Surveillance and Privacy in Indonesia

Size: px
Start display at page:

Download "Surveillance and Privacy in Indonesia"

Transcription

1

2 Surveillance and Privacy in Indonesia

3 Table of Contents Preface I. Introduction... 1 II. Enabling Statutes and Authorization... 6 III. Cases in Indonesia A. Constitutional Court Judgment No. 006/PUU-I/2003, Judicial Review on Law No.30 of 2002 concerning Commission on Eradication Corruption (KPK) B. Constitutional Court Judgment No. 5/PUU-VIII/2010 Law No.11 of 2011 concerning Electronic Information and Transaction Interception under Government Regulation C. Constitutional Court Judgment No. 012, 016/PUU-IV/ IV. Technical Aspect on Lawful Interception in Indonesia V. Surveillance Licensing Mechanisms VI. Privacy: The Indonesian Perspective VII. Conclusion Annexes

4 Preface This research report as result of collaboration project between The Cyber Law Center, Faculty of Law, Padjadjaran University and Privacy International in second year. The research project is to conduct research on the surveillance and Privacy in Indonesia, the objectives of the research study is to study and analyze the legal aspects of privacy and surveillance, were: (i) to views the legal aspects the surveillance expecialy for legal enforcement ; (ii) to give the recommendation to the government in drafting a Bill surveillance mechanism for legal enforcement. on Surveillance is defined as tacitly accept or listen to communication. Usually surveillance refers to acceptance in secret by law enforcement agencies to covertly receive or listen to a communication. Based on this definition, surveillance is an activity that is typically used by law enforcement institution to accept or listen to certain personal communication in secret, in carrying out their duties and obligations. 1 Time after time, public consider that surveillance activity is an improper usage or treatment of an entity and a violation of human rights. National Security Agency (NSA) surveillance case attracts public attention relating to above mentioned issue. One of the security agencies in USA, NSA was conducted wiretaps against the citizens of the United States and against other countries. The case leads to separation of legal opinion among jurists in USA. Washington DC Federal Court in a lawsuit filed by Larry Klayman, a 1 Bryan A Garner, Black s Law Dictionary Ninth Edition, Dallas, Texas: West Publishing, 2009, page 883.

5 conservative legal activists, decided that the NSA's efforts violate the Fourth Amendment protections against unreasonable searches privacy. 2 Meanwhile, dissenting decision came from the New York District Court. William Pauley, In a lawsuit filed by the American Civil Liberties Union, decided that the NSA interception is legal because the intention of such activity is for combating terrorism,. USA have a trauma about terrorism because of 2001 "nine-eleven" tragedy. 3 Surveillance activities brought strong reactions from various states, especially state that consider themselves as surveillance victim such as Germany, Brazil and Mexico. On November 7, 2013, Germany and Brazil submitted draft resolution on the protection of privacy rights against unauthorized wiretapping in the digital age to the United Nations General Assembly (hereinafter referred to as UN General Assembly) which later on December 18, 2013 the UN General Assembly endorsed the draft to the UN General Assembly Resolution A / Res / 68/167 on The rights to Privacy in the digital Age. Article 4 paragraph (a) of the UN General Assembly Resolution A / Res / 68/167 explicitly ask all states to respect and protect privacy right, including privacy rights in digital communications. Moreover, member states are also requested to review the procedures, practices and legislation related to the communication reconnaissance so that such activities conform with international human rights law as stipulated in Article 4 (c) of the UN General Assembly Resolution A / Res / 68/ In Indonesia, surveillance activities was in widespread known since information the Palapa-A I Satelite launching on July 9, Recorded 2 AntaraNews.com, Hakim Putuskan Penyadapan NSA Illegal, downloaded 22th of January, 2014, WIB. 3 Philippe Huguen, Judge Rules NSA Phone Surveillance Is Legal. Is a Supreme Court Intervention Inevitable?, www. nationaljournal. com/technology/judge-rules-nsa-phone-surveillance-is-legal-is-a-supreme-courtintervention-inevitable , downloaded 20th of January, 2014, WIB. 4 Article 4 subesction (c) Resolusi Majelis Umum PBB A/Res/68/ Papper, Naskah Akademik RUU Penyadapan, Trias Yuliana Dewi et. Al., p. 1.

6 in its development, surveillance has got public attention in about 1999, where one of Indonesian national magazine published an recording of conversation between the Attorney General and the President of Indonesia that time. 6 In 2009, Indonesia faced surveillance issue lead to confrontation between the two law enforcement agencies, the Commission against the Indonesian National Police. This issue triggered distrust between the two law enforcement agencies. 7 The development of technology have been used for law enforcing activity. However, in Indonesia, surveillance activity surveilance also gives serious impact on political and security dimension. Currently, Indonesia have several regulations relating to surveillance, those are: 1. Act No. 5 of 1997 on Psychotropic Substances, 2. Act No. 31 of 1999 on the Eradication of Corruption, 3. Act No. 36 of 1999 on Telecommunications, 4. Act No. 39 of 1999 on Human Rights, 5. Act No. 30 of 2002 on the Corruption Eradication Commission, 6. Government regulation to raplace act (Peraturan Pemerintah Pengganti Undang-Undang) No. 1 of 2002 on Combating Terrorism, 7. Act No. 18 of 2003 on Advocates, 8. Act No. 21 of 2007 on the Eradication of Trafficking in Persons, 9. Act No. 11 of 2008 on Information and Electronic Transaction, 10.Act No. 35 of 2009 on Narcotics, 11. Act No. 46 of 2009 on Crime Court Corruption, 12.Act No. 17 of 2011 on the National Intelligence, 13. Precidential Regulation No. 90 of 2012 on State Intelligence Agency 6 Ibid 7

