Thai Citizens and their roles in National Security of Thailand

The objective in this study was to investigate the state of art of Thai citizens and their roles in national security of Thailand. Documentary research was employed in this study. The findings revealed that Thai citizens played a big role as both supporters and objectors for national security of Thailand due to both external and internal changes. As supporters of Thai government’s jurisdiction, good citizens must comply with IT-related laws that allowed Ministry of Digital Economy and Society (MDES) and related authorized agencies that enhanced the level of controlling on data via surface web sites. As objectors, they committed civil disobedience-oriented activities beyond Thai government’s jurisdiction via the application of privacy-based non-governmental cryptocurrency (such as Monero) and web browsers for underground web sites (such as TOR and I2P) for hiding all data of their identities and money transfer. In addition, Thai citizens were also protected by net states as citizen-user in a form of business civil disobedience.


Significance of problem
National security has been one of the most favorite topics in Public Administration since 1900 or the first paradigm of this nice field of study according to Nicholas Henry's classification (Henry, 2013). It depends on two components of every modern state according to the Article 1 of The Convention on Rights and Duties of States (inter-American) on December 26, 1933government and citizens (Convention on Rights and Duties of States, 1933;White, 1926;Marini, 1971;Frederickson, 1989;Osborne and Gaebler, 1992;Peters, 2001; O'Leary, Van Slyke, Kim, 2010; Henry, 2013; Shafritz, Russel, Borick, 2017). However, the emerging of many advanced IT technologies (such as IoT, Deep Web and Dark Web, cryptography, Blockchain and Cryptocurrency, TOR (The Onion Browser), I2P, and 5G) and the emerging of net states, an amount of tech firms that provide many services like state, have directly attacked national security by allowing citizens to obey or disobey their governments (Gohwong, 2017 there was also another objection with economic incentives by employer(s), called business civil disobedience. This perspective of objection was introduced by Daniel Ostas in 2010. Its intention was for increasing profit and lessening cost of business with a variety of non-violent actions such as employment of illegal workers, violation of safety regulations on sprinklers and helmets in construction firms, and delegitimation of soundinsane public policy in snail-darter case during the construction of the Tellico Dam in eastern Tennessee (Ostas, 2010).

Paradigm of Public Administration
There were many scholars who employs paradigm as age for classifying all changes in Public Administration. However, this paper used only two paradigms -Nicholas Henry's paradigm as one of the most well-known paradigm in this field of study and my paradigm in 2018 as paradigm for both state and non-state actors. The first paradigm comprised six paradigms as follows: paradigm 1the politics/administration dichotomy (1900 -1926), paradigm 2principles of Public Administration (1927 -1937), paradigm 3 -Public Administration as Political Sciences (1950 -1970), paradigm 4 -Public Administration as Management (1950 -1970), paradigm 5 -Public Administration as Public Administration (1970present), and paradigm 6governance (1990present). The last paradigm was very important because it strongly related to state minimalism and governance or network management among public sector, private sector, and people sector. Individuals and communities could play important roles in this paradigm (Henry, 2013 its reform, government-based cryptocurrencies, and so on. In contrary to the state-based paradigm, the stateless-based paradigm was another story by focusing on all affairs of citizens beyond state's jurisdiction such as cryptocurrency and blockchain, deep web and dark web, and so on (Gohwong, 2018a(Gohwong, , 2018b(Gohwong, , 2019a.

Public Administration and Products and Services Provision
Public Administration according to Leonard D. White had its scope of products and services provision for the purpose of the state such as healthcare, economy, wasteland reclamation, education, public welfare, and religion (White, 1926). However, the agencies that provided public goods and services could be public agencies, firms, voluntary and non-profit organizations (VNPOs) or non-governmental organizations (NGOs), and cooperation among these organizations (Marini, 1971, Frederickson, 1989, Osborne and Gaebler, 1992

