Surveillance and Privacy in Indonesia

Similar documents
The National Security Agency s Warrantless Wiretaps

DEPARTMENT OF JUSTICE CANADA MINISTÈRE DE LA JUSTICE CANADA

Emerging Technology and the Fourth Amendment

The administration defended the surveillance program, saying that it is lawful and is a critical tool to protect national security.

Confrontation or Collaboration?

The Supreme Court, Civil Liberties, and Civil Rights

I. REGULATION OF INVESTIGATORY POWERS BILL

KPK Authority Review in the Impact of Corruption Eradication

Cell Site Simulator Privacy Model Bill

TITLE III WIRETAPS. WHO S LISTENING?

SUPREME COURT OF THE UNITED STATES

FILED SEP NANCY MAYER WHITTINGTON, CLERK. Case 1:07-cv RBW Document 1 Filed 09/27/07 Page 1 of 8

Aspects of Criminal Procedural Law in Argentina.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

In this early case the Human Rights Committee established its position on the extraterritorial effect of the ICCPR:

Reauthorization of the FISA Amendments Act

National Security Law Class Notes

LEGAL ISSUES REGARDING SECRET COMMUNICATION SURVEILLANCE IN SERBIA

Statement for the European Parliament, Temporary Committee on the ECHELON interception system, meeting of Thursday, 22 March, 2001, Brussels.

Privacy And? Surveillance

DRONES VERSUS SECURITY OR DRONES FOR SECURITY?

Syllabus Law : Surveillance Law Seminar. George Mason University Law School Fall 2015 Arlington Hall, Hazel Hall. Professor Jake Phillips

The story of John Ashcroft and James Comey s hospital-bed heroics has by now been

Organization of American States OAS Inter-American Drug Abuse Control Commission CICAD. Multilateral Evaluation Mechanism MEM.

Reauthorization of the FISA Amendments Act

ELECTRONIC SURVEILLANCE. Attacking Insider Trading and Other White Collar Cases Built on Evidence From Government Wiretaps: The Nuts and Bolts

Peace Agreements Digital Collection

PALAIS DES NATIONS 1211 GENEVA 10, SWITZERLAND TEL: / FAX:

Deutscher Bundestag. 1st Committee of Inquiry. in the 18th electoral term. Hearing of Experts. Surveillance Reform After Snowden.

SUPREME COURT OF THE UNITED STATES

A Protocol Against Trafficking in Persons: Is it Enough? The Impact of a Trafficking Treaty

Legislative Brief The Information Technology (Amendment) Bill, 2006

1. Network Individualism

STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON THE JUDICIARY U.S. HOUSE OF REPRESENTATIVES

Case3:08-cv MMC Document86 Filed12/02/09 Page1 of 8

LAW ON ELECTRONIC COMMUNICATIONS CONTENTS

Investigatory Powers Bill

REGULATION OF INVESTIGATORY POWERS BILL SECOND READING BRIEFING

Federal Law No. 144-FZ on Operational - Search Activities (1995, lastly amended 2004)

January 14, Dear Chairman Graham and Ranking Member Feinstein:

Director: Mr Yaman Akdeniz Tel: Fax:

Unofficial Translation TELECOMMUNICATIONS BUSINESS ACT, B.E (2001) 1

Syllabus Law 641: Surveillance Law Seminar. George Mason University Law School Spring Jamil N. Jaffer

Law Commission Review of the Search and Surveillance Act 2012

Coordinated text from 10 August 2011 Version applicable from 1 September 2011

Conducting surveillance in a public place

JUS100 Introduction to Justice Studies

CRS Report for Congress

WIRETAPPING, SURVEILLANCE AND

By-laws of the Boston Ward 21 Democratic Committee Approved May 2014

23/06/05 1 KAMEN 8.05D

Chapter I. General Provisions

August 23, BY U.S. MAIL AND Freedom of Information Act Request Request for Expedited Processing

UNODC. Topic A: Preventing Human Trafficking and migrant smuggling in North and Latin American countries

