210213.pdf
UNODC. (2019b). The role of cybercrime law. https://www.unodc.org/e4j/en/cybercrime/module-3/key-issues/the-role-of-cybercrime-law.html
INTERPOL. (2017). Global cybercrime strategy (summary). https://www.interpol.int/en/content/download/5586/file/Summary_CYBER_Strategy_2017_01_ENLR.pdf
Gercke, M. (2012). Understanding cybercrime: Phenomena, challenges and legal response. http://www.itu.int/ITU-D/cyb/cybersecurity/docs/CybercrimelegislationEV6.pdf
UNCTAD. (2020). Data and privacy unprotected in one third of countries, despite progress. coursereg.waseda.jp/portal/simpleportal.php?HID_P14=EN. Accessed 28 Apr 2021
Clough, J. (2014). A world of difference: The Budapest Convention on cybercrime and the challenges of harmonisation cybercrime: A global challenge. Monash University Law Review, 40(3), 698–736. https://link.gale.com/apps/doc/A422445386/AONE?u=waseda&sid=AONE&xid=f83b8d9d
Maillart, J. (2019). The limits of subjective territorial jurisdiction in the context of cybercrime. ERA Forum, 49, 375–390. https://doi.org/10.1007/s12027-018-0527-2
Singh, M., & Singh, S. (2007). Cyber crime convention and trans border criminality. Masaryk University Journal of Law and Technology, 1(1), 53–66.
Yeli, H. (2017). A three-perspective theory of cyber sovereignty. PRism, 7(2), 109–115.
Broadhurst, R., Grabosky, P., Alazab, M., & Chon, S. (2014). Organizations and cyber crime: An analysis of the nature of groups engaged in cyber crime. International Journal of Cyber Criminology, 8(1), 1–20. https://www.cybercrimejournal.com/broadhurstetalijcc2014vol8issue1.pdf
Shasha, C. (2021). Cyber security becomes new US weapon against China, Russia. Global Times. https://www.globaltimes.cn/page/202103/1217885.shtml
Volz, D., & McMillan, R. (2021). Massive hacks linked to Russia, China exploited U.S. Internet security gap. The Wall Street Journal. https://www.wsj.com/articles/massive-hacks-linked-to-russia-china-exploited-u-s-internet-security-gap-11615380912. Accessed 28 Apr 2021
Boni, B. (2001). Creating a global consensus against cybercrime. Network Security, 2001(9), 18–19. https://doi.org/10.1016/S1353-4858(01)00918-7
Peters, A., & Jordan, A. (2020). Countering the cyber enforcement gap: Strengthening global capacity on cybercrime. Journal of National Security Law & Policy, 10(3), 487–524. Retrieved from http://thirdway.imgix.net/JNSLP.pdf
The Council of Europe. (2021). Chart of signatures and ratifications of Treaty 185. https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185/signatures?p_auth=fDCxuST0. Accessed 16 Jan 2021
Mehrotra, K. (2019). On global cybercrime, India votes in favour of Russia-led resolution. The Indian Express. https://indianexpress.com/article/india/on-global-cybercrime-india-votes-in-favour-of-russia-led-resolution-6130980/
Stolton, S. (2020). UN backing of controversial cybercrime treaty raises suspicions. EURACTIV. https://www.euractiv.com/section/digital/news/un-backing-of-controversial-cybercrime-treaty-raises-suspicions/
Sherman, J., & Morgus, R. (2018). Breaking down the vote on Russia’s new cybercrime Resolution at the UN. New America. https://www.newamerica.org/cybersecurity-initiative/c2b/c2b-log/breaking-down-vote-russias-new-cybercrime-resolution-un/
Brenner, S., & Koops, B. (2004). Approaches to cybercrime jurisdiction. Journal of High Technology Law, 4(1), 1–46. http://papers.ssrn.com/sol3/papers.cfm?abstract_id=786507%5Cn, http://ssrn.com/abstract=786507.
Jiang, S. (2019). 94 Taiwanese criminal suspects extradited from Spain to Beijing. CNN. https://edition.cnn.com/2019/06/07/asia/taiwan-extradition-beijing-intl/index.html
Eurojust. (2016). Guidelines for deciding ‘which jurisdiction should prosecute?’ https://www.eurojust.europa.eu/sites/default/files/Publications/Reports/2016_Jurisdiction-Guidelines_EN.pdf
UNODC. (2019a). Challenges relating to extraterritorial evidence. https://www.unodc.org/e4j/en/cybercrime/module-7/key-issues/challenges-relating-to-extraterritorial-evidence.html
United States v. Microsoft (584 U.S. __ (2018)
Global Legal Research Center. (2018). Regulation of cryptocurrency around the world. The Law Library of Congress. https://www.loc.gov/law/help/cryptocurrency/regulation-of-cryptocurrency.pdf
United Nations. (2019). Countering the use of information and communications technologies for criminal purposes. https://www.unodc.org/documents/Cybercrime/SG_report/V1908182_E.pdf
UNODC. (2019c). Who conducts cybercrime investigations? https://www.unodc.org/e4j/en/cybercrime/module-5/key-issues/who-conducts-cybercrime-investigations.html
Gawas, V. M. (2017). Doctrinal legal research method a guiding principle in reforming the law and legal system towards the research development. International Journal of Law, 3(5), 128–130.
Hutchinson, T., & Duncan, N. (2012). Defining and describing what we do: Doctrinal legal research. Deakin Law Review, 17(1), 83–119. https://doi.org/10.21153/dlr2012vol17no1art70
Tiller, E. H., & Cross, F. B. (2006). What is legal doctrine? Northwestern University Law Review, 100(1), 517–534.
