Surveillance and Privacy in Indonesia
|
|
- Randolf Alexander
- 5 years ago
- Views:
Transcription
1
2 Surveillance and Privacy in Indonesia
3 Table of Contents Preface I. Introduction... 1 II. Enabling Statutes and Authorization... 6 III. Cases in Indonesia A. Constitutional Court Judgment No. 006/PUU-I/2003, Judicial Review on Law No.30 of 2002 concerning Commission on Eradication Corruption (KPK) B. Constitutional Court Judgment No. 5/PUU-VIII/2010 Law No.11 of 2011 concerning Electronic Information and Transaction Interception under Government Regulation C. Constitutional Court Judgment No. 012, 016/PUU-IV/ IV. Technical Aspect on Lawful Interception in Indonesia V. Surveillance Licensing Mechanisms VI. Privacy: The Indonesian Perspective VII. Conclusion Annexes
4 Preface This research report as result of collaboration project between The Cyber Law Center, Faculty of Law, Padjadjaran University and Privacy International in second year. The research project is to conduct research on the surveillance and Privacy in Indonesia, the objectives of the research study is to study and analyze the legal aspects of privacy and surveillance, were: (i) to views the legal aspects the surveillance expecialy for legal enforcement ; (ii) to give the recommendation to the government in drafting a Bill surveillance mechanism for legal enforcement. on Surveillance is defined as tacitly accept or listen to communication. Usually surveillance refers to acceptance in secret by law enforcement agencies to covertly receive or listen to a communication. Based on this definition, surveillance is an activity that is typically used by law enforcement institution to accept or listen to certain personal communication in secret, in carrying out their duties and obligations. 1 Time after time, public consider that surveillance activity is an improper usage or treatment of an entity and a violation of human rights. National Security Agency (NSA) surveillance case attracts public attention relating to above mentioned issue. One of the security agencies in USA, NSA was conducted wiretaps against the citizens of the United States and against other countries. The case leads to separation of legal opinion among jurists in USA. Washington DC Federal Court in a lawsuit filed by Larry Klayman, a 1 Bryan A Garner, Black s Law Dictionary Ninth Edition, Dallas, Texas: West Publishing, 2009, page 883.
5 conservative legal activists, decided that the NSA's efforts violate the Fourth Amendment protections against unreasonable searches privacy. 2 Meanwhile, dissenting decision came from the New York District Court. William Pauley, In a lawsuit filed by the American Civil Liberties Union, decided that the NSA interception is legal because the intention of such activity is for combating terrorism,. USA have a trauma about terrorism because of 2001 "nine-eleven" tragedy. 3 Surveillance activities brought strong reactions from various states, especially state that consider themselves as surveillance victim such as Germany, Brazil and Mexico. On November 7, 2013, Germany and Brazil submitted draft resolution on the protection of privacy rights against unauthorized wiretapping in the digital age to the United Nations General Assembly (hereinafter referred to as UN General Assembly) which later on December 18, 2013 the UN General Assembly endorsed the draft to the UN General Assembly Resolution A / Res / 68/167 on The rights to Privacy in the digital Age. Article 4 paragraph (a) of the UN General Assembly Resolution A / Res / 68/167 explicitly ask all states to respect and protect privacy right, including privacy rights in digital communications. Moreover, member states are also requested to review the procedures, practices and legislation related to the communication reconnaissance so that such activities conform with international human rights law as stipulated in Article 4 (c) of the UN General Assembly Resolution A / Res / 68/ In Indonesia, surveillance activities was in widespread known since information the Palapa-A I Satelite launching on July 9, Recorded 2 AntaraNews.com, Hakim Putuskan Penyadapan NSA Illegal, downloaded 22th of January, 2014, WIB. 3 Philippe Huguen, Judge Rules NSA Phone Surveillance Is Legal. Is a Supreme Court Intervention Inevitable?, www. nationaljournal. com/technology/judge-rules-nsa-phone-surveillance-is-legal-is-a-supreme-courtintervention-inevitable , downloaded 20th of January, 2014, WIB. 4 Article 4 subesction (c) Resolusi Majelis Umum PBB A/Res/68/ Papper, Naskah Akademik RUU Penyadapan, Trias Yuliana Dewi et. Al., p. 1.