Net States
Net states were introduced by Alexis Wichowski since 2017. Net states were as digital non-state actors that comprised giant tech companies, such as Facebook, Google, Amazon, Apple, Microsoft, and Tesla. They had four key characteristics in their products and services as follows: international domain, technology orientation, strong influence on people's belief, and active expansion to provision of public goods and services. Their products and services, therefore, could have both positive and negative effects on sovereignty of the state. For positive side, net states provided public goods and services for supporting public sector. For example, Powerpacks, battery with solar cell, by Tesla and Google's Internet Project Loon were two net states that give infrastructure-related servicesenergy via batteries and communication via Internet -to citizens in Puerto Rico after Hurricane Maria in 2017. In addition, net states promoted good governance via social media. On contrary to positive side, net states could do their own affairs arbitrarily beyond states' jurisdiction. For instance, Project Natick of Microsoft since 2015 was self-contained data centers, with 864 servers and 27.6 petabytes of storage, beyond states' jurisdiction, sunk in the ocean near Scotland's Orkney Islands beyond 12 miles offshore according to the United Nations Convention on the Law of Sea (UNCLOS). It was not only cost reduction for electricity and overheating prevention, but also non-compliance with states' laws and regulations as business civil disobedience. Furthermore, Microsoft used to deny FBI's request for data disclosure of its email user because the emails were not in US territory. This example, Microsoft protect its user from states' laws and mandates. Another instance, data brokers like Acxiom, Nielsen, Experian, Equifax, and CoreLogic bought and sold citizen's data to third parties. In addition, net states created models of individual citizen by their data. For example, Gmail scanned all contents of your personal email for showing banners in your email account and advertisement (Roach, 2018;Warren, 2018;Wichowski, 2020).

Cryptocurrency
Cryptocurrency was a code-based money with third party-free characteristics. Bitcoin, Ethereum, Ethereum Classic, Ripple, and Monero were wellknown examples of this currency. The materials of this digital money was electromagnetic. Its core technologies were programming (such as C++, Go, Python, Java, Rust, Solidity, WebAssembly, C, Haskell, Javascript / Node.js), blockchain, and cryptography with its supportive technologies (such as IoT, AI, cloud computing). According to Srirath Gohwong's studies during 2018 -2020, there were three types of cryptocurrency as follows: non-governmental cryptocurrency, government-based cryptocurrency, and quantumbased cryptocurrency (Gohwong, 2017(Gohwong, , 2018a(Gohwong, , 2018b(Gohwong, , 2019b(Gohwong, , 2020. However, only nonwww.psychologyandeducation.net governmental cryptocurrency was reviewed here due to its importance on Thais' roleboth supporting and objection. Non-governmental cryptocurrency was the most well-known currency for everyone. It comprised two key groupspublic-based cryptocurrency and privacy-based cryptocurrency. The first group could trace all information of money such as sender, receiver, and the amount of money. were examples of the latter group. Therefore, Thais could use their own considerations for doing their own affairs beyond Thai government's jurisdiction (Gohwong, 2017(Gohwong, , 2018a.

Deep Webs and Dark Webs
Deep webs and dark webs as underground web sites were direct threats to sovereignty of every state because they were 96% of total web sites beyond states' jurisdiction whereas the rest were surface webs or normal web sites in everyday life. Deep webs were dedicated to two objectives -(1) to use for internal lawful affairs of general organization, and (2) to use for illegal affairs (such as drugs, weapons, contract killing, fraud such as cloned credit card, hacking, and pornography). Dark webs were subset of deep webs for illegal affairs only, approximately 3% of total deep webs. They both could not be accessible by conventional search engines and commonlyused web browsers (such as Microsoft Edge, Mozilla Firefox, Opera, Google Chrome). TOR and I2P were two examples of special web browsers for deep webs and dark webs. In addition, they could be used by cybercriminals with privacy-based cryptocurrencies to do stateless-based illegal affairs beyond states' jurisdiction (Gohwong, 2018a(Gohwong, , 2019a.

Constitution of the Kingdom of Thailand 2017
Thailand was the same as every country in the world by using constitution as highest law for determining the scope of national security and guaranteeing human rights and liberties under rule of law. The latest constitution was the twentieth constitution that enacted on April 6, 2017. For the first intention of Constitution, national security of Thailand was not a new issue in Constitution of Thailand. In fact, it was determined in all Constitutions by the drafters as follows: monarchical institution, democratic regime of government with the King as Head of State, independence, sovereignty, territorial integrity, economic security, martial security, religious institution, public safety and order, and readiness of country to handle all forms of threat (Interim Charter for the Administration of Siam For the latter intention, it guaranteed individual rights and liberties of Thais except the necessity of public interest under related laws, especially the lawful use of personal data (Section 32), freedom of opinions expression in speech, writing, and printing or any other means (Section 34), freedom of communication by any means (Section 36), accessibility of public data and public agency data according to law, petition submission to public agencies and prosecution of public agencies for liability (Section 41), Freedom of establishment of any association, co-operative, union, organization, community, or any other group (Section 42), a joint petition submission by individuals and a community to public agencies for proposing recommendations or refraining from action (Section 43), and freedom of peaceful assembly (Section 44) (Constitution of the Kingdom of Thailand 2017).

