Jump to ContentJump to Main Navigation
Access ContestedSecurity, Identity, and Resistance in Asian Cyberspace$
Users without a subscription are not able to see the full content.

Ronald Deibert, John Palfrey, Rafal Rohozinski, and Jonathan Zittrain

Print publication date: 2011

Print ISBN-13: 9780262016780

Published to MIT Press Scholarship Online: August 2013

DOI: 10.7551/mitpress/9780262016780.001.0001

Show Summary Details
Page of

PRINTED FROM MIT PRESS SCHOLARSHIP ONLINE (www.mitpress.universitypressscholarship.com). (c) Copyright The MIT Press, 2021. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in MITSO for personal use.date: 23 September 2021

Internet Politics in Thailand after the 2006 Coup

Internet Politics in Thailand after the 2006 Coup

Regulation by Code and a Contested Ideological Terrain

(p.83) 5 Internet Politics in Thailand after the 2006 Coup
Access Contested

Pirongrong Ramasoota

The MIT Press

This chapter focuses on the Internet filtering evolution in Thailand particularly after the 2006 military coup. Legal measures to control online communication in Thailand after the coup, including the Computer-Related Offenses Act B.E. 2550, the Council for Democratic Reform’s Order No. 5/2549, and Internal Security Act B.E. 2551, among others, are discussed. The chapter presents the automatic URL filtering technique developed at the Bangkok-based Kasetsart University due to the complaints over lèse-majesté cases used in 2008 and onwards. The chapter presents strategies employed by civil society members to deal with Internet filtering, including increasing security in online use, use of proxy servers, and campaigning for public advocacy on issues related to Internet freedom.

Keywords:   Internet filtering, Thailand, military coup, automatic URL filtering, proxy servers, public advocacy

MIT Press Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs, and if you can't find the answer there, please contact us.