7 14. Ministry of Communication and Information Technology Regulation No. 11 / PER / M.KOMINFO / 02/2006 on Information Surveilance Technique, and 15.Draft of Criminal Procedure Code. The diversity of the relevant regulations related to surveillance activity become human rights protection society concern. In practice, in a number of cases, surveillance was conducted outside its original purpose for law enforcement. Besides that, surveillance activity triggered clash between two law enforcing institutions in Indonesia so that surveillance have become debate topic in Indonesia. This Research was intended to study best practical solution for maximizing surveillance function as a law enforcing tool in Indonesia. Law enforcer must use surveillance to unveil criminal cases in Indonesia instead of using surveillance outsider law enforcing function. The study is important because the development forms of new criminal offenses are very difficult to solve by conventional means (without surveillance).

8 I. Introduction Information and communication technologies have supported interception since the era of Morse s telegraph. Interception is actively practiced worldwide with an increasing number of applications. 8 Wiretapping is the traditional term for interception of telephone conversations. This should not be taken too literally. The word is no longer restricted to communications travelling by wire, and contemporary wiretaps are more commonly placed on radio links or inside telephone offices. The meaning has also broadened in that the thing being tapped need no longer be a telephone call in the classic sense; it may be some other form of electronic communication, such as fax or data. 9 The origins of wiretapping lie in two quite different practices: eavesdropping and letter opening. "Eavesdropping," although once more restricted in meaning, has come to describe any attempt to overhear conversations without the knowledge of the participants. "Letter opening" takes in all acquisition, opening, reading, and copying of written messages, also without the knowledge of the sending and receiving parties. Telecommunication has unified and systematized these practices. Before the electronic era, a conversation could only be carried on by people located within earshot of each other, typically a few feet apart. Neither advanced planning nor great effort on the part of the participants was required to ensure a high degree of security. Written communications were more vulnerable, but intercepting one was still a hit-or-miss affair. Messages traveled by a variety of postal 8 International Telecommunication Unions, Technical Aspect of Lawful Interception, Technology Watch Report #6, May 2008, p.6 9 Whitfield Diffie and Susan Landau, Privacy on the Line The Politics of Wiretapping and Encryption, The MIT Press Cambridge, Massachusetts London, England, 1998, p Surveillance and Privacy in Indonesia Cyberlaw Centre Padjadjaran University

The National Security Agency s Warrantless Wiretaps

The National Security Agency s Warrantless Wiretaps The National Security Agency s Warrantless Wiretaps In 2005, the press revealed that President George W. Bush had authorized government wiretaps without a court warrant of U.S. citizens suspected of terrorist

More information

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further

More information

Emerging Technology and the Fourth Amendment

Emerging Technology and the Fourth Amendment Saber and Scroll Volume 1 Issue 1 Spring 2012 (Edited and Revised April 2015) Article 10 March 2012 Emerging Technology and the Fourth Amendment Kathleen Mitchell Reitmayer American Public University System

More information

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security. Government Surveillance of Citizens Raises Civil Liberty Concerns Two revelations about government programs designed to sift through the public s phone calls and social media interaction have raised questions

More information

Confrontation or Collaboration?

Confrontation or Collaboration? Confrontation or Collaboration? Congress and the Intelligence Community Electronic Surveillance and FISA Eric Rosenbach and Aki J. Peritz Electronic Surveillance and FISA Electronic surveillance is one

More information

The Supreme Court, Civil Liberties, and Civil Rights

The Supreme Court, Civil Liberties, and Civil Rights MIT OpenCourseWare http://ocw.mit.edu 17.245 The Supreme Court, Civil Liberties, and Civil Rights Fall 2006 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.

More information

I. REGULATION OF INVESTIGATORY POWERS BILL

I. REGULATION OF INVESTIGATORY POWERS BILL These notes refer to the Regulation of Investigatory Powers Bill as introduced in the House of Commons on 9th February 2000 [Bill 64] I. REGULATION OF INVESTIGATORY POWERS BILL II. EXPLANATORY NOTES INTRODUCTION

More information

KPK Authority Review in the Impact of Corruption Eradication

KPK Authority Review in the Impact of Corruption Eradication IOSR Journal Of Humanities And Social Science (IOSR-JHSS) Volume 22, Issue 8, Ver. I (August. 2017) PP 88-92 e-issn: 2279-0837, p-issn: 2279-0845. www.iosrjournals.org KPK Authority Review in the Impact

More information

Cell Site Simulator Privacy Model Bill

Cell Site Simulator Privacy Model Bill Cell Site Simulator Privacy Model Bill SECTION 1. Definitions. As used in this Act: (A) Authorized possessor shall mean the person in possession of a communications device when that person is the owner

More information

TITLE III WIRETAPS. WHO S LISTENING?

