Abstract
This chapter examines the trends in and challenges of cybercrime in the Association of Southeast Asian Nation (ASEAN) region. Although the ASEAN region is an emerging cybercrime market, there is limited research on cybercrime in ASEAN. What are the trends in and challenges of cybercrime in ASEAN? Is the current Council of Europe’s Convention on Cybercrime appropriate for ASEAN? What are the challenges faced by ASEAN countries when collaborating internationally against cybercrime? This chapter aims to answer these questions and to consider whether the strategies developed in the global north are relevant to ASEAN. This chapter will provide an overview of cybercrime trends in ASEAN, assess current measures adopted by ASEAN countries in combatting cybercrime, and make policy recommendations to strengthen those measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In 2012, Myanmar hackers launched a similar attack against Bangladesh when Myanmar lost a lawsuit over disputed territorial claims (Unleash Research Labs 2016).
- 2.
The twenty-seven members are the ten ASEAN member states (Brunei, Cambodia, Indonesia, Laos, Malaysia, Myanmar, the Philippines, Singapore, Thailand, and Vietnam), the ten ASEAN dialogue partners (Australia, Canada, China, the European Union, India, Japan, New Zealand, the Republic of Korea, Russia, and the United States), one ASEAN observer (Papua New Guinea), as well as the Democratic People’s Republic of Korea, Mongolia, Pakistan, Timor-Leste, Bangladesh, and Sri Lanka. See http://dfat.gov.au/international-relations/regional-architecture/Pages/asean-regional-forum-arf.aspx. Last accessed on 25 November 2016.
References
ASEAN. (1967). The Asean Declaration (Bangkok Declaration) Bangkok, 8 August 1967. Retrieved 20 Nov 2016, <http://asean.org/the-asean-declaration-bangkok-declaration-bangkok-8-august-1967/>. Accessed Nov 2016.
ASEAN. (1976). Treaty of Amity and Cooperation in Southeast Asia Indonesia, 24 February 1976. Retrieved 20 Nov 2016, <http://asean.org/treaty-amity-cooperation-southeast-asia-indonesia-24-february-1976/>. Accessed Nov 2016.
ASEAN. (2004). Joint communique of the fourth ASEAN Ministerial Meeting on Transnational Crime (AMMTC), Bangkok. <http://asean.org/joint-communique-of-the-fourth-asean-ministerial-meeting-on-transnational-crime-ammtc-bangkok/>. Accessed Nov 2016.
ASEAN. (2011). ASEAN ICT masterplan 2015. Jakarta: ASEAN Secretariat.
ASEAN. (2015a). ASEAN ICT masterplan 2015 completion report. Jakarta: ASEAN Secretariat.
ASEAN. (2015b). Plan of action to implement the joint declaration on ASEAN-China strategic partnership for peace and prosperity (2016–2020). <http://www.asean.org/storage/images/2015/November/27th-summit/ASEAN-China%20POA%20%202016-2020.pdf>. Accessed Nov 2016.
ASEAN. (2016). ASEAN Telecommunications and IT Ministers Meeting (TELMIN). Retrieved 20 Nov 2016, <http://asean.org/asean-economic-community/asean-telecommunications-and-it-ministers-meeting-telmin/>. Accessed Nov 2016.
ASEAN Regional Forum (ARF). (2006). ASEAN Regional Forum statement on cooperation in fighting cyber attack and terrorist misuse of cyberspace. Retrieved 20 Nov 2016, <http://www.mofa.go.jp/region/asia-paci/asean/conference/arf/state0607-3.html>. Accessed Nov 2016.
Ashok, I. (2016, August 5). China-based hackers suspected of targeting Philippines DOJ over South China Sea dispute. International Business Times, <http://www.ibtimes.co.uk/china-based-hackers-suspected-targeting-philippines-doj-over-south-china-sea-dispute-1574496>. Accessed Nov 2016.
Aung, T. (2016) High Court to hear ATM fraud allegations. Myanmar Times. Retrieved 10 Oct 2016, <http://www.mmtimes.com/index.php/national-news/yangon/19104-high-court-to-hear-atm-fraud-allegations.html>. Accessed Nov 2016.
BBC (2010). Burma hit by massive net attack ahead of election. <http://www.bbc.com/news/technology-11693214>. Accessed Nov 2016.