6 in its development, surveillance has got public attention in about 1999, where one of Indonesian national magazine published an recording of conversation between the Attorney General and the President of Indonesia that time. 6 In 2009, Indonesia faced surveillance issue lead to confrontation between the two law enforcement agencies, the Commission against the Indonesian National Police. This issue triggered distrust between the two law enforcement agencies. 7 The development of technology have been used for law enforcing activity. However, in Indonesia, surveillance activity surveilance also gives serious impact on political and security dimension. Currently, Indonesia have several regulations relating to surveillance, those are: 1. Act No. 5 of 1997 on Psychotropic Substances, 2. Act No. 31 of 1999 on the Eradication of Corruption, 3. Act No. 36 of 1999 on Telecommunications, 4. Act No. 39 of 1999 on Human Rights, 5. Act No. 30 of 2002 on the Corruption Eradication Commission, 6. Government regulation to raplace act (Peraturan Pemerintah Pengganti Undang-Undang) No. 1 of 2002 on Combating Terrorism, 7. Act No. 18 of 2003 on Advocates, 8. Act No. 21 of 2007 on the Eradication of Trafficking in Persons, 9. Act No. 11 of 2008 on Information and Electronic Transaction, 10.Act No. 35 of 2009 on Narcotics, 11. Act No. 46 of 2009 on Crime Court Corruption, 12.Act No. 17 of 2011 on the National Intelligence, 13. Precidential Regulation No. 90 of 2012 on State Intelligence Agency 6 Ibid 7
7 14. Ministry of Communication and Information Technology Regulation No. 11 / PER / M.KOMINFO / 02/2006 on Information Surveilance Technique, and 15.Draft of Criminal Procedure Code. The diversity of the relevant regulations related to surveillance activity become human rights protection society concern. In practice, in a number of cases, surveillance was conducted outside its original purpose for law enforcement. Besides that, surveillance activity triggered clash between two law enforcing institutions in Indonesia so that surveillance have become debate topic in Indonesia. This Research was intended to study best practical solution for maximizing surveillance function as a law enforcing tool in Indonesia. Law enforcer must use surveillance to unveil criminal cases in Indonesia instead of using surveillance outsider law enforcing function. The study is important because the development forms of new criminal offenses are very difficult to solve by conventional means (without surveillance).
8 I. Introduction Information and communication technologies have supported interception since the era of Morse s telegraph. Interception is actively practiced worldwide with an increasing number of applications. 8 Wiretapping is the traditional term for interception of telephone conversations. This should not be taken too literally. The word is no longer restricted to communications travelling by wire, and contemporary wiretaps are more commonly placed on radio links or inside telephone offices. The meaning has also broadened in that the thing being tapped need no longer be a telephone call in the classic sense; it may be some other form of electronic communication, such as fax or data. 9 The origins of wiretapping lie in two quite different practices: eavesdropping and letter opening. "Eavesdropping," although once more restricted in meaning, has come to describe any attempt to overhear conversations without the knowledge of the participants. "Letter opening" takes in all acquisition, opening, reading, and copying of written messages, also without the knowledge of the sending and receiving parties. Telecommunication has unified and systematized these practices. Before the electronic era, a conversation could only be carried on by people located within earshot of each other, typically a few feet apart. Neither advanced planning nor great effort on the part of the participants was required to ensure a high degree of security. Written communications were more vulnerable, but intercepting one was still a hit-or-miss affair. Messages traveled by a variety of postal 8 International Telecommunication Unions, Technical Aspect of Lawful Interception, Technology Watch Report #6, May 2008, p.6 9 Whitfield Diffie and Susan Landau, Privacy on the Line The Politics of Wiretapping and Encryption, The MIT Press Cambridge, Massachusetts London, England, 1998, p Surveillance and Privacy in Indonesia Cyberlaw Centre Padjadjaran University
The National Security Agency s Warrantless Wiretaps
The National Security Agency s Warrantless Wiretaps In 2005, the press revealed that President George W. Bush had authorized government wiretaps without a court warrant of U.S. citizens suspected of terrorist
More informationDEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA
DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA Lawful Access: Legal Review Follow-up Consultations: Criminal Code Draft Proposals February-March 2005 For discussion purposes Not for further
More informationEmerging Technology and the Fourth Amendment
Saber and Scroll Volume 1 Issue 1 Spring 2012 (Edited and Revised April 2015) Article 10 March 2012 Emerging Technology and the Fourth Amendment Kathleen Mitchell Reitmayer American Public University System
More informationThe administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.