National Security Council Act 2016
National Security Council Act 2016 was the law that defined the current definition of National security of Thailand as the state of being free from any threat to Thailand in the following issues: independence, sovereignty, territorial integrity, religious institution, monarchical institution, public safety, peaceful livelihood, national interests, and democratic regime of government with the King as Head of State. In addition, it was also the readiness of country to handle all forms of threat (National Security Council Act 2016

Cybersecurity Act 2019
Cybersecurity Act 2019 intention mainly focused on a defense of sovereignty, especially national security, economic security, martial security, and public order, from both external and internal cyber-attacks via management of Critical Information Infrastructure organizations (CII organizations). There were a set of related agencies at different level of administration as follows: strategic (such as National Cyber Security Committee (NCSC), MDES, authorized court, Office of the National Cybersecurity Committee for providing academic job and routine jobs of NCSC and the CRC), middle (such as Cybersecurity Regulating Committee (CRC), authorized court), and operational (Supervising organization, CII, Committee Managing the Office of the National Cybersecurity Committee (CMO), National Security Council). Cyber-attacks were determined by NCSC in three levelsnoncritical level, critical level, and crisis level. Penalty were maximum fine and/or imprisonment, based on violation of confidentiality, integrity, and availability of data (Cybersecurity Act 2019; Gohwong, 2019c).

Personal Data Protection Act 2019
This act was promulgated in the Government Gazette on May 27, 2019 under the pressure from the application of General Data Protection Regulation (EU GDPR) 2016/679 on May 25, 2018 in order to enhance data governance, especially data security, data privacy, transparency of data use. There were key issues in this Act as follows: (1) it protected rights of citizens as data subjects. Personal data of citizens stood for any personal data for both direct and indirect person identification, except data of the death, (2) data collection, data storage, data security, disclosure, and dissemination, data application and data transferring between agencies in public, private, and people sector were key activities in this Act, (3) data owner must provide consent to the collection, use and disclosure of personal data only for the purposes specified by the user collection. In addition, the data owner had rights to withdraw consent and request to delete or destroy data at any time, (4) all related agencies that did all aforementioned activities were two typesdata controller and data processor, both inside and outside of Thailand. Data controller was a person or a juristic person with decisionmaking power about personal data's collection, use, and disclosure. Data processor was a person or a juristic person who did personal data's collection, use, and disclosure, both direct implementer and agent on behalf of data controller. Data processor was not data controller. Data processor must maintain data security, especially integrity and confidentiality, and (5)

