11.07.2015 Views

W7y8w3

W7y8w3

W7y8w3

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ThailandWhen elephants fight: Communications surveillance on the rise in ThailandThai Netizen NetworkMishari Muqbil and Arthit Suriyawongkulthainetizen.orgIntroductionThailand is presently going through a period of upheavalwith the population split between two strongideologies and those in power playing a zero sumgame. Surveillance of the internet and other communicationmediums has in the last decade beenshown to have progressively greater importance tothose in power. This can be seen by the 2007 Computer-relatedCrimes Act (CCA), brought into law bythe previous junta; but more telling is the secondversion of the law, worked on by the subsequentlyelected civilian government, which focuses on criminalaspects but offers no safeguards to privacy andcivil liberties.The major application for mass surveillancehas been in the form of logging internet use andblocking websites, but there have also been caseswhere law enforcement has requested cooperationfrom companies such as the social networkcompany LINE in order to acquire chat transcriptsto help them prosecute (non-political) criminalcases. However, recently, with the military takeoverof the caretaker civilian government on 22May 2014, surveillance has taken a more totalitarianform.At 3:00 p.m. on 28 May 2014, people acrossThailand could not use Facebook for about 55minutes. At first it was announced by the NationalCouncil for Peace and Order (NCPO) spokesmanthat there was an issue with Facebook’s own internetgateway. 1 But later it was revealed by the vicepresident and head of communications of TelenorAsia that its local subsidiary DTAC, the secondlargestGSM operator in the country, “received anotification at 15:00 local time from the NationalBroadcasting and Telecommunications Commissionof Thailand to restrict access to Facebook1 The Nation. (2014, May 29). No policy to block fBFB. (2014,May). Retrieved June 13, 2014, fromThe Nation. http://www.nationmultimedia.com/politics/%5CNo-policy-to-block-FB%5C-30234896.html.temporarily.” 2 This incident would serve as a warningof things to come.Policy and political backgroundThe CCA 3 stipulates penalties for various computercrimes including unauthorised access andspamming, but the clauses relevant to this reportare Section 13, which penalises anyone who “disseminatessets of instructions developed as a toolused in committing an offence;” 4 Section 14, whichpenalises the spreading of vaguely defined “falsecomputer data” (often interpreted to use for defamationcharges), pornography and informationthat goes against national security (most notablydefamation of members of the royal family); and“intermediary liability” in Section 15, which holdsaccountable the service provider who “supports orconsents” to the crimes committed under Section14. A service provider is broadly defined and canbe anything from a satellite link provider to a coffeeshop with free Wi-Fi access. Section 18 allowsthe authorities to demand traffic data from serviceproviders without a court warrant. Article 25 of theSpecial Case Investigation Act (2004, amended2008) also allows communication interceptionwithout notification. 5 Since 2012, every computerrelatedcrime case is a special case under thisSpecial Case Investigation Act. 6The new junta has chosen to act slightly differently.Their modus operandi seems to be the directcommand of ministries and semi-governmentalorganisations to carry out tasks irrespective of existinglegislation.2 Vals, M. (2014, June 9). Telenor says Thailand’s recent Facebookoutage was ordered by the government. The Next Web.thenextweb.com/asia/2014/06/09/operator-dtac-says-thailandsgovernment-forced-shut-access-facebook3 https://thainetizen.org/docs/thailand-computer-crime-act-2550(original); https://thainetizen.org/docs/thailand-computer-crimeact-2550-en(English translation).4 Under the previous section which can penalise security researchas well as make dual use software illegal because the same set ofcomputer tools that can be used to test for security flaws can also,by their very nature, be used to gain unauthorised entry.5 Special Case Investigation Act (No. 2, amended February 2008).bit.ly/thaispecialcaseinvestigationact2008 (Thai and Englishtranslation)6 Ministerial Regulation on Additional Special Cases according toSpecial Case Investigation Act (No. 2). bit.ly/morespecialcases2 (inThai)Compliance with international benchmarkson surveillanceSince the military junta has taken power, there hasbeen one high-profile arrest based on computerevidence. Sombat Boonngamanong, an activist whodefied the junta, was tracked through his IP address.7 It is of concern how this happened exactly,as Sombat’s primary visible form of expression isthrough Twitter and Facebook. Both are HTTP Secure-enabled,8 which should prevent any agentsmonitoring Thai internet traffic from tracing his accountback to his address. We can only