Government Surveillance of Citizens Raises Civil Liberty Concerns Two revelations about government programs designed to sift through the public s phone calls and social media interaction have raised questions
More informationConfrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Electronic Surveillance and FISA Eric Rosenbach and Aki J. Peritz Electronic Surveillance and FISA Electronic surveillance is one
More informationThe Supreme Court, Civil Liberties, and Civil Rights
MIT OpenCourseWare http://ocw.mit.edu 17.245 The Supreme Court, Civil Liberties, and Civil Rights Fall 2006 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
More informationI. REGULATION OF INVESTIGATORY POWERS BILL
These notes refer to the Regulation of Investigatory Powers Bill as introduced in the House of Commons on 9th February 2000 [Bill 64] I. REGULATION OF INVESTIGATORY POWERS BILL II. EXPLANATORY NOTES INTRODUCTION
More informationKPK Authority Review in the Impact of Corruption Eradication
IOSR Journal Of Humanities And Social Science (IOSR-JHSS) Volume 22, Issue 8, Ver. I (August. 2017) PP 88-92 e-issn: 2279-0837, p-issn: 2279-0845. www.iosrjournals.org KPK Authority Review in the Impact
More informationCell Site Simulator Privacy Model Bill
Cell Site Simulator Privacy Model Bill SECTION 1. Definitions. As used in this Act: (A) Authorized possessor shall mean the person in possession of a communications device when that person is the owner
More informationTITLE III WIRETAPS. WHO S LISTENING?
TITLE III WIRETAPS. WHO S LISTENING? Between the years 2002 and 2012, State and Federal Judges across the United States received 23,925 applications for wiretaps. All but 7 were granted. 1 In 2012, there
More informationSUPREME COURT OF THE UNITED STATES
(Slip Opinion) OCTOBER TERM, 2017 1 Syllabus NOTE: Where it is feasible, a syllabus (headnote) will be released, as is being done in connection with this case, at the time the opinion is issued. The syllabus
More informationFILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8
Case 1:07-cv-01732-RBW Document 1 Filed 09/27/07 Page 1 of 8 IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLUMBIA FILED SEP 2 7 2007 NANCY MAYER WHITTINGTON, CLERK U.S. DISTRICT COURT ELECTRONIC
More informationAspects of Criminal Procedural Law in Argentina.
Aspects of Criminal Procedural Law in Argentina. The purpouse of this brief presentation is to inform about the reform underway in Criminal Procedure Law and its compliance with the standards of the CoC.
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Indonesia's new anti-terrorism regulations Author(s) Sebastian, Leonard C Citation Sebastian, L. C. (2002).
More informationIn this early case the Human Rights Committee established its position on the extraterritorial effect of the ICCPR:
International Covenant on Civil and Political Rights: Key elements in the context of the LIBE Committee inquiry. Professor Martin Scheinin 14 October 2013 The Covenant was adopted and opened for signature,
More informationReauthorization of the FISA Amendments Act
Edward C. Liu Legislative Attorney April 8, 2013 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42725 Summary On December 30,
More informationNational Security Law Class Notes
National Security Law Class Notes Legal Regulation of Intelligence Collection I. Collecting Communications Content I Foundations of Constitutional and Statutory Constraint Intelligence cycle flow chart
More informationLEGAL ISSUES REGARDING SECRET COMMUNICATION SURVEILLANCE IN SERBIA
Milošević M., Mаtić G. D. LEGAL ISSUES REGARDING SECRET COMMUNICATION LEGAL ISSUES REGARDING SECRET COMMUNICATION SURVEILLANCE IN SERBIA Milosevic Milаn 1, Mаtic Gorаn D. 2 1 ALFA University, Belgrade,
More informationStatement for the European Parliament, Temporary Committee on the ECHELON interception system, meeting of Thursday, 22 March, 2001, Brussels.
Statement for the European Parliament, Temporary Committee on the ECHELON interception system, meeting of Thursday, 22 March, 2001, Brussels. Session on exchange of views on Legal Affairs, Human Rights
More informationPrivacy And? Surveillance
University of Leeds From the SelectedWorks of Subhajit Basu Fall November 28, 2015 Privacy And? Surveillance Subhajit Basu Available at: https://works.bepress.com/subhajitbasu/88/ School of something FACULTY
More informationDRONES VERSUS SECURITY OR DRONES FOR SECURITY?
DRONES VERSUS SECURITY OR DRONES FOR SECURITY? Anton MANDA, PhD candidate * Abstract: Drones represent the most controversial subject when it comes to the dimension of national security. This technological
More informationSyllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips
Brief Course Description: Syllabus Law 641-001: Surveillance Law Seminar George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall Professor Jake Phillips This seminar course will expose
More informationThe story of John Ashcroft and James Comey s hospital-bed heroics has by now been
Issue #35, Winter 2015 Infiltrate the NSA To re-establish the balance between security and civil liberties, we don t just need more laws. We need more civil libertarians in the security state. Margo Schlanger
More informationOrganization of American States OAS Inter-American Drug Abuse Control Commission CICAD. Multilateral Evaluation Mechanism MEM.
