Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Why Non-Native Content Designers Improve Global UX

      July 18, 2025

      DevOps won’t scale without platform engineering and here’s why your teams are still stuck

      July 18, 2025

      This week in AI dev tools: Slack’s enterprise search, Claude Code’s analytics dashboard, and more (July 18, 2025)

      July 18, 2025

      Report: 71% of tech leaders won’t hire devs without AI skills

      July 17, 2025

      Could OpenAI’s rumored browser be a Chrome-killer? Here’s what I’m expecting

      July 18, 2025

      My favorite lens and screen-cleaning kit keeps my tech spotless, and it only costs $8

      July 18, 2025

      AI’s biggest impact on your workforce is still to come – 3 ways to avoid getting left behind

      July 18, 2025

      Remedy offers update on ‘FBC: Firebreak,’ details coming improvements — “We’ve seen many players come into the game and leave within the first hour.”

      July 18, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The details of TC39’s last meeting

      July 18, 2025
      Recent

      The details of TC39’s last meeting

      July 18, 2025

      Online Examination System using PHP and MySQL

      July 18, 2025

      A tricky, educational quiz: it’s about time..

      July 18, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      CAD Sketcher – constraint-based geometry sketcher

      July 18, 2025
      Recent

      CAD Sketcher – constraint-based geometry sketcher

      July 18, 2025

      7 Best Free and Open Source Linux FTP Servers

      July 18, 2025

      Best Free and Open Source Alternatives to Autodesk FBX Review

      July 18, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Toward a Safer Digital ASEAN: Building Legal and Law Enforcement Synergy

    Toward a Safer Digital ASEAN: Building Legal and Law Enforcement Synergy

    April 14, 2025

    ASEAN agencies

    By Salleh Kodri, SE Regional Manager, Cyble

    Southeast Asia is undergoing rapid digital transformation—bringing a surge in cybercrime that threatens national security, public trust, and regional stability. From state-linked ransomware campaigns to cross-border scams and data breaches, cybercriminals are exploiting weak links in the region’s legal and enforcement systems.

    ASEAN governments are responding, but cybercrime is evolving faster than policy. To stay ahead, countries must act collectively: modernize enforcement, align legal frameworks, and deepen international cooperation. The cost of inaction is rising—and cybercriminals are watching.

    Cybercrime is Now a National Threat

    Recent cyberattacks in ASEAN have gone beyond financial loss—they’ve targeted public institutions, critical infrastructure, and citizen data.

    • In October 2023, PhilHealth in the Philippines was hit by a ransomware attack. Sensitive personal data of over 8 million people was leaked.
    • Indonesia’s Temporary National Data Center faced a breach in early 2024 that disrupted public services and exposed weaknesses in national cybersecurity defenses.
    • Malaysia and Vietnam have reported a sharp rise in online investment scams, linked to transnational fraud networks using phishing and malware to steal from individuals and small businesses.

    “These aren’t just cybercrimes—they’re threats to our national integrity,” said Brig. Gen. Joseph Ulysses Gohel, Director of the Philippine National Police Anti-Cybercrime Group. “The attackers aren’t lone hackers. They’re organized, well-funded, and often operate across multiple jurisdictions.”

    Law Enforcement is Catching Up—but Faces Gaps

    Most ASEAN countries now have cybercrime divisions within their police forces, but capacity varies.

    • Singapore’s Cybercrime Command is a regional leader, with deep digital forensics capabilities and regional training programs.
    • Thailand’s Technology Crime Suppression Division has expanded its cybercrime units in Bangkok and the provinces.
    • Malaysia’s Commercial Crime Investigation Department is enhancing partnerships with banks and telcos to counter financial cyber fraud.
    • In Indonesia, the BSSN (National Cyber and Crypto Agency) works with police and other national agencies to secure networks and respond to incidents.

    However, gaps remain. In several member states, law enforcement still lacks trained personnel, digital forensic tools, and legal authority to investigate across borders.

    “We can’t chase 21st-century criminals with 20th-century tools,” said Dato’ Sri Ramli Mohamed Yoosuf, Director of Malaysia’s Commercial Crime Investigation Department. “We need investment not only in technology, but in the people who use it.”

    Regional and Global Cooperation Is Critical

    Cybercrime doesn’t stop at borders—and neither can law enforcement. ASEAN agencies are increasingly working together through multilateral platforms:

    • INTERPOL’s Global Complex for Innovation (IGCI) in Singapore serves as a coordination hub for cybercrime operations across Asia-Pacific.
    • The ASEAN Cybercrime Operations Desk, supported by INTERPOL and Japan, connects member states to share intelligence, conduct joint investigations, and disrupt criminal infrastructure.
    • In Operation Haechi IV (2024), INTERPOL coordinated a regional crackdown that led to over 3,500 arrests and the seizure of $300 million in illicit assets linked to phishing, romance scams, and business email compromise attacks.

    “Cybercriminals collaborate across time zones,” said Kunal Bhasin, Cybercrime Intelligence Officer at INTERPOL. “If law enforcement doesn’t do the same, we’re always two steps behind.”