Broadhurst, R., & Chang, L. (2012). Cybercrime in Asia: Trend and challenges. In R. Broadhurst & P. Grabosky (Eds.), Cyber-crime: The challenge in Asia (pp. 269–302). Hong Kong: Hong Kong University Press.
Chang, L. (2012). Cybecrime in the greater China region: Regulatory responses and crime prevention across the Taiwan Strait. Cheltenham: Edward Elgar.
Chung, L. (2016, August 6). How Taiwanese police cracked NT$83 million ATM heist. South China Morning Post, <http://www.scmp.com/news/china/money-wealth/article/1999019/how-taiwanese-police-cracked-nt83-million-atm-heist>. Accessed Nov 2016.
Coe, J (2016, January 5). The cyber wars. Frontier. Retrieved 15 Oct 2016, <http://frontiermyanmar.net/en/features/the-cyber-wars>. Accessed Nov 2016.
Constantin, L. (2016, August 30). Sophisticated malware possibly tied to recent ATM heists in Thailand. ComputerWorld, <http://www.computerworld.com.my/resource/security/sophisticated-malware-possibly-tied-to-recent-atm-heists-in-thailand/>. Accessed Nov 2016.
Council of Europe. (2016). Convention on cybercrime: Explanatory report. Retrieved 10 Nov 2016, <http://conventions.coe.int/Treaty/en/Reports/Html/185.htm>. Accessed Nov 2016.
Csonka, P. (2000). The draft Council of Europe Convention on cybercrime: A response to the challenge of crime in the age of the internet? Computer Law & Security Report, 16, 329–330.
Davis, B. (2016, August 13). Hacking attack at Vietnam airports: Another chapter in South China Sea dispute. Forbes, <http://www.forbes.com/sites/davisbrett/2016/08/13/hacking-attack-at-vietnam-airports-another-chapter-in-south-china-sea-dispute/#40679eb64248>. Accessed Nov 2016.
Ericsson. (2015). Ericsson mobility report: On the pulse of the networked society. Retrieved 9 Sept 2016, <http://www.ericsson.com/res/docs/2015/mobility-report/ericsson-mobility-report-nov-2015.pdf>. Accessed Nov 2016.
Evers, H.-D., & Gerke, S. (2013). Local knowledge and the digital divide: Focus on Southeast Asia. Bandar Seri Begawan: Institute of Asian Studies, University Brunei Darussalam.
Fireeye. (2015). Southeast Asia: An Evolving Cyber Threat Landscape. Retrieved 10 Oct 2016, https://www.fireeye.com/content/dam/fireeyewww/ current-threats/pdfs/rpt-southeast-asia-threat-landscape.pdf. Accessed Apr 2017.
F-Secure. (2016). Nanhaishu: RATing the South China Sea. Retrieved 10 Oct 2016, <https://www.f-secure.com/documents/996508/1030745/nanhaishu_whitepaper.pdf>. Accessed Nov 2016.
Hammond, C., & Trautwein, C. (2016, March 25). Viettel picked for fourth telecoms tie-up with military partner. Myanmar Times, <http://www.mmtimes.com/index.php/business/technology/19662-viettel-nears-contract-for-fourth-telecoms-operator.html>. Accessed Nov 2016.
Heinl, C. (2014). Regional cybersecurity: Moving toward a resilient ASEAN cyber security regime. Asia Policy, 18, 131–159.
IBM. (2009). IBM internet security systems X- force 2009 mid-year trend and risk report. Somers: IBM Corporate.
Kolochenko, I. (2016). Cybercrime The Price of Inequality. Forbes, https://www.forbes.com/sites/forbestechcouncil/2016/12/19/cybercrimethe-price-of-inequality/#32c7e0c67d01. Accessed Apr 2017.
Leesa-Nguansuk, S. (2013, July 5). Internet users ‘will double’ this year. Bangkok Post. <http://www.bangkokpost.com/tech/local-news/358404/internet-users-will-double-this-year. Accessed Sept 2016.
Long, K. (2016). Govt. firms dismiss hacking report. MyanmarTimes, <http://www.mmtimes.com/index.php/national-news/19200-govt-firms-dismiss-hacking-report.html>. Accessed Nov 2016.
Microsoft. (2007). Asia Pacific Legislative Analysis: Current and pending online safety and cybercrime laws. A study by Microsoft. <http://www.itu.int/ITU-D/cyb/cybersecurity/docs/microsoft_asia_pacific_ legislative_analysis.pdf>. Access Nov 2016.