Organization of American States OAS Inter-American Drug Abuse Control Commission CICAD Multilateral Evaluation Mechanism MEM Ecuador 2005 PROGRESS REPORT IN DRUG CONTROL IMPLEMENTATION OF RECOMMENDATIONS
More informationReauthorization of the FISA Amendments Act
Edward C. Liu Legislative Attorney September 12, 2012 CRS Report for Congress Prepared for Members and Committees of Congress Congressional Research Service 7-5700 www.crs.gov R42725 Summary Reauthorizations
More informationELECTRONIC SURVEILLANCE. Attacking Insider Trading and Other White Collar Cases Built on Evidence From Government Wiretaps: The Nuts and Bolts
Criminal Law Reporter Reproduced with permission from The Criminal Law Reporter, 92 CrL 550, 02/13/2013. Copyright 2013 by The Bureau of National Affairs, Inc. (800-372-1033) http://www.bna.com ELECTRONIC
More informationPeace Agreements Digital Collection
Peace Agreements Digital Collection East Timor >> On the Question of East Timor Agreement Between the Republic of Indonesia and the Portuguese Republic on the Question of East Timor Table of Contents Text
More informationPALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND TEL: / FAX:
PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND www.ohchr.org TEL: +41 22 917 9543 / +41 22 917 9738 FAX: +41 22 917 9008 E-MAIL: registry@ohchr.org Mandate of the Special Rapporteur on the promotion and
More informationDeutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.
Deutscher Bundestag 1st Committee of Inquiry in the 18th electoral term Hearing of Experts Surveillance Reform After Snowden September 8, 2016 Written Statement of Timothy H. Edgar Senior Fellow Watson
More informationSUPREME COURT OF THE UNITED STATES
Cite as: 547 U. S. (2006) 1 NOTICE: This opinion is subject to formal revision before publication in the preliminary print of thfe United States Reports. Readers are requested to notify the Reporter of
More informationA Protocol Against Trafficking in Persons: Is it Enough? The Impact of a Trafficking Treaty
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Second Annual Interdisciplinary Conference on Human Trafficking, 2010 Interdisciplinary Conference on Human Trafficking
More informationLegislative Brief The Information Technology (Amendment) Bill, 2006
Legislative Brief The Information Technology (Amendment) Bill, 2006 Highlights of the Bill The Bill was introduced in the Lok Sabha on 15 th December, 2006 and referred to the Standing Committee on Information
More information1. Network Individualism
1. Network Individualism Network individualism as a theory embraces the responsibility of the individual to maintain his or her own personal networks. This sub group of active network is co-dependent on
More informationSTATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES AT A HEARING ENTITLED ENCRYPTION TIGHTROPE: BALANCING AMERICANS
More informationCase3:08-cv MMC Document86 Filed12/02/09 Page1 of 8
Case:0-cv-00-MMC Document Filed/0/0 Page of IN THE UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA 0 United States District Court For the Northern District of California CUNZHU ZHENG,
More informationLAW ON ELECTRONIC COMMUNICATIONS CONTENTS
LAW ON ELECTRONIC COMMUNICATIONS CONTENTS CHAPTER ONE... 4 GENERAL PROVISIONS... 4 CHAPTER TWO... 4 OBJECTIVES AND PRINCIPLES... 4 CHAPTER THREE... 5 STATE GOVERNANCE OF ELECTROINIC COMMUNICATIONS... 5
More informationInvestigatory Powers Bill
Investigatory Powers Bill How to make it fit-for-purpose A briefing for the House of Lords by the Don t Spy on Us coalition Contents Introduction 1 About Don t Spy on Us 1 The Bill fails to introduce independent
More informationREGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING
REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING INTRODUCTION 1.1. In its report, Under Surveillance, JUSTICE came to the overall conclusion that the present legislative and procedural framework
More informationFederal Law No. 144-FZ on Operational - Search Activities (1995, lastly amended 2004)
English Version - Русская версия Legislationline.org Legislationline Federal Law No. 144-FZ on Operational - Search Activities (1995, lastly amended 2004) Posted March 22, 2006 Country Russian Federation