TITLE III WIRETAPS. WHO S LISTENING? TITLE III WIRETAPS. WHO S LISTENING? Between the years 2002 and 2012, State and Federal Judges across the United States received 23,925 applications for wiretaps. All but 7 were granted. 1 In 2012, there

More information

SUPREME COURT OF THE UNITED STATES

SUPREME COURT OF THE UNITED STATES (Slip Opinion) OCTOBER TERM, 2017 1 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus

More information

FILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8

FILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8 Case 1:07-cv-01732-RBW Document 1 Filed 09/27/07 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA FILED SEP 2 7 2007 NANCY MAYER WHITTINGTON, CLERK U.S. DISTRICT COURT ELECTRONIC

More information

Aspects of Criminal Procedural Law in Argentina.

Aspects of Criminal Procedural Law in Argentina. Aspects of Criminal Procedural Law in Argentina. The purpouse of this brief presentation is to inform about the reform underway in Criminal Procedure Law and its compliance with the standards of the CoC.

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Indonesia's new anti-terrorism regulations Author(s) Sebastian, Leonard C Citation Sebastian, L. C. (2002).

More information

In this early case the Human Rights Committee established its position on the extraterritorial effect of the ICCPR:

In this early case the Human Rights Committee established its position on the extraterritorial effect of the ICCPR: International Covenant on Civil and Political Rights: Key elements in the context of the LIBE Committee inquiry. Professor Martin Scheinin 14 October 2013 The Covenant was adopted and opened for signature,

More information

Reauthorization of the FISA Amendments Act

Reauthorization of the FISA Amendments Act Edward C. Liu Legislative Attorney April 8, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42725 Summary On December 30,

More information

National Security Law Class Notes

National Security Law Class Notes National Security Law Class Notes Legal Regulation of Intelligence Collection I. Collecting Communications Content I Foundations of Constitutional and Statutory Constraint Intelligence cycle flow chart

More information

LEGAL ISSUES REGARDING SECRET COMMUNICATION SURVEILLANCE IN SERBIA

LEGAL ISSUES REGARDING SECRET COMMUNICATION SURVEILLANCE IN SERBIA Milošević M., Mаtić G. D. LEGAL ISSUES REGARDING SECRET COMMUNICATION LEGAL ISSUES REGARDING SECRET COMMUNICATION SURVEILLANCE IN SERBIA Milosevic Milаn 1, Mаtic Gorаn D. 2 1 ALFA University, Belgrade,

More information

Statement for the European Parliament, Temporary Committee on the ECHELON interception system, meeting of Thursday, 22 March, 2001, Brussels.

Statement for the European Parliament, Temporary Committee on the ECHELON interception system, meeting of Thursday, 22 March, 2001, Brussels. Statement for the European Parliament, Temporary Committee on the ECHELON interception system, meeting of Thursday, 22 March, 2001, Brussels. Session on exchange of views on Legal Affairs, Human Rights

More information

Privacy And? Surveillance

Privacy And? Surveillance University of Leeds From the SelectedWorks of Subhajit Basu Fall November 28, 2015 Privacy And? Surveillance Subhajit Basu Available at: https://works.bepress.com/subhajitbasu/88/ School of something FACULTY

More information

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

DRONES VERSUS SECURITY OR DRONES FOR SECURITY? DRONES VERSUS SECURITY OR DRONES FOR SECURITY? Anton MANDA, PhD candidate * Abstract: Drones represent the most controversial subject when it comes to the dimension of national security. This technological

More information

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips Brief Course Description: Syllabus Law 641-001: Surveillance Law Seminar George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall Professor Jake Phillips This seminar course will expose

More information

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been Issue #35, Winter 2015 Infiltrate the NSA To re-establish the balance between security and civil liberties, we don t just need more laws. We need more civil libertarians in the security state. Margo Schlanger

More information

Organization of American States OAS Inter-American Drug Abuse Control Commission CICAD. Multilateral Evaluation Mechanism MEM.