Microsoft. (2016a). Malware Infection Index 2016 highlights key threats undermining cybersecurity in Asia Pacific: Microsoft.
Microsoft (2016b). Microsoft security intelligence report (Vol. 20). Seattle: Microsoft.
Microsoft (2016c). Microsoft security intelligence report (Vol. 20). Regional threat assessment. Seattle: Microsoft.
Microsoft. (2016d). Microsoft security intelligence report (Vol. 20): PLATINUM: Targeted attacks in South and Southeast Asia. Seattle: Microsoft.
Miniwatts Marketing Group. (2016). Internet World Stats. <http://www.internetworldstats.com/stats.htm http://www.internetworldstats.com/stats.htm>. Accessed Nov 2016.
Morgan, S. (2016, January 17). Cyber crime costs projected to reach $2 trillion by 2019. Forbes, <http://www.forbes.com/sites/stevemorgan/2016/01/17/cyber-crime-costs-projected-to-reach-2-trillion-by-2019/#3b3683cf3bb0>. Accessed Nov 2016.
Motlagh, J. (2014, September 30). When a SIM card goes from $2,000 to $1.50. Bloomberg. <http://www.bloomberg.com/news/articles/2014-09-29/myanmar-opens-its-mobile-phone-market-cuing-carrier-frenzy>. Accessed Nov 2016.
Nasu, H., & Trezise, H. (2015). Cyber security in the Asia-Pacific. In N. Tsagourias & R. Buchan (Eds.), Research handbook on international law and cyberspace (pp. 446–464). Cheltenham: Edward Elgar.
OECD. (2001). Understanding the digital divide. Paris: OECD.
O’Toole, B. (2013). Email hacking exposes cybercrime in Myanmar. MyanmarTimes, http://www.mmtimes.com/index.php/nationalnews/4168-email-hacking-exposes-cybercrime-in-myanmar.html. Accessed Apr 2017.
Portnoy, M., & Goodman, S. (2009). Global initiatives to secure cyberspace: An emerging landscape. New York: Springer.
Prakash, G. (2014, October 2). Banks knew ATMs were open to attacks, source claims. Malaymail Online, <http://www.themalaymailonline.com/malaysia/article/banks-knew-atms-were-open-to-attacks-source-claims>. Accessed Nov 2016.
Rees, N. (2010). EU and ASEAN: Issues of regional security. International Politics, 47(3), 402–418.
RT. (2013, November 5). Indonesian ‘Anonymous’ hackers deface scores of Australian websites in revenge over spying. RT News, <https://www.rt.com/news/anonymous-indonesia-australia-hack-167/>. Accessed Nov 2016.
Santora, M. (2013, May 9). In hours, thieves took $45 Million in A.T.M. scheme. New York Times, <http://www.nytimes.com/2013/05/10/nyregion/eight-charged-in-45-million-global-cyber-bank-thefts.html>. Accessed Nov 2016.
Symantec. (2009). Symantec APJ internet security threat report XIII: Trend for 2008. Cupertino, CA: Symantec Corporation.
Trautwein, C. (2015, March 25). Myanmar named fourth-fastest-growing mobile market in the world by Ericsson. Myanmar Times, <http://www.mmtimes.com/index.php/business/technology/17727-myanmar-named-fourth-fastest-growing-mobile-market-in-the-world-by-ericsson.html>. Accessed Nov 2016.
Trend Micro. (2009). Trend micro 2008 annual threat roundup and 2009 forecast. Cupertino: Trend Micro Inc.
UNCATD. (2013). Review of e-commerce legislation harmonization in the Association of Southeast Asian Nations (UNCTAD/DTL/STICT/2013/1). NY: Nunited Nations.
Unleash Research Labs. (2016). Unleashed: Unveiling cyberwar in Myanmar. <http://unleashed.blinkhackergroup.org/op-its-time/3/>. Accessed Nov 2016.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
Chang, L.Y.C. (2017). Cybercrime and Cyber Security in ASEAN. In: Liu, J., Travers, M., Chang, L. (eds) Comparative Criminology in Asia. Springer Series on Asian Criminology and Criminal Justice Research. Springer, Cham. https://doi.org/10.1007/978-3-319-54942-2_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-54942-2_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54941-5
Online ISBN: 978-3-319-54942-2
eBook Packages: Law and CriminologyLaw and Criminology (R0)