More informationJanuary 14, Dear Chairman Graham and Ranking Member Feinstein:
January 14, 2019 The Honorable Lindsey Graham, Chairman The Honorable Dianne Feinstein, Ranking Member U.S. Senate Committee on the Judiciary Dirksen Senate Office Building 224 Washington, DC 20510 Dear
More informationDirector: Mr Yaman Akdeniz Tel: Fax:
Cyber-Rights & Cyber-Liberties (UK) Faculty of Law University of Leeds Leeds LS2 9JT Director: Mr Yaman Akdeniz (lawya@cyber-rights.org) Tel: 0498 865116 Fax: 0113 2335056 Open Letter to: The Right Honourable
More informationUnofficial Translation TELECOMMUNICATIONS BUSINESS ACT, B.E (2001) 1
Unofficial Translation TELECOMMUNICATIONS BUSINESS ACT, B.E. 2544 (2001) 1 BHUMIBOL ADULYADEJ, REX. Given on the 9th Day of November B.E. 2544; Being the 56th Year of the Present Reign. His Majesty King
More informationSyllabus Law 641: Surveillance Law Seminar. George Mason University Law School Spring Jamil N. Jaffer
Brief Course Description: Syllabus Law 641: Surveillance Law Seminar George Mason University Law School Spring 2014 Jamil N. Jaffer This seminar course will expose students to laws and policies relating
More informationLaw Commission Review of the Search and Surveillance Act 2012
Law Commission Review of the Search and Surveillance Act 2012 Contact Person: John Hancock Senior Legal Adviser New Zealand Human Rights Commission johnh@hrc.co.nz 1 Law Commission Review of the Search
More informationCoordinated text from 10 August 2011 Version applicable from 1 September 2011
Coordinated text of the Act of 30 May 2005 - laying down specific provisions for the protection of persons with regard to the processing of personal data in the electronic communications sector and - amending
More informationConducting surveillance in a public place
Ministerial Policy Statement Conducting surveillance in a public place Summary It is lawful for the Government Communications Security Bureau (GCSB) and the New Zealand Security Intelligence Service (NZSIS)
More informationJUS100 Introduction to Justice Studies
Berkeley College Overview Academic Programs Justice Studies JUS100 Introduction to Justice Studies Admissions and Finances Administration, Faculty, and Staff An introduction to the major institutions of
More informationCRS Report for Congress
Order Code RS21704 Updated June 29, 2005 CRS Report for Congress Received through the CRS Web Summary USA PATRIOT Act Sunset: A Sketch Charles Doyle Senior Specialist American Law Division Several sections
More informationWIRETAPPING, SURVEILLANCE AND
THE JAMES A. BAKER III INSTITUTE FOR PUBLIC POLICY RICE UNIVERSITY WIRETAPPING, SURVEILLANCE AND THE INTERNET By CHRISTOPHER BRONK, PH.D. FELLOW IN TECHNOLOGY, SOCIETY AND PUBLIC POLICY JAMES A. BAKER
More informationBy-laws of the Boston Ward 21 Democratic Committee Approved May 2014
By-laws of the Boston Ward 21 Democratic Committee Approved May 2014 ARTICLE I: NAME This organization shall be known as the Boston Ward 21 Democratic Committee, hereinafter called the Committee. ARTICLE
More information23/06/05 1 KAMEN 8.05D
23/06/05 1 KAMEN [Translated from Chinese] People's Republic of China Report on the implementation of the United Nations Programme of Action to Prevent, Combat and Eradicate the Illicit Trade in Small
More informationChapter I. General Provisions
FEDERAL LAW NO. 144-FZ OF AUGUST 12, 1995 ON OPERATIONAL-SEARCH ACTIVITIES (with the Amendments and Additions of July 18, 1997, July 21, 1998, January 5, December 30, 1999, March 20, 2001, January 10,
More informationAugust 23, BY U.S. MAIL AND Freedom of Information Act Request Request for Expedited Processing
August 23, 2012 Arnetta Mallory - FOIA Initiatives Coordinator Patricia Matthews - FOIA Public Liaison National Security Division U.S. Department of Justice 950 Pennsylvania Avenue, N.W. Room 6150 Washington,
More informationUNODC. Topic A: Preventing Human Trafficking and migrant smuggling in North and Latin American countries
UNODC UnIted NatIons OffIce On. Drugs and Crime Topic A: Preventing Human Trafficking and migrant smuggling in North and Latin American countries Topic B: Promoting the rule of law and health to address
More informationSurveillance Devices Act 2007 No 64