Organization of American States OAS Inter-American Drug Abuse Control Commission CICAD. Multilateral Evaluation Mechanism MEM. Organization of American States OAS Inter-American Drug Abuse Control Commission CICAD Multilateral Evaluation Mechanism MEM Ecuador 2005 PROGRESS REPORT IN DRUG CONTROL IMPLEMENTATION OF RECOMMENDATIONS

More information

Reauthorization of the FISA Amendments Act

Reauthorization of the FISA Amendments Act Edward C. Liu Legislative Attorney September 12, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42725 Summary Reauthorizations

More information

ELECTRONIC SURVEILLANCE. Attacking Insider Trading and Other White Collar Cases Built on Evidence From Government Wiretaps: The Nuts and Bolts

ELECTRONIC SURVEILLANCE. Attacking Insider Trading and Other White Collar Cases Built on Evidence From Government Wiretaps: The Nuts and Bolts Criminal Law Reporter Reproduced with permission from The Criminal Law Reporter, 92 CrL 550, 02/13/2013. Copyright 2013 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com ELECTRONIC

More information

Peace Agreements Digital Collection

Peace Agreements Digital Collection Peace Agreements Digital Collection East Timor >> On the Question of East Timor Agreement Between the Republic of Indonesia and the Portuguese Republic on the Question of East Timor Table of Contents Text

More information

PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND TEL: / FAX:

PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND   TEL: / FAX: PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND www.ohchr.org TEL: +41 22 917 9543 / +41 22 917 9738 FAX: +41 22 917 9008 E-MAIL: registry@ohchr.org Mandate of the Special Rapporteur on the promotion and

More information

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden. Deutscher Bundestag 1st Committee of Inquiry in the 18th electoral term Hearing of Experts Surveillance Reform After Snowden September 8, 2016 Written Statement of Timothy H. Edgar Senior Fellow Watson

More information

SUPREME COURT OF THE UNITED STATES

SUPREME COURT OF THE UNITED STATES Cite as: 547 U. S. (2006) 1 NOTICE: This opinion is subject to formal revision before publication in the preliminary print of thfe United States Reports. Readers are requested to notify the Reporter of

More information

A Protocol Against Trafficking in Persons: Is it Enough? The Impact of a Trafficking Treaty

A Protocol Against Trafficking in Persons: Is it Enough? The Impact of a Trafficking Treaty University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Second Annual Interdisciplinary Conference on Human Trafficking, 2010 Interdisciplinary Conference on Human Trafficking

More information

Legislative Brief The Information Technology (Amendment) Bill, 2006

Legislative Brief The Information Technology (Amendment) Bill, 2006 Legislative Brief The Information Technology (Amendment) Bill, 2006 Highlights of the Bill The Bill was introduced in the Lok Sabha on 15 th December, 2006 and referred to the Standing Committee on Information

More information

1. Network Individualism

1. Network Individualism 1. Network Individualism Network individualism as a theory embraces the responsibility of the individual to maintain his or her own personal networks. This sub group of active network is co-dependent on

More information

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES AT A HEARING ENTITLED ENCRYPTION TIGHTROPE: BALANCING AMERICANS

More information

Case3:08-cv MMC Document86 Filed12/02/09 Page1 of 8

Case3:08-cv MMC Document86 Filed12/02/09 Page1 of 8 Case:0-cv-00-MMC Document Filed/0/0 Page of IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA 0 United States District Court For the Northern District of California CUNZHU ZHENG,

More information

LAW ON ELECTRONIC COMMUNICATIONS CONTENTS

LAW ON ELECTRONIC COMMUNICATIONS CONTENTS LAW ON ELECTRONIC COMMUNICATIONS CONTENTS CHAPTER ONE... 4 GENERAL PROVISIONS... 4 CHAPTER TWO... 4 OBJECTIVES AND PRINCIPLES... 4 CHAPTER THREE... 5 STATE GOVERNANCE OF ELECTROINIC COMMUNICATIONS... 5

More information

Investigatory Powers Bill

Investigatory Powers Bill Investigatory Powers Bill How to make it fit-for-purpose A briefing for the House of Lords by the Don t Spy on Us coalition Contents Introduction 1 About Don t Spy on Us 1 The Bill fails to introduce independent

More information

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING INTRODUCTION 1.1. In its report, Under Surveillance, JUSTICE came to the overall conclusion that the present legislative and procedural framework

More information

Federal Law No. 144-FZ on Operational - Search Activities (1995, lastly amended 2004)

Federal Law No. 144-FZ on Operational - Search Activities (1995, lastly amended 2004) English Version - Русская версия Legislationline.org Legislationline Federal Law No. 144-FZ on Operational - Search Activities (1995, lastly amended 2004) Posted March 22, 2006 Country Russian Federation

More information

January 14, Dear Chairman Graham and Ranking Member Feinstein:

January 14, Dear Chairman Graham and Ranking Member Feinstein: January 14, 2019 The Honorable Lindsey Graham, Chairman The Honorable Dianne Feinstein, Ranking Member U.S. Senate Committee on the Judiciary Dirksen Senate Office Building 224 Washington, DC 20510 Dear

More information

Director: Mr Yaman Akdeniz Tel: Fax:

Director: Mr Yaman Akdeniz Tel: Fax: Cyber-Rights & Cyber-Liberties (UK) Faculty of Law University of Leeds Leeds LS2 9JT Director: Mr Yaman Akdeniz (lawya@cyber-rights.org) Tel: 0498 865116 Fax: 0113 2335056 Open Letter to: The Right Honourable