speculatethat he made an error in operations security whichresulted in his IP address being revealed, but wealso cannot rule out the possibility of Facebook’scooperation with the junta or the existence of highlyadvanced surveillance capabilities.If we look at this evolving situation in thecontext of the 13 International Principles on theApplication of Human Rights to CommunicationsSurveillance, 9 we see that Thailand has entered aprecarious situation:1. Legality – It can be argued that surveillanceand intercepts are in effect legal, as laws havebeen written to give the state power to intercept.However, if it is implemented in such away that citizens cannot foresee its application,then we fall short on this principle. Specificallyin the case of DTAC above, the junta denied thatsuch a block was ordered, and when Telenor’sexecutive said otherwise, 10 the company feltthreatened. 112. Legitimate aim – It is arguable whether retaininglogs of all internet traffic complies with a legitimateaim or not. One thing is certain: Sombathas been charged with “cyber crime as well as ofinciting unrest and violating junta orders” 12 fornot reporting to the junta when summoned, and7 Sawitta Lefevre, A. (2014, June 6). Thai junta tracksinternet posting to capture protest leader. Reuters.uk.reuters.com/article/2014/06/06/uk-thailand-politicsidUKKBN0EH0KX201406068 HTTP Secure (HTTPS) is a standard for protecting internet trafficfrom intercepts, by encrypted communications using TransportLayer Security (TLS) or its predecessor, Secure Sockets Layerprotocol. More technical information can be found at www.tldp.org/HOWTO/SSL-Certificates-HOWTO/x64.html; for moreinformation in plain English, watch this animation: youtu.be/DPYYw0cbrFE9 https://en.necessaryandproportionate.org/text10 Vals, M. (2014, June 9). Op. cit.11 Woodgate, E. (2014, June 11). Telenor threatened by Thai junta.News in English.no. www.newsinenglish.no/2014/06/11/telenorthreatened-by-thai-junta12 Ngamkham, W., & Sattaburuth, A. (2014, June 11). Sombat nowfaces cyber-crime charge. Bangkok Post. www.bangkokpost.com/news/politics/414655/sombat-now-faces-cyber-crime-chargefor organising a flashmob. 13 This is definitely nota “legal interest that is necessary in a democraticsociety.” 143. Necessity – The provisions in the CCA requireinternet service providers (ISPs) to retain trafficdata logs for up to three months to makethem available for scrutiny by the state. Theinformation, if requested, must be handed overto a competent officer without the requirementof any judicial oversight. Since the coup, however,it is unclear whether this applies anymore,as seen by the shutting down of Facebook withno reason provided nor an acknowledgement ofthe shutdown order.4. Adequacy – Despite the blanket provisions anddata logging requirements of the CCA, it doesnot seem to adequately fulfil all legal requirements.In 2013 Thai authorities reached out toLINE for access to online chat records. 155. Proportionality – Here, it is enough to quoteone analyst: “The Computer Crime Act has beencriticised for its unclear provisions and harshpenalties.” 16 This is by virtue of the fact that thelanguage of the act is open to very broad interpretations,and some provisions prescribe a harsherpenalty for a crime using a computer, compared tothe same crime conducted without a computer.6. Competent judicial authority – This is split intotwo parts: regular criminal and civil cases underthe CCA, which are handled by the respective civiliancourts, and national security cases, whichare now handled by military courts. 17 The civiliancourts have had some training and experiencedealing with such cases (even though this isquestionable). 18 However, it is certain that the militarycourts have had no experience dealing withCCA-related issues and are unlikely to base theirjudgements on human rights considerations.7. Due process – Human Rights Watch (HRW) saysit best: “The May 25 order [to try civilians in13 Purnell, N. (2014, June). How Thai flash mobs avoid capture. WallStreet Journal. blogs.wsj.com/searealtime/2014/06/01/how-thethai-flash-mobs-avoid-capture14 https://en.necessaryandproportionate.org/text15 Doksone, T. (2013, August 13). Thai police seek to monitor chat appfor crimes. AP. bigstory.ap.org/article/thai-police-seek-monitorchat-app-crimes16 Charoen, D. (2012). The analysis of the Computer Crime Act inThailand. International Journal of Information and CommunicationTechnology Research, 2(6). esjournals.org/journaloftechnology/archive/vol2no6/vol2no6_7.pdf17 Thai PBS. (2014, May 25). NCPO announces cases to be triedby military court. Thai PBS. englishnews.thaipbs.or.th/ncpoannounces-cases-tried-military-court18 Panananda, A. (2012, May 15). Oddities abound in Amphon’s trialand jailing. The Nation. www.nationmultimedia.com/politics/Oddities-abound-in-Amphons-trial-and-jailing-30181989.html240 / Global Information Society Watch thailand / 241

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!