New South Wales Surveillance Devices Act 2007 No 64 Contents Part 1 Part 2 Preliminary Page 1 Name of Act 2 2 Commencement 2 3 Relationship to other laws and matters 2 4 Definitions 2 5 Eligible Judges
More informationPhone-Records Surveillance Is Broadly Acceptable to Public
ABC NEWS/WASHINGTON POST POLL: PHONE RECORDS 5/11/06 EMBARGOED FOR RELEASE AFTER 7 a.m. Friday, May 12, 2006 Phone-Records Surveillance Is Broadly Acceptable to Public Americans by nearly a 2-1 margin
More informationAgreement on counter-terrorism measures
10/12/2015 Agreement on counter-terrorism measures We stand united in the fight against terrorism. Accountability and cooperation are required if the population of Sweden are to feel safe and secure. Having
More informationTHE CONSTITUTIONAL COURT AND THE APPLICATION OF INTERNATIONAL HUMAN RIGHTS NORMS: INDONESIA S EXPERIENCE. Susi Dwi Harijanti
1 THE CONSTITUTIONAL COURT AND THE APPLICATION OF INTERNATIONAL HUMAN RIGHTS NORMS: INDONESIA S EXPERIENCE Susi Dwi Harijanti Introduction In 2002, Indonesia completed a series of constitutional amendment
More informationBELDEN RUSSONELLO & STEWART
RESEARCH AND COMMUNICATIONS Protecting civil liberties is on the minds of Democratic primary voters in New Hampshire. Two main points highlight New Hampshire Democrats attitudes on civil liberties. 1.
More informationTOP SECRET!/COMOO'//NO.i'ORN
TOPSECRRTh~O~~~OFORN. """ Office of the Assistant Attorney General U.S. Department of Justice Office of Legislative Affairs Wa:hingtcm. D.C. 205JO February 2, 2011 The Honorable Dianne Feinstein Chairman
More informationAppendix B. State Wiretap Legislation (as of June 1, 2002)
Appendix B State Wiretap Legislation (as of June 1, 2002) Overview This survey indicates, for each state, whether pertinent legislation relating to electronic communications was introduced subsequent to
More informationInternational legal assistance in criminal matters
International legal assistance in criminal matters Abstract Nada Simjanoska International legal cooperation between states, international organizations and institutions of international character today
More informationResolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan
Resolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan CANADIAN ASSOCIATION OF CHIEFS OF POLICE Leading progressive change in policing 130 Albert Street Suite 1710 Ottawa,
More informationPrivacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping
Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping Gina Stevens Legislative Attorney Charles Doyle Senior Specialist in American Public Law October 9,
More informationThe Indonesian National Police and the Philippine National Police, hereinafter referred to as the Parties ;
MEMORANDUM OF UNDERSTANDING BETWEEN THE INDONESIAN NATIONAL POLICE AND THE PHILIPPINE NATIONAL POLICE ON COOPERATION IN PREVENTING AND COMBATING TRANSNATIONAL CRIMES The Indonesian National Police and
More informationPrivacy, Policy and Public Opinion in Canada
Privacy, Policy and Public Opinion in Canada Background Report in Draft Form Prepared by Shannon Yurke, Researcher For the Globalization of Personal Data Project Queen s University March 2005 c/o Department
More informationAnti-Cyber Crime Law (8 Rabi / 26 March 2007)
Anti-Cyber Crime Law (8 Rabi 11428 / 26 March 2007) August 1, 2010 Kingdom of Saudi Arabia Bureau of Experts at the Council of Ministers Official Translation Department Translation of Saudi Laws Anti-Cyber
More informationRegulation of Interception of Act 18 Communications Act 2010
ACTS SUPPLEMENT No. 7 3rd September, 2010. ACTS SUPPLEMENT to The Uganda Gazette No. 53 Volume CIII dated 3rd September, 2010. Printed by UPPC, Entebbe, by Order of the Government. Regulation of Interception
More informationTITLE 18 CRIMES AND CRIMINAL PROCEDURE
2510 TITLE 18 CRIMES AND CRIMINAL PROCEDURE Page 542 Central Intelligence Agency or by any individual acting on behalf of the Central Intelligence Agency in connection with the program addressed in this
More information9 th Session of the Conference of the Parties to the United Nations Convention against Transnational Organized Crime October 2018
9 th Session of the Conference of the Parties to the United Nations Convention against Transnational Organized Crime 15-19 October 2018 PROGRAMME FOR SIDE EVENTS MONDAY 15, OCTOBER Time Side event Venue