More information

Unofficial Translation TELECOMMUNICATIONS BUSINESS ACT, B.E (2001) 1

Unofficial Translation TELECOMMUNICATIONS BUSINESS ACT, B.E (2001) 1 Unofficial Translation TELECOMMUNICATIONS BUSINESS ACT, B.E. 2544 (2001) 1 BHUMIBOL ADULYADEJ, REX. Given on the 9th Day of November B.E. 2544; Being the 56th Year of the Present Reign. His Majesty King

More information

Syllabus Law 641: Surveillance Law Seminar. George Mason University Law School Spring Jamil N. Jaffer

Syllabus Law 641: Surveillance Law Seminar. George Mason University Law School Spring Jamil N. Jaffer Brief Course Description: Syllabus Law 641: Surveillance Law Seminar George Mason University Law School Spring 2014 Jamil N. Jaffer This seminar course will expose students to laws and policies relating

More information

Law Commission Review of the Search and Surveillance Act 2012

Law Commission Review of the Search and Surveillance Act 2012 Law Commission Review of the Search and Surveillance Act 2012 Contact Person: John Hancock Senior Legal Adviser New Zealand Human Rights Commission johnh@hrc.co.nz 1 Law Commission Review of the Search

More information

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

Coordinated text from 10 August 2011 Version applicable from 1 September 2011 Coordinated text of the Act of 30 May 2005 - laying down specific provisions for the protection of persons with regard to the processing of personal data in the electronic communications sector and - amending

More information

Conducting surveillance in a public place

Conducting surveillance in a public place Ministerial Policy Statement Conducting surveillance in a public place Summary It is lawful for the Government Communications Security Bureau (GCSB) and the New Zealand Security Intelligence Service (NZSIS)

More information

JUS100 Introduction to Justice Studies

JUS100 Introduction to Justice Studies Berkeley College Overview Academic Programs Justice Studies JUS100 Introduction to Justice Studies Admissions and Finances Administration, Faculty, and Staff An introduction to the major institutions of

More information

CRS Report for Congress

CRS Report for Congress Order Code RS21704 Updated June 29, 2005 CRS Report for Congress Received through the CRS Web Summary USA PATRIOT Act Sunset: A Sketch Charles Doyle Senior Specialist American Law Division Several sections

More information

WIRETAPPING, SURVEILLANCE AND

WIRETAPPING, SURVEILLANCE AND THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY WIRETAPPING, SURVEILLANCE AND THE INTERNET By CHRISTOPHER BRONK, PH.D. FELLOW IN TECHNOLOGY, SOCIETY AND PUBLIC POLICY JAMES A. BAKER

More information

By-laws of the Boston Ward 21 Democratic Committee Approved May 2014

By-laws of the Boston Ward 21 Democratic Committee Approved May 2014 By-laws of the Boston Ward 21 Democratic Committee Approved May 2014 ARTICLE I: NAME This organization shall be known as the Boston Ward 21 Democratic Committee, hereinafter called the Committee. ARTICLE

More information

23/06/05 1 KAMEN 8.05D

23/06/05 1 KAMEN 8.05D 23/06/05 1 KAMEN [Translated from Chinese] People's Republic of China Report on the implementation of the United Nations Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small

More information

Chapter I. General Provisions

Chapter I. General Provisions FEDERAL LAW NO. 144-FZ OF AUGUST 12, 1995 ON OPERATIONAL-SEARCH ACTIVITIES (with the Amendments and Additions of July 18, 1997, July 21, 1998, January 5, December 30, 1999, March 20, 2001, January 10,

More information

August 23, BY U.S. MAIL AND Freedom of Information Act Request Request for Expedited Processing

August 23, BY U.S. MAIL AND  Freedom of Information Act Request Request for Expedited Processing August 23, 2012 Arnetta Mallory - FOIA Initiatives Coordinator Patricia Matthews - FOIA Public Liaison National Security Division U.S. Department of Justice 950 Pennsylvania Avenue, N.W. Room 6150 Washington,

More information

UNODC. Topic A: Preventing Human Trafficking and migrant smuggling in North and Latin American countries

UNODC. Topic A: Preventing Human Trafficking and migrant smuggling in North and Latin American countries UNODC UnIted NatIons OffIce On. Drugs and Crime Topic A: Preventing Human Trafficking and migrant smuggling in North and Latin American countries Topic B: Promoting the rule of law and health to address

More information

Surveillance Devices Act 2007 No 64

Surveillance Devices Act 2007 No 64 New South Wales Surveillance Devices Act 2007 No 64 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Relationship to other laws and matters 2 4 Definitions 2 5 Eligible Judges

More information

Phone-Records Surveillance Is Broadly Acceptable to Public

Phone-Records Surveillance Is Broadly Acceptable to Public ABC NEWS/WASHINGTON POST POLL: PHONE RECORDS 5/11/06 EMBARGOED FOR RELEASE AFTER 7 a.m. Friday, May 12, 2006 Phone-Records Surveillance Is Broadly Acceptable to Public Americans by nearly a 2-1 margin

More information

Agreement on counter-terrorism measures

Agreement on counter-terrorism measures 10/12/2015 Agreement on counter-terrorism measures We stand united in the fight against terrorism. Accountability and cooperation are required if the population of Sweden are to feel safe and secure. Having

