Police Chief Tito Karnavian Forms Forced Calling Team

By : Herry Barus And Aldo Bella Putra | Thursday, October 12 2017 - 21:00 IWST

Kapolri Jenderal Polisi Tito Kurniawan
Kapolri Jenderal Polisi Tito Kurniawan

INDUSTRY.co.id - Jakarta - National Police Chief Gen Tito Karnavian will form a special team to review the forced enforcement efforts requested by the House of Representatives in the context of the investigation of the Special Committee on the Rights of the House of Representatives regarding the Duties and Powers of KPK.

"The police will consider and will discuss internally about what steps will be taken to address this," Tito said at a hearing in the House of Representatives Commission III, Jakarta, Thursday (12/11/2017)

That, according to him, includes inviting experts from external, constitutional law experts, and criminal, in order to address what attitude Polri will be taken.

Tito believes that any involuntary summons must be regulated in the procedural law, namely the Criminal Procedure Code and