Surveillance Devices Act 2007 No 64

Phone-Records Surveillance Is Broadly Acceptable to Public

Agreement on counter-terrorism measures

THE CONSTITUTIONAL COURT AND THE APPLICATION OF INTERNATIONAL HUMAN RIGHTS NORMS: INDONESIA S EXPERIENCE. Susi Dwi Harijanti

BELDEN RUSSONELLO & STEWART

TOP SECRET!/COMOO'//NO.i'ORN

Appendix B. State Wiretap Legislation (as of June 1, 2002)

International legal assistance in criminal matters

Resolutions Adopted at the 96 th Annual Conference August 2001 Saskatoon, Saskatchewan

Privacy: An Abbreviated Outline of Federal Statutes Governing Wiretapping and Electronic Eavesdropping

The Indonesian National Police and the Philippine National Police, hereinafter referred to as the Parties ;

Privacy, Policy and Public Opinion in Canada

Anti-Cyber Crime Law (8 Rabi / 26 March 2007)

Regulation of Interception of Act 18 Communications Act 2010

TITLE 18 CRIMES AND CRIMINAL PROCEDURE

9 th Session of the Conference of the Parties to the United Nations Convention against Transnational Organized Crime October 2018

Northern California Regional Intelligence Center

THE RUTHERFORD INSTITUTE

Report on the findings by the EU Co-chairs of the ad hoc EU-US Working Group on Data Protection

ANNEX I.32 LAW OF THE REPUBLIC OF INDONESIA NUMBER 22 YEAR 1997 CONCERNING NARCOTICS

Report on Interception of Communication and Intrusive Surveillance 1. (Best Practice Survey No. 3)

REGIONAL EFFORTS AMONG ASEAN COUNTRIES: MALAYSIA S PERSPECTIVES. Malaysia supports the continuous effort by United Nations Department for

Chapter I. Title, Jurisdiction and Definition

Report on the Findings by the EU Co-chairs of the. ad hoc EU-US Working Group on Data Protection. 27 November 2013

T-Mobile Transparency Report for 2013 and 2014

BYLAWS OF THE HIDALGO COUNTY REPUBLICAN PARTY

Introduction to Wiretap Law

Sneak and Peak Search Warrants

Spying on humanitarians: implications for organisations and beneficiaries

Technology and the Law. Jackie Charles

Guarding Constitution of Indonesia through the Court. Wasis Susetio Universitas Indonusa Esa Unggul Indonesia

Considerations on the use of technical surveillance in criminal proceedings

Statement for the Record. House Judiciary Subcommittee on Crime, Terrorism and Homeland Security. Hearing on Reauthorizing the Patriot Act

ABOUT SECURITY CULTURE. Sebastian SÂRBU, PhD

Combating Extortion and Bribery: ICC Rules of Conduct and Recommendations

Moscow (Russian Federation) 9 10 November Contribution presented by the Ministry of Justice of

Tripoli Action Plan on Combating Drug Trafficking and Money Laundering through the Mail

Regulation of Investigatory Powers Bill

CRS Report for Congress

Surveillance Devices Act 2007

Protection of Communications Secrets Act

: Consultant for Developing Guidelines for Mutual Legal Assistance Guidelines (National Position) Project Name : UNODC Sub-Programme 2

Debating privacy and ICT

ELUCIDATION OF LAW OF THE REPUBLIC OF INDONESIA NUMBER 8 YEAR 2010 CONCERNING PREVENTION AND ERADICATION THE CRIME OF MONEY LAUNDERING

OLR RESEARCH REPORT OLR BACKGROUNDER: HUMAN TRAFFICKING. By: Susan Price, Senior Attorney

FINAL WORKING DOCUMENT

Transcription:

Surveillance and Privacy in Indonesia

Table of Contents Preface I. Introduction... 1 II. Enabling Statutes and Authorization... 6 III. Cases in Indonesia... 12 A. Constitutional Court Judgment No. 006/PUU-I/2003, Judicial Review on Law No.30 of 2002 concerning Commission on Eradication Corruption (KPK)... 12 B. Constitutional Court Judgment No. 5/PUU-VIII/2010 Law No.11 of 2011 concerning Electronic Information and Transaction Interception under Government Regulation... 25 C. Constitutional Court Judgment No. 012, 016/PUU-IV/2006... 31 IV. Technical Aspect on Lawful Interception in Indonesia... 41 V. Surveillance Licensing Mechanisms... 64 VI. Privacy: The Indonesian Perspective... 69 VII. Conclusion... 74 Annexes

Preface This research report as result of collaboration project between The Cyber Law Center, Faculty of Law, Padjadjaran University and Privacy International in second year. The research project is to conduct research on the surveillance and Privacy in Indonesia, the objectives of the research study is to study and analyze the legal aspects of privacy and surveillance, were: (i) to views the legal aspects the surveillance expecialy for legal enforcement ; (ii) to give the recommendation to the government in drafting a Bill surveillance mechanism for legal enforcement. on Surveillance is defined as tacitly accept or listen to communication. Usually surveillance refers to acceptance in secret by law enforcement agencies to covertly receive or listen to a communication. Based on this definition, surveillance is an activity that is typically used by law enforcement institution to accept or listen to certain personal communication in secret, in carrying out their duties and obligations. 1 Time after time, public consider that surveillance activity is an improper usage or treatment of an entity and a violation of human rights. National Security Agency (NSA) surveillance case attracts public attention relating to above mentioned issue. One of the security agencies in USA, NSA was conducted wiretaps against the citizens of the United States and against other countries. The case leads to separation of legal opinion among jurists in USA. Washington DC Federal Court in a lawsuit filed by Larry Klayman, a 1 Bryan A Garner, Black s Law Dictionary Ninth Edition, Dallas, Texas: West Publishing, 2009, page 883.

conservative legal activists, decided that the NSA's efforts violate the Fourth Amendment protections against unreasonable searches privacy. 2 Meanwhile, dissenting decision came from the New York District Court. William Pauley, In a lawsuit filed by the American Civil Liberties Union, decided that the NSA interception is legal because the intention of such activity is for combating terrorism,. USA have a trauma about terrorism because of 2001 "nine-eleven" tragedy. 3 Surveillance activities brought strong reactions from various states, especially state that consider themselves as surveillance victim such as Germany, Brazil and Mexico. On November 7, 2013, Germany and Brazil submitted draft resolution on the protection of privacy rights against unauthorized wiretapping in the digital age to the United Nations General Assembly (hereinafter referred to as UN General Assembly) which later on December 18, 2013 the UN General Assembly endorsed the draft to the UN General Assembly Resolution A / Res / 68/167 on The rights to Privacy in the digital Age. Article 4 paragraph (a) of the UN General Assembly Resolution A / Res / 68/167 explicitly ask all states to respect and protect privacy right, including privacy rights in digital communications. Moreover, member states are also requested to review the procedures, practices and legislation related to the communication reconnaissance so that such activities conform with international human rights law as stipulated in Article 4 (c) of the UN General Assembly Resolution A / Res / 68/167. 4 In Indonesia, surveillance activities was in widespread known since information the Palapa-A I Satelite launching on July 9, 1976. 5 Recorded 2 AntaraNews.com, Hakim Putuskan Penyadapan NSA Illegal, http:// www.antaranews.com/berita/409907/hakim-as-putuskan-penyadapan-nsa-ilegal, downloaded 22th of January, 2014, 14.00 WIB. 3 Philippe Huguen, Judge Rules NSA Phone Surveillance Is Legal. Is a Supreme Court Intervention Inevitable?, http:// www. nationaljournal. com/technology/judge-rules-nsa-phone-surveillance-is-legal-is-a-supreme-courtintervention-inevitable-20131227, downloaded 20th of January, 2014, 14.05 WIB. 4 Article 4 subesction (c) Resolusi Majelis Umum PBB A/Res/68/167. 5 Papper, Naskah Akademik RUU Penyadapan, Trias Yuliana Dewi et. Al., p. 1.