More information

THE CONSTITUTIONAL COURT AND THE APPLICATION OF INTERNATIONAL HUMAN RIGHTS NORMS: INDONESIA S EXPERIENCE. Susi Dwi Harijanti

THE CONSTITUTIONAL COURT AND THE APPLICATION OF INTERNATIONAL HUMAN RIGHTS NORMS: INDONESIA S EXPERIENCE. Susi Dwi Harijanti 1 THE CONSTITUTIONAL COURT AND THE APPLICATION OF INTERNATIONAL HUMAN RIGHTS NORMS: INDONESIA S EXPERIENCE Susi Dwi Harijanti Introduction In 2002, Indonesia completed a series of constitutional amendment

More information

BELDEN RUSSONELLO & STEWART

BELDEN RUSSONELLO & STEWART RESEARCH AND COMMUNICATIONS Protecting civil liberties is on the minds of Democratic primary voters in New Hampshire. Two main points highlight New Hampshire Democrats attitudes on civil liberties. 1.

More information

TOP SECRET!/COMOO'//NO.i'ORN

TOP SECRET!/COMOO'//NO.i'ORN TOPSECRRTh~O~~~OFORN. """ Office of the Assistant Attorney General U.S. Department of Justice Office of Legislative Affairs Wa:hingtcm. D.C. 205JO February 2, 2011 The Honorable Dianne Feinstein Chairman

More information

Appendix B. State Wiretap Legislation (as of June 1, 2002)

Appendix B. State Wiretap Legislation (as of June 1, 2002) Appendix B State Wiretap Legislation (as of June 1, 2002) Overview This survey indicates, for each state, whether pertinent legislation relating to electronic communications was introduced subsequent to

More information

International legal assistance in criminal matters

International legal assistance in criminal matters International legal assistance in criminal matters Abstract Nada Simjanoska International legal cooperation between states, international organizations and institutions of international character today

More information

Resolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan

Resolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan Resolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan CANADIAN ASSOCIATION OF CHIEFS OF POLICE Leading progressive change in policing 130 Albert Street Suite 1710 Ottawa,

More information

Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping

Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping Gina Stevens Legislative Attorney Charles Doyle Senior Specialist in American Public Law October 9,

More information

The Indonesian National Police and the Philippine National Police, hereinafter referred to as the Parties ;

The Indonesian National Police and the Philippine National Police, hereinafter referred to as the Parties ; MEMORANDUM OF UNDERSTANDING BETWEEN THE INDONESIAN NATIONAL POLICE AND THE PHILIPPINE NATIONAL POLICE ON COOPERATION IN PREVENTING AND COMBATING TRANSNATIONAL CRIMES The Indonesian National Police and

More information

Privacy, Policy and Public Opinion in Canada

Privacy, Policy and Public Opinion in Canada Privacy, Policy and Public Opinion in Canada Background Report in Draft Form Prepared by Shannon Yurke, Researcher For the Globalization of Personal Data Project Queen s University March 2005 c/o Department

More information

Anti-Cyber Crime Law (8 Rabi / 26 March 2007)

Anti-Cyber Crime Law (8 Rabi / 26 March 2007) Anti-Cyber Crime Law (8 Rabi 11428 / 26 March 2007) August 1, 2010 Kingdom of Saudi Arabia Bureau of Experts at the Council of Ministers Official Translation Department Translation of Saudi Laws Anti-Cyber

More information

Regulation of Interception of Act 18 Communications Act 2010

Regulation of Interception of Act 18 Communications Act 2010 ACTS SUPPLEMENT No. 7 3rd September, 2010. ACTS SUPPLEMENT to The Uganda Gazette No. 53 Volume CIII dated 3rd September, 2010. Printed by UPPC, Entebbe, by Order of the Government. Regulation of Interception

More information

TITLE 18 CRIMES AND CRIMINAL PROCEDURE

TITLE 18 CRIMES AND CRIMINAL PROCEDURE 2510 TITLE 18 CRIMES AND CRIMINAL PROCEDURE Page 542 Central Intelligence Agency or by any individual acting on behalf of the Central Intelligence Agency in connection with the program addressed in this

More information

9 th Session of the Conference of the Parties to the United Nations Convention against Transnational Organized Crime October 2018

9 th Session of the Conference of the Parties to the United Nations Convention against Transnational Organized Crime October 2018 9 th Session of the Conference of the Parties to the United Nations Convention against Transnational Organized Crime 15-19 October 2018 PROGRAMME FOR SIDE EVENTS MONDAY 15, OCTOBER Time Side event Venue

More information

Northern California Regional Intelligence Center

Northern California Regional Intelligence Center Memorandum of Understanding and Agreement Northern California Regional Intelligence Center Mike L. Sena Director, Northern California Regional Intelligence Center & High Intensity Drug Trafficking Area