More informationNorthern California Regional Intelligence Center
Memorandum of Understanding and Agreement Northern California Regional Intelligence Center Mike L. Sena Director, Northern California Regional Intelligence Center & High Intensity Drug Trafficking Area
More informationTHE RUTHERFORD INSTITUTE
THE RUTHERFORD INSTITUTE Post Office Box 7482 Charlottesville, Virginia 22906-7482 JOHN W. WHITEHEAD Founder and President TELEPHONE 434 / 978-3888 FACSIMILE 434/ 978 1789 www.rutherford.org Via Email,
More informationReport on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection
COUNCIL OF THE EUROPEAN UNION Brussels, 27 November 2013 16987/13 JAI 1078 USA 61 DATAPROTECT 184 COTER 151 ENFOPOL 394 NOTE from: to: Subject: Presidency and Commission Services COREPER Report on the
More informationANNEX I.32 LAW OF THE REPUBLIC OF INDONESIA NUMBER 22 YEAR 1997 CONCERNING NARCOTICS
ANNEX I.32 LAW OF THE REPUBLIC OF INDONESIA NUMBER 22 YEAR 1997 CONCERNING NARCOTICS 1 WITH THE BLESSING OF THE ONE ALMIGHTY GOD THE PRESIDENT OF THE REPUBLIC OF INDONESIA Considering: In view oft a. that
More informationReport on Interception of Communication and Intrusive Surveillance 1. (Best Practice Survey No. 3)
PC-S-CO (2000) 3 Report on Interception of Communication and Intrusive Surveillance 1 (Best Practice Survey No. 3) 1 Adopted by Committee PC-CO at its 4 th meeting (1-3 December 1999). Strasbourg, 15
More informationREGIONAL EFFORTS AMONG ASEAN COUNTRIES: MALAYSIA S PERSPECTIVES. Malaysia supports the continuous effort by United Nations Department for
REGIONAL EFFORTS AMONG ASEAN COUNTRIES: MALAYSIA S PERSPECTIVES By Ramli Mohd. Noor Ministry of Internal Security Malaysia BACKGROUND Malaysia supports the continuous effort by United Nations Department
More informationChapter I. Title, Jurisdiction and Definition
The State Peace and Development Council The Control of Money Laundering Law ( The State Peace and Development Council Law No. 6/2002) The 7th Waxing Day of Nayon, 1364 M.E. (17th June, 2002 ) The State
More informationReport on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013
Report on the Findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection 27 November 2013 Report on the Findings of the EU Co-Chairs of the Ad Hoc EU-US Working Group on Data Protection
More informationT-Mobile Transparency Report for 2013 and 2014
T-Mobile Transparency Report for 2013 and 2014 This Transparency Report provides information about requests from law enforcement agencies and others for customer information we 1 received in 2013 and 2014
More informationBYLAWS OF THE HIDALGO COUNTY REPUBLICAN PARTY
BYLAWS OF THE HIDALGO COUNTY REPUBLICAN PARTY Herein adopted by the Hidalgo County Executive Committee on 10 May 2011 ARTICLE I NAME Section1. The name of the organization shall be the Hidalgo County Republican
More informationIntroduction to Wiretap Law
Listening, Snooping and Searching: What s Right, What s Wrong Friday, November 30, 2007 Introduction to Wiretap Law James C. Martin Public Prosecution Service, Canada Overview of Canadian Electronic Surveillance
More informationSneak and Peak Search Warrants
Digital Commons @ Georgia Law Popular Media Faculty Scholarship 9-11-2002 Sneak and Peak Search Warrants Donald E. Wilkes Jr. University of Georgia School of Law, wilkes@uga.edu Repository Citation Wilkes,
More informationSpying on humanitarians: implications for organisations and beneficiaries
Spying on humanitarians: implications for organisations and beneficiaries Executive Summary The global communications surveillance mandates of American, British and other Western intelligence agencies
More informationTechnology and the Law. Jackie Charles
Technology and the Law Jackie Charles jackie@ruleoflaw.org.au What is the Rule of Law? Cyber Crime Definition fraudulent financial transactions identity theft theft of information for commercial gain/piracy
More informationGuarding Constitution of Indonesia through the Court. Wasis Susetio Universitas Indonusa Esa Unggul Indonesia
Guarding Constitution of Indonesia through the Court Wasis Susetio Universitas Indonusa Esa Unggul Indonesia I. Introduction Since third amendment of Undang-Undang Dasar 1945 (The Republic of Indonesia