Digital Government Administration and Services Act 2019
The act is well-known for general people as Digital Government Act. It mainly focused on data governance in the Thai public sector that promote standardized data management of public agencies sector in Thailand in eight activitiesdata acquisition, data storage, data classification, data processing, data cleaning, data security, disclosure, and dissemination, data application, data deletion and erasure (Digital Government Administration and Services Act 2019). They complied with government's public policies such as tax payment, in the surface web sites, accessed by commonly used web browsers like Microsoft Edge, Mozilla Firefox, Google Chrome, Opera and so on, that were easily monitored by Thai government. Thai citizens were treated as citizen-user whom Thai public agencies provided public goods and services with efficiency, effectiveness, and economy due to strong influence of New Public Management (NPM) in Thai public reform. Unfortunately, this supporters-oriented role of Thai citizens had very little impact with national security because the size of surface web sites was only 4% of total web sites. For example, Thai citizens inevitably used Thai Baht as national currency, both cash and cashless form (such as debit cards, credit cards, telephone banking, Internet banking, Bank of Thailand Automated High-value Transfer Network (BAHTNET), PromptPay), to do any transaction in all of their financial activities under easily monitoring and controlling of many third-parties such as Ministry of Finance (MOF), Bank of Thailand (BOT), commercial banks, financial institutions. MOF and BOT officially monitored and controlled all money-related affairs in Thailand (such as money supply, money transfer) by using various mechanisms of monetary policy, fiscal policy, and government-based IT. Therefore, Thai government could respond to any illegal affair as threat against national security such as tax evasion, money laundering, terrorism financing, fraud in investment, bribery and corruption, drug trafficking, and human trafficking. However, on contrary to the supporters-oriented role, Thai citizens could become high-impact objectors to national security due to the emerging of external changes with net states, nongovernmental cryptocurrency (such as Bitcoin (BTC), Ethereum (ETH), Ripple (XRP), Bitcoin Cash (BCH), Litecoin (LTC), Stellar (XLM), and Ethereum Classic (ETC), Monero (XMR)a key privacy-based cryptocurrency for profiting, cryptojacking or illegal mining, and illegal money transfer), deep webs and dark webs with 96% of web sites, accessed by underground web browsers such as TOR and I2P. The anti-state role would be presented as follows: First, the most popular underground web browsers in Thailand was TOR with www.psychologyandeducation.net approximately 2,656,342 nodes or users according to Tor Metrics' data on 2 July 2020, including relay users and bridge users (Tor Metrics, 2020a, 2020b), or 5.1% of total Thai internet subscriber of 2020, 52,000,000 subscribers (Kemp, 2020). For I2P, its users in Thailand according to I2P Metrics' data on 2 July 2020 was 85 routers (I2P Metrics, 2020), or .0002% of total mentioned Thai internet subscriber of 2020. Second, non-governmental cryptocurrency allowed Thai citizens to easily disobey Thai government for illegal affairs (such as organized crime, terrorist financing, tax evasion, and cryptojacking or illegal mining) without Thai government's monitoring and controlling because Thai citizens could easily hide their identities, data about money transfer (such as amount, sender and receiver) by using privacy-based cryptocurrency such as Monero (XMR), Zcash (ZEC), and Zcoin (XZC). For example, 83 Thais from 2,055 Thai respondents according to the survey of Siam Blockchain during 5 -12 July 2017 employed Monero (17 Thais), Zcash (62 Thais), and Zcoin (4 Thais) for making profits (Siam Blockchain, 2017). Furthermore, they could be much more anonymous when they employed privacy-based cryptocurrency with web browsers for underground web sites. For instance, according to the data of Unit 42a global threat intelligence team at Palo Alto Networks, XMRig miner, a modified open sourced Monero CPU Miner for illegal Monero mining, was downloaded by cybercriminals from Thailand for making Profit from cryptojacking more than 3,545,437 times during October 2017 -January 2018 as ranked number one, almost doubled in number two -Vietnam 1,830,065 times. This cryptojacking employed XMRig mining software via VBS files and BITSAdmin for downloading scripts and XMRig mining tool from a remote location, XMRig proxy services for hiding the ultimate mining pool destination, and Nicehasha well-known marketplace for buying and selling hashing processing power (Grunzweig, 2018;Gohwong, 2019d), Last, net states like Microsoft, Google, Facebook, and Amazon challenged Thailand's sovereignty by intervening in the public service provision of Thai government, both economic and social affairs, and protecting their Thai citizens as their citizen-user from Thai government. The first issue on Thai public service provision was presented as follows: For