More information

THE RUTHERFORD INSTITUTE

THE RUTHERFORD INSTITUTE THE RUTHERFORD INSTITUTE Post Office Box 7482 Charlottesville, Virginia 22906-7482 JOHN W. WHITEHEAD Founder and President TELEPHONE 434 / 978-3888 FACSIMILE 434/ 978 1789 www.rutherford.org Via Email,

More information

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection COUNCIL OF THE EUROPEAN UNION Brussels, 27 November 2013 16987/13 JAI 1078 USA 61 DATAPROTECT 184 COTER 151 ENFOPOL 394 NOTE from: to: Subject: Presidency and Commission Services COREPER Report on the

More information

ANNEX I.32 LAW OF THE REPUBLIC OF INDONESIA NUMBER 22 YEAR 1997 CONCERNING NARCOTICS

ANNEX I.32 LAW OF THE REPUBLIC OF INDONESIA NUMBER 22 YEAR 1997 CONCERNING NARCOTICS ANNEX I.32 LAW OF THE REPUBLIC OF INDONESIA NUMBER 22 YEAR 1997 CONCERNING NARCOTICS 1 WITH THE BLESSING OF THE ONE ALMIGHTY GOD THE PRESIDENT OF THE REPUBLIC OF INDONESIA Considering: In view oft a. that

More information

Report on Interception of Communication and Intrusive Surveillance 1. (Best Practice Survey No. 3)

Report on Interception of Communication and Intrusive Surveillance 1. (Best Practice Survey No. 3) PC-S-CO (2000) 3 Report on Interception of Communication and Intrusive Surveillance 1 (Best Practice Survey No. 3) 1 Adopted by Committee PC-CO at its 4 th meeting (1-3 December 1999). Strasbourg, 15

More information

REGIONAL EFFORTS AMONG ASEAN COUNTRIES: MALAYSIA S PERSPECTIVES. Malaysia supports the continuous effort by United Nations Department for

REGIONAL EFFORTS AMONG ASEAN COUNTRIES: MALAYSIA S PERSPECTIVES. Malaysia supports the continuous effort by United Nations Department for REGIONAL EFFORTS AMONG ASEAN COUNTRIES: MALAYSIA S PERSPECTIVES By Ramli Mohd. Noor Ministry of Internal Security Malaysia BACKGROUND Malaysia supports the continuous effort by United Nations Department

More information

Chapter I. Title, Jurisdiction and Definition

Chapter I. Title, Jurisdiction and Definition The State Peace and Development Council The Control of Money Laundering Law ( The State Peace and Development Council Law No. 6/2002) The 7th Waxing Day of Nayon, 1364 M.E. (17th June, 2002 ) The State

More information

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013 Report on the Findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection 27 November 2013 Report on the Findings of the EU Co-Chairs of the Ad Hoc EU-US Working Group on Data Protection

More information

T-Mobile Transparency Report for 2013 and 2014

T-Mobile Transparency Report for 2013 and 2014 T-Mobile Transparency Report for 2013 and 2014 This Transparency Report provides information about requests from law enforcement agencies and others for customer information we 1 received in 2013 and 2014

More information

BYLAWS OF THE HIDALGO COUNTY REPUBLICAN PARTY

BYLAWS OF THE HIDALGO COUNTY REPUBLICAN PARTY BYLAWS OF THE HIDALGO COUNTY REPUBLICAN PARTY Herein adopted by the Hidalgo County Executive Committee on 10 May 2011 ARTICLE I NAME Section1. The name of the organization shall be the Hidalgo County Republican

More information

Introduction to Wiretap Law

Introduction to Wiretap Law Listening, Snooping and Searching: What s Right, What s Wrong Friday, November 30, 2007 Introduction to Wiretap Law James C. Martin Public Prosecution Service, Canada Overview of Canadian Electronic Surveillance

More information

Sneak and Peak Search Warrants

Sneak and Peak Search Warrants Digital Commons @ Georgia Law Popular Media Faculty Scholarship 9-11-2002 Sneak and Peak Search Warrants Donald E. Wilkes Jr. University of Georgia School of Law, wilkes@uga.edu Repository Citation Wilkes,

More information

Spying on humanitarians: implications for organisations and beneficiaries

Spying on humanitarians: implications for organisations and beneficiaries Spying on humanitarians: implications for organisations and beneficiaries Executive Summary The global communications surveillance mandates of American, British and other Western intelligence agencies

More information

Technology and the Law. Jackie Charles

Technology and the Law. Jackie Charles Technology and the Law Jackie Charles jackie@ruleoflaw.org.au What is the Rule of Law? Cyber Crime Definition fraudulent financial transactions identity theft theft of information for commercial gain/piracy

More information

Guarding Constitution of Indonesia through the Court. Wasis Susetio Universitas Indonusa Esa Unggul Indonesia

Guarding Constitution of Indonesia through the Court. Wasis Susetio Universitas Indonusa Esa Unggul Indonesia Guarding Constitution of Indonesia through the Court Wasis Susetio Universitas Indonusa Esa Unggul Indonesia I. Introduction Since third amendment of Undang-Undang Dasar 1945 (The Republic of Indonesia