Braun, V., & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), 77–101.
Nowell, L. S., Norris, J. M., White, D. E., & Moules, N. J. (2017). Thematic analysis: Striving to meet the trustworthiness criteria. International Journal of Qualitative Methods, 16(1), 1–13. https://doi.org/10.1177/1609406917733847.
HTCP Department. (2011). Bao cao tong ket nam 2011 [Annual report 2011]
HTCP Department. (2012). Bao cao tong ket nam 2012 [Annual report 2012]
Bien, T. Van, & Oanh, N. M. (2020). Tien ao va mot so van de phap ly dat ra o Viet Nam hien nay [Cryptocurrency and legal issues in Vietnam]. State and Law Review, 4(384), 30–40. https://vass.gov.vn/nghien-cuu-khoa-hoc-xa-hoi-va-nhan-van/Tien-ao-va-mot-so-van-de-phap-ly-114#_ftn10
Desnoyers, S. (2013). The challenges of cybercrime for international law enforcement. Utica College.
Vietnam Ministry of Foreign Affairs. (2017). Danh muc cac hiep dinh ve tuong tro tu phap va phap ly giua Viet Nam va cac nuoc [List of treaties of mutual legal assistance and legal issues between Vietnam and other countries]. https://lanhsuvietnam.gov.vn/Lists/BaiViet/Bàiviết/DispForm.aspx?List=dc7c7d75–6a32–4215-afeb-47d4bee70eee&ID=414. Accessed 8 Mar 2020
Heusala, A.-L., & Koistinen, J. (2018). ‘Rules of the game’ in cross-border cooperation: Legal-administrative differences in Finnish-Russian crime prevention. International Review of Administrative Sciences, 84(2), 354–370. https://doi.org/10.1177/0020852315625786
Brier, J. (2017). Defining the limits of governmental access to personal data stored in the cloud: An analysis and critique of Microsoft Ireland. Journal of Information Policy, 7, 327. https://doi.org/10.5325/jinfopoli.7.2017.0327
Schwartz, P. M. (2017). Legal access to the global cloud. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.3008392
INTERPOL. (n.d.). What is INTERPOL? https://www.interpol.int/Who-we-are/What-is-INTERPOL
HTCP Department. (2016). Bao cao tong ket nam 2016 [Annual report 2016]
Department of Cybersecurity and Combating High-tech Crime. (2018). Bao cao tong ket nam 2018 [Annual report 2018]. Hanoi.
Lam, T. (2020). Bao dam an ninh mang trong tinh hinh moi [Ensure cybersecurity in the new situation]. Vietnam Communist Party’s Central Committee. Retrieved from https://www.tapchicongsan.org.vn/web/guest/tin-tieu-diem/-/asset_publisher/s5L7xhQiJeKe/content/bao-dam-an-ninh-mang-trong-tinh-hinh-moi
Dai, Q. T. (2015). Khong gian mang: Tuong lai va hanh dong [Cyberspace: Future and action]. Public Security Publishing House.
Chinh, N. M. (2019). Hoan thien phap luat ve an ninh mang trong tinh hinh hien nay [The improvement of law on cybersecurity in the present]. Vietnam Communist Party’s Central Committee. https://tapchicongsan.org.vn/the-gioi-van-de-su-kien/-/2018/812604/hoan-thien-phap-luat-ve-an-ninh-mang-trong-tinh-hinh-hien-nay.aspx#!
Dong, A. (2020). Truyen thong, an ninh mang va luat phap [Media, cybersecurity and law]. The Communist Party of Vietnam. https://nhandan.com.vn/binh-luan-phe-phan/truyen-thong-an-ninh-mang-va-luat-phap-579963/
Hoa, N. T. N., & Long, B. T. (2020). Nhin lai mot nam thuc hien phap luat ve an ninh mang [One year of implementing the law on cybersecurity]. Political Theory Journal, 4, 93–99. Retrieved from http://lyluanchinhtri.vn/home/index.php/thuc-tien/item/3172-nhin-lai-mot-nam-thuc-hien-phap-luat-ve-an-ninh-mang.html
Cooper, G., & Le, H. (2018). Vietnam’s new Cybersecurity Law: A headache in the making? Duane Morris, pp. 14–16. https://www.duanemorris.com/articles/static/cooper_le_cybersecurity_practitioner_0718.pdf
SaveNET. (2018). Luat an ninh mang: Nhung dieu can biet [Law on cybersecurity: Basic knowledge].
Acknowledgements
We would like to thank Prof. Ken Miichi (Waseda University) for his advice and his comments on earlier versions of the article.
Funding
No funding was received for conducting this study.
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by Trong Van Nguyen. The first draft of the manuscript was written by Trong Van Nguyen. Tung Vu Truong and Cuong Kien Lai commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Ethics approval
All procedures performed in studies involving human participants were in accordance with the ethical standards of the institutional and/or national research committee and with the 1964 Helsinki declaration and its later amendments or comparable ethical standards.
Conflicts of interest
The authors declare no potential conflicts of interest.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix 1
Appendix 1
Table 1
Rights and permissions
About this article
Cite this article
Van Nguyen, T., Truong, T.V. & Lai, C.K. Legal challenges to combating cybercrime: An approach from Vietnam. Crime Law Soc Change 77, 231–252 (2022). https://doi.org/10.1007/s10611-021-09986-7
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10611-021-09986-7