Microsoft, it played an important role in public service provision of Thailand via its social programs and economic stimulus programs. For instance, Microsoft provided its social programs in 2020 such as financial service provision to Thai farmers affected by CoV19 through cooperation among Thailand's Bank of Agriculture and Agricultural Cooperatives (BAAC), Microsoft Thailand, and Bluebik Group via https://agri.baac.or.th/ website and app; data management of on public restrooms hygiene by using a mobile app and Microsoft AI and Cognitive Services through cooperation between Thailand's Ministry of Public Health and Microsoft Thailand for identifying public health risks and notifying local restroom operations staffs to improve sanitation conditions; online learning during COVID-19 pandemic via Microsoft Teams for Education for 150 Thai universities through cooperation between Ministry of Higher Education, Science, Research and Innovation and Microsoft Thailand. Another instance, Microsoft provided its economic stimulus programs in 2020 such as "Hack the Future: Business Rebound Edition" project was an economic stimulus program through cooperation between Microsoft Thailand and RISE, Southeast Asia Regional Enterprise Innovation Accelerator for increasing competitive edges of Thai SME entrepreneurs by finding the best three startups, each of three problemsmanufacturing sectors and IoT-related business groups, retail industry and restaurant service, medical service and tourism, to bring their solutions on Microsoft Azure cloud platform to market together with Microsoft; AI lab for farming sector and the smart city project to startups, universities and R&D organizations in accessibility of Microsoft research lab and a ISSN: 00333077 1846 www.psychologyandeducation.net digital platform through cooperation between Microsoft Thailand and MDES (Microsoft, 2019(Microsoft, , 2020a(Microsoft, , 2020b(Microsoft, , 2020cSamejaidee, 2019). For Google, it had an important role in public service provision of Thailand via its social programs and economic stimulus programs. Since 2018, Google implemented its "Leave No Thais Behind" strategy under "Google for Thailand" project in four areas since 2018 as follows: "Google Station" as its high-speed public WiFi through a partnership with CAT Telecom for increasing internet access, "Google Space" as its digital skills training facility in Bangkok with its partner -True Digital Park, "YouTube Pop-Up Space" in Bangkok in order to localize content and local products according to the needs of Thais, and Google My Business, a free business listing on Google Search and Google Maps, for supporting Thai SMEs and startups to grow efficiently with a collaboration with Siam Commercial Bank. In addition, in 2019, Google expanded its scope of AI-related research in diabetic retinopathy screening through cooperation with Department of Medical Services, Ministry of Public Health. The enlargement was to increase the number of clinics from 1 to 8 clinics, including Bangkok, Pathum Thani and Chiang Mai (Tortermvasana, 2018; Manager Online, 2019). For Facebook, it had an important role in public service provision for strengthening society and economy of Thailand. For instance of social issue, Facebook offered Thais to create their own groups for sharing mutual interests and building a strong online community, at least one million groups. "Help Us Read Thai community" for visually impaired or blind people, "Run2gether" for disabilities and normal people, and "HandUp Network" with more than 5,000 volunteers in professional fields for supports non-profit organizations were three dedicated groups for strengthening Thai society. Another instance of economic issue, Live feature and Marketplace feature, developed from Live feature, were Facebook products in order to promote e-Commerce for Thai SMEs (Areeperphon, 2018).
For Amazon, it also had an important role in public service provision for society and economy of Thailand through EdStart global program, run by its own company -Amazon Web Services (AWS). AWS joined with OpenDurian, abbreviate from Open-Du (Thai word for watch in English)rian (Thai word for study in English), a Thai local startup (EdTech) for making a cloud-based platform for learning and test-preparation (such as English language test, General Aptitude Test (GAT), Professional and Academic Aptitude Test in Mathematics (PAT1), SAT, Chulalongkorn University Academic Aptitude Test (CU-AAT), Scholastic Manage-ment Aptitude Requirement Test -I (SMART-I) for admission to a bachelor's degree in accounting and business administration of Thammasat University, Doctor Aptitude Test, biology and mathematics) to serve three million users in Thailand, including students and working people. In addition, this startup also offered some free exam for helping students (OpenDurian, 2017; Toomgum, 2019). In addition, the latter issue on the user protection of Microsoft, Google, and Facebook was found that they hardly protect their users by often obeying Thai laws as follows: For Microsoft, it did not protect its Thai users by revealing its user's sensitive data under valid legal orders to Thai government.