More information

Considerations on the use of technical surveillance in criminal proceedings

Considerations on the use of technical surveillance in criminal proceedings Considerations on the use of technical surveillance in criminal proceedings, Ph.D,,Alexandru Ioan Cuza Police Academy, Bucharest stancuserb@yahoo.ro, Ph.D Police Inspectorate of Brasov County, Romania,

More information

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act Statement for the Record House Judiciary Subcommittee on Crime, Terrorism and Homeland Security Hearing on Reauthorizing the Patriot Act Statement for the Record Robert S. Litt General Counsel Office of

More information

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD Sebastian SÂRBU, PhD Abstract: Security culture focuses on a broader scope: the ideas, customs and social behaviors, values of a group that influence the group and also society security at large. Therefore,

More information

Combating Extortion and Bribery: ICC Rules of Conduct and Recommendations

Combating Extortion and Bribery: ICC Rules of Conduct and Recommendations International Chamber of Commerce The world business organization Commission on Anti-Corruption Combating Extortion and Bribery: ICC Rules of Conduct and Recommendations 2005 edition International Chamber

More information

Moscow (Russian Federation) 9 10 November Contribution presented by the Ministry of Justice of

Moscow (Russian Federation) 9 10 November Contribution presented by the Ministry of Justice of English only / Anglais seulement HIGH-LEVEL CONFERENCE OF THE MINISTRIES OF JUSTICE AND OF THE INTERIOR Moscow (Russian Federation) 9 10 November 2006 IMPROVING EUROPEAN CO-OPERATION IN THE CRIMINAL JUSTICE

More information

Tripoli Action Plan on Combating Drug Trafficking and Money Laundering through the Mail

Tripoli Action Plan on Combating Drug Trafficking and Money Laundering through the Mail Tripoli Action Plan on Combating Drug Trafficking and Money Laundering through the Mail We, the participants in the Arab Regional Symposium on Combating Drug Trafficking and Money Laundering through the

More information

Regulation of Investigatory Powers Bill

Regulation of Investigatory Powers Bill Regulation of Investigatory Powers Bill EXPLANATORY NOTES Explanatory Notes to the Bill, prepared by the Home Office, will be published separately as Bill. EUROPEAN CONVENTION ON HUMAN RIGHTS Mr Secretary

More information

CRS Report for Congress

CRS Report for Congress Order Code RL33669 CRS Report for Congress Received through the CRS Web Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act

More information

Surveillance Devices Act 2007

Surveillance Devices Act 2007 Surveillance Devices Act 2007 As at 3 April 2013 Long Title An Act to regulate the installation, use, maintenance and retrieval of surveillance devices; to repeal the Listening Devices Act 1984; and for

More information

Protection of Communications Secrets Act

Protection of Communications Secrets Act Protection of Communications Secrets Act up-to-date: Act n. 6626/2002 Article 1 (Purpose) The purpose of this Act is to protect the secrets of communications and further freedom of communications by confining

More information

: Consultant for Developing Guidelines for Mutual Legal Assistance Guidelines (National Position) Project Name : UNODC Sub-Programme 2

: Consultant for Developing Guidelines for Mutual Legal Assistance Guidelines (National Position) Project Name : UNODC Sub-Programme 2 Terms of reference GENERAL INFORMATION Title : Consultant for Developing Guidelines for Mutual Legal Assistance Guidelines (National Position) Project Name : UNODC Sub-Programme 2 Reports to : Programme

More information

Debating privacy and ICT

Debating privacy and ICT Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal

More information

ELUCIDATION OF LAW OF THE REPUBLIC OF INDONESIA NUMBER 8 YEAR 2010 CONCERNING PREVENTION AND ERADICATION THE CRIME OF MONEY LAUNDERING

ELUCIDATION OF LAW OF THE REPUBLIC OF INDONESIA NUMBER 8 YEAR 2010 CONCERNING PREVENTION AND ERADICATION THE CRIME OF MONEY LAUNDERING ELUCIDATION OF LAW OF THE REPUBLIC OF INDONESIA NUMBER 8 YEAR 2010 CONCERNING PREVENTION AND ERADICATION THE CRIME OF MONEY LAUNDERING I. GENERAL In general, the perpetrators endeavor to hide or disguise

More information

OLR RESEARCH REPORT OLR BACKGROUNDER: HUMAN TRAFFICKING. By: Susan Price, Senior Attorney

OLR RESEARCH REPORT OLR BACKGROUNDER: HUMAN TRAFFICKING. By: Susan Price, Senior Attorney OLR RESEARCH REPORT December 10, 2012 2012-R-0520 OLR BACKGROUNDER: HUMAN TRAFFICKING By: Susan Price, Senior Attorney This backgrounder provides information on human trafficking in the United States,

More information

FINAL WORKING DOCUMENT

FINAL WORKING DOCUMENT EUROPEAN PARLIAMT 2009-2014 Committee on Foreign Affairs 20.11.2013 FINAL WORKING DOCUMT on Foreign Policy Aspects of the Inquiry on Electronic Mass Surveillance of EU Citizens Committee on Foreign Affairs

More information