in its development, surveillance has got public attention in about 1999, where one of Indonesian national magazine published an recording of conversation between the Attorney General and the President of Indonesia that time. 6 In 2009, Indonesia faced surveillance issue lead to confrontation between the two law enforcement agencies, the Commission against the Indonesian National Police. This issue triggered distrust between the two law enforcement agencies. 7 The development of technology have been used for law enforcing activity. However, in Indonesia, surveillance activity surveilance also gives serious impact on political and security dimension. Currently, Indonesia have several regulations relating to surveillance, those are: 1. Act No. 5 of 1997 on Psychotropic Substances, 2. Act No. 31 of 1999 on the Eradication of Corruption, 3. Act No. 36 of 1999 on Telecommunications, 4. Act No. 39 of 1999 on Human Rights, 5. Act No. 30 of 2002 on the Corruption Eradication Commission, 6. Government regulation to raplace act (Peraturan Pemerintah Pengganti Undang-Undang) No. 1 of 2002 on Combating Terrorism, 7. Act No. 18 of 2003 on Advocates, 8. Act No. 21 of 2007 on the Eradication of Trafficking in Persons, 9. Act No. 11 of 2008 on Information and Electronic Transaction, 10.Act No. 35 of 2009 on Narcotics, 11. Act No. 46 of 2009 on Crime Court Corruption, 12.Act No. 17 of 2011 on the National Intelligence, 13. Precidential Regulation No. 90 of 2012 on State Intelligence Agency 6 Ibid 7 http://id.wikipedia.org/wiki/konfrontasi_cicak_dan_buaya

14. Ministry of Communication and Information Technology Regulation No. 11 / PER / M.KOMINFO / 02/2006 on Information Surveilance Technique, and 15.Draft of Criminal Procedure Code. The diversity of the relevant regulations related to surveillance activity become human rights protection society concern. In practice, in a number of cases, surveillance was conducted outside its original purpose for law enforcement. Besides that, surveillance activity triggered clash between two law enforcing institutions in Indonesia so that surveillance have become debate topic in Indonesia. This Research was intended to study best practical solution for maximizing surveillance function as a law enforcing tool in Indonesia. Law enforcer must use surveillance to unveil criminal cases in Indonesia instead of using surveillance outsider law enforcing function. The study is important because the development forms of new criminal offenses are very difficult to solve by conventional means (without surveillance).

I. Introduction Information and communication technologies have supported interception since the era of Morse s telegraph. Interception is actively practiced worldwide with an increasing number of applications. 8 Wiretapping is the traditional term for interception of telephone conversations. This should not be taken too literally. The word is no longer restricted to communications travelling by wire, and contemporary wiretaps are more commonly placed on radio links or inside telephone offices. The meaning has also broadened in that the thing being tapped need no longer be a telephone call in the classic sense; it may be some other form of electronic communication, such as fax or data. 9 The origins of wiretapping lie in two quite different practices: eavesdropping and letter opening. "Eavesdropping," although once more restricted in meaning, has come to describe any attempt to overhear conversations without the knowledge of the participants. "Letter opening" takes in all acquisition, opening, reading, and copying of written messages, also without the knowledge of the sending and receiving parties. Telecommunication has unified and systematized these practices. Before the electronic era, a conversation could only be carried on by people located within earshot of each other, typically a few feet apart. Neither advanced planning nor great effort on the part of the participants was required to ensure a high degree of security. Written communications were more vulnerable, but intercepting one was still a hit-or-miss affair. Messages traveled by a variety of postal 8 International Telecommunication Unions, Technical Aspect of Lawful Interception, Technology Watch Report #6, May 2008, p.6 9 Whitfield Diffie and Susan Landau, Privacy on the Line The Politics of Wiretapping and Encryption, The MIT Press Cambridge, Massachusetts London, England, 1998, p. 151. 1 Surveillance and Privacy in Indonesia Cyberlaw Centre Padjadjaran University