Discussion
National security was an important aspect of sovereignty. It needed the strong cooperation between Thai government and citizens. As good citizens as supporters of Thai government's jurisdiction, citizens must comply with all laws. However, the growth in the number of IT-related laws in Thailand, such as Computer-related Crime Act (No.2) 2017, Ministry Enhancing Act (Book no.17) 2016 (Establishing the Ministry of Digital Economy and Society), Cybersecurity Act 2019, Personal Data Protection Act 2019, and Digital Government Administration and Services Act 2019, reflected the increased digital control of citizens by the Thai government. For example, Thailand was one of three countries, along with Singapore and Vietnam, in ASEAN who enacted Cybersecurity Act for effectively coping with cyber-attacks. These laws were not only enhancement of national security, protection of rights, protection, and remedy of cyber-attacks, but also controlling of money supply and transactions in Thailand. For enhancement of national security, protection of rights, protection and remedy of cyber-attacks, the enforcement of these IT-related laws allowed MDES and related authorized agencies that increased the level of controlling on data via surface web sites because data were monitored and controlled in every processes in public agencies by data governance and personal data protection. In addition, data accessibility by Thai governments to IT devices and computer systems of non-government sectors could be easily done by NCSC's violence assessment of cyber-attacks. For example, NCSC might assign Secretary General of NCSC to do all necessary measures for protection and remedy of cyber-attacks without court's order in the crisis level. In addition, Thai government and Bank of Thailand (BOT) used both cash and cashless fiat currency (such as debit card, credit card, BAHTNET, and PromptPay) and Inthanon as Thai government-based cryptocurrency for controlling of money supply and transactions. Money is one of the most important resources in state administration because Thai government use money for providing public goods and services and controlling money supply and money transfer in order to achieve sustainable growth economy with cybersecurity. However, though many Thai citizens were good supporters of Thai government, Thai citizens had another alternative by using disruptive technologies for doing their stateless-oriented activities. These objectors, then, became direct severe threats against national security and sovereignty of Thailand because they committed civil disobedience-oriented activities beyond Thai government's jurisdiction. State monopoly in the provision of public goods and services obviously  Metrics, 2020aMetrics, , 2020b, though the number of users was quite small -2,656,342 TOR's users (5.1% of total Thai internet subscriber of 2020), 85 I2P's users (.0002% of total Thai internet subscriber of 2020), and 83 Thais (4% of total respondents according to the Siam Blockchain's survey in 2017), it should be noted here that it was the beginning of stateless-oriented affairs in Thailand. These affairs implied that Thai government had no absolute capability to control both its own internal and external affairs anymore. A small number of Thais could do their own affairs arbitrarily beyond Thai government's jurisdiction. For example, Thais directly did peer-to-peer money transfer by themselves without BOT as third party by using Monero, Zcash, and Zcoin (Siam Blockchain, 2017; Gohwong, 2018b). Another example, tax payment became consideration of Thai citizens due to anonymous state of Monero, Zcash, and Zcoin, not a determined duty in the Section 50 of Constitution of Thailand 2017 anymore (Constitution of the Kingdom of Thailand 2017; Gohwong, 2018b). In addition, Thai citizens were not only Thai citizen-user, but also net states' citizen-user. On contrary to Thais as citizen-user of state, online habits of Thai citizens as net states' citizen-user (such as post, like, tweet, web site visiting, search, shopping) directly affected the provision of goods and services by net states because these online habits were citizen-user' votes for desired goods and services of net states. Therefore, net states sometimes did not comply with Thai laws in order to protect Thai citizens as their citizen-user as a business civil disobedience. For example, Google sometimes did not remove contents in response to valid legal requests from MDES and a member of Royal Thai Parliament (Google, 2019). Another example was Facebook who did not provide account information or content of any Facebook user to Thai government. Facebook did only content access blocking for Thai users (The Nations, 2016; Facebook, 2020a, 2020b). In addition, Microsoft, Google, Facebook, and Amazon cooperated with Thai public agencies in public service provision via their social programs (such as Microsoft Thailand's financial service provision to Thai farmers affected by CoV19, data management for clean public restrooms, online learning during COVID-19 via Microsoft Teams for 150 Thai universities (Microsoft, (Areeperphon, 2018); Amazon cooperation with OpenDurian (OpenDurian, 2017; Toomgum, 2019)). These projects made net states influence Thai government, Thai firms, and Thai society by increasing switching cost for their users. These users would encounter significant difficulties when switching from one product/service to another because user acquaintance, software maintenance, and software update increase level of dependency on Microsoft. In conclusion, the findings of Thais as supporters and objectors of Thai government revealed the starting point of paradigm shift in Public Administration from state-based Public Administration to stateless-based Public Administration (Gohwong, 2018b). For statebased Public Administration, partnership among public, private, and people sector was still an important mechanism for public service provision in Thailand. However, Thai government did not have absolute power for managing all affairs ISSN: 00333077 1849 www.psychologyandeducation.net under its jurisdiction anymore due to the emerging of net states. For example, Thai government must make requests to Google (for removing all or part of the content on Google services) and Facebook (for blocking content access). In addition, Thai government depended on net states with its cooperation with these giant tech companies. For example, DSI used Microsoft SQL Server 2012 for automated notification of any suspicious persons or activities. On contrary to state-based Public Administration, stateless-based Public Administration gradually decrease Thai government's absolute power on its affairs by the emerging of cryptocurrency and underground web sites and browsers. Legal compliance of Thais (such as money transfer, buying and selling cryptocurrency) sometimes was under their consideration.

Conclusion
Nowadays Thai citizens has a big role as both supporters and objectors for national security of Thailand due to both external and internal settings. They are treated by both Thai government and net states as citizen-user with different treatment. Thai government treats citizen-user as client whereas net states treat citizen-user as both voter and client.