    ASEAN countries are also forging bilateral cooperation. Singapore, for instance, signed a cybercrime cooperation agreement with Vietnam in 2023, covering information exchange and training. Malaysia has strengthened ties with Australia and South Korea to investigate crypto-related fraud.

    The Legal Landscape: Fragmented and Slow

    Perhaps the biggest barrier to fighting cybercrime effectively is the legal one. The region’s cybercrime laws vary widely in scope, enforcement powers, and procedural standards.

    Some countries still don’t have standalone cybercrime laws. Others have outdated statutes that don’t cover digital currencies, online harassment, or cross-border evidence collection.

    The Budapest Convention on Cybercrime, the world’s first and only binding treaty on cybercrime cooperation, remains underutilized in the region. Only Singapore and the Philippines have ratified it. Several others—including Indonesia and Malaysia—have expressed reservations about sovereignty and data privacy.

    But the cost of non-alignment is high. Cybercriminals exploit legal loopholes between jurisdictions, using one country’s weak law as a safe harbor while operating attacks region-wide.

    “Too often, we identify suspects and gather evidence, only to be blocked by legal incompatibilities,” said Col. Supat Thamthanarak, head of Thailand’s Technology Crime Suppression Division. “We need common standards—and the political will to enforce them.”

    Prosecuting Across Borders: A Race Against Time

    Cross-border prosecution is slow and complicated. Mutual Legal Assistance Treaties (MLATs) are the main mechanism for countries to request evidence or arrests abroad—but many are paper-based, bureaucratic, and too slow for time-sensitive digital evidence.

    Cybercrime evidence often disappears quickly—servers get wiped, cryptocurrency gets laundered, accounts go dormant. Speed is critical.

    ASEAN has its own Mutual Legal Assistance Treaty (AMLAT), but its use in cybercrime cases is still limited. Countries are now exploring digital MLAT portals and fast-track procedures for urgent cases.

    What’s needed is a clear framework for:

    • Real-time evidence sharing
    • Joint investigation teams
    • Streamlined extradition for cybercrime offenses

    If ASEAN countries can align on these mechanisms, they can turn legal bottlenecks into operational breakthroughs.

    Policy Priorities for Governments

    To close the enforcement and legal gaps, ASEAN governments must elevate cybercrime to a top-tier policy priority. A serious regional strategy should include:

    1. Legal Harmonization: Align national laws with the Budapest Convention’s principles—whether or not countries ratify the treaty.
    2. Faster Evidence Sharing: Develop digital MLAT systems for faster processing of cybercrime requests across jurisdictions.
    3. Funding for Cybercrime Units: Equip police units with digital forensic labs, threat intelligence tools, and long-term talent pipelines.
    4. Institutionalized Cooperation: Hold annual ASEAN-wide cybercrime drills, led by joint task forces and regional desks.
    5. Cyber Diplomacy: Empower embassies and regional organizations to fast-track cyber-related requests and establish rapid response channels.

    The Stakes Are Growing

    ASEAN’s digital economy is expected to reach $1 trillion by 2030. But without strong cybercrime enforcement, public trust—and investor confidence—could erode.

    As ASEAN Deputy Secretary-General Satvinder Singh put it at the 2024 ASEAN Digital Ministers’ Meeting:

    “A secure digital economy depends on secure digital borders. That’s not something any one country can achieve alone.”

    Cybercrime is no longer a niche issue. It’s a test of political leadership, institutional strength, and regional solidarity. ASEAN has the tools. What it needs now is resolve.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePodcast Feature: Cyber Governance, Supply Chain Risk & Awareness with Zahid Altaf
    Next Article Medusa ransomware gang claims to have hacked NASCAR

    Related Posts

    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    July 18, 2025
    Repurposing Protein Folding Models for Generation with Latent Diffusion
    Artificial Intelligence

    Repurposing Protein Folding Models for Generation with Latent Diffusion

    July 18, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    This PC app boosts FPS in any game on any GPU for only $7 — and it just got a major update

    News & Updates

    CVE-2025-4884 – iSourcecode Restaurant Management System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-6910 – PHPGurukul Student Record System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Gradia Screenshot Tool Just Keeps Getting Better

    Linux

    Highlights

    CVE-2025-49715 – Dynamics 365 Information Disclosure Vulnerability

    June 19, 2025

    CVE ID : CVE-2025-49715

    Published : June 20, 2025, 1:15 a.m. | 1 hour, 25 minutes ago

    Description : Exposure of private personal information to an unauthorized actor in Dynamics 365 FastTrack Implementation Assets allows an unauthorized attacker to disclose information over a network.

    Severity: 7.5 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    This soundbar has some of the best audio I’ve ever heard, but there’s one thing I can’t get over

    April 16, 2025

    Rethinking technology and IT’s role in the era of agentic AI and digital labor

    April 3, 2025

    This new Android 16 feature might give a big performance boost to older phones – here’s how

    April 7, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.