More informationConsiderations on the use of technical surveillance in criminal proceedings
Considerations on the use of technical surveillance in criminal proceedings, Ph.D,,Alexandru Ioan Cuza Police Academy, Bucharest stancuserb@yahoo.ro, Ph.D Police Inspectorate of Brasov County, Romania,
More informationStatement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act
Statement for the Record House Judiciary Subcommittee on Crime, Terrorism and Homeland Security Hearing on Reauthorizing the Patriot Act Statement for the Record Robert S. Litt General Counsel Office of
More informationABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD
Sebastian SÂRBU, PhD Abstract: Security culture focuses on a broader scope: the ideas, customs and social behaviors, values of a group that influence the group and also society security at large. Therefore,
More informationCombating Extortion and Bribery: ICC Rules of Conduct and Recommendations
International Chamber of Commerce The world business organization Commission on Anti-Corruption Combating Extortion and Bribery: ICC Rules of Conduct and Recommendations 2005 edition International Chamber
More informationMoscow (Russian Federation) 9 10 November Contribution presented by the Ministry of Justice of
English only / Anglais seulement HIGH-LEVEL CONFERENCE OF THE MINISTRIES OF JUSTICE AND OF THE INTERIOR Moscow (Russian Federation) 9 10 November 2006 IMPROVING EUROPEAN CO-OPERATION IN THE CRIMINAL JUSTICE
More informationTripoli Action Plan on Combating Drug Trafficking and Money Laundering through the Mail
Tripoli Action Plan on Combating Drug Trafficking and Money Laundering through the Mail We, the participants in the Arab Regional Symposium on Combating Drug Trafficking and Money Laundering through the
More informationRegulation of Investigatory Powers Bill
Regulation of Investigatory Powers Bill EXPLANATORY NOTES Explanatory Notes to the Bill, prepared by the Home Office, will be published separately as Bill. EUROPEAN CONVENTION ON HUMAN RIGHTS Mr Secretary
More informationCRS Report for Congress
Order Code RL33669 CRS Report for Congress Received through the CRS Web Terrorist Surveillance Act of 2006: S. 3931 and Title II of S. 3929, the Terrorist Tracking, Identification, and Prosecution Act
More informationSurveillance Devices Act 2007
Surveillance Devices Act 2007 As at 3 April 2013 Long Title An Act to regulate the installation, use, maintenance and retrieval of surveillance devices; to repeal the Listening Devices Act 1984; and for
More informationProtection of Communications Secrets Act
Protection of Communications Secrets Act up-to-date: Act n. 6626/2002 Article 1 (Purpose) The purpose of this Act is to protect the secrets of communications and further freedom of communications by confining
More information: Consultant for Developing Guidelines for Mutual Legal Assistance Guidelines (National Position) Project Name : UNODC Sub-Programme 2
Terms of reference GENERAL INFORMATION Title : Consultant for Developing Guidelines for Mutual Legal Assistance Guidelines (National Position) Project Name : UNODC Sub-Programme 2 Reports to : Programme
More informationDebating privacy and ICT
Debating privacy and ICT Citation for published version (APA): Est, van, R., & Harten, van, D. (2002). Debating privacy and ICT. In D. Harten, van (Ed.), International conference on the use of personal
More informationELUCIDATION OF LAW OF THE REPUBLIC OF INDONESIA NUMBER 8 YEAR 2010 CONCERNING PREVENTION AND ERADICATION THE CRIME OF MONEY LAUNDERING
ELUCIDATION OF LAW OF THE REPUBLIC OF INDONESIA NUMBER 8 YEAR 2010 CONCERNING PREVENTION AND ERADICATION THE CRIME OF MONEY LAUNDERING I. GENERAL In general, the perpetrators endeavor to hide or disguise
More informationOLR RESEARCH REPORT OLR BACKGROUNDER: HUMAN TRAFFICKING. By: Susan Price, Senior Attorney
OLR RESEARCH REPORT December 10, 2012 2012-R-0520 OLR BACKGROUNDER: HUMAN TRAFFICKING By: Susan Price, Senior Attorney This backgrounder provides information on human trafficking in the United States,
More informationFINAL WORKING DOCUMENT
EUROPEAN PARLIAMT 2009-2014 Committee on Foreign Affairs 20.11.2013 FINAL WORKING DOCUMT on Foreign Policy Aspects of the Inquiry on Electronic Mass Surveillance of EU Citizens Committee on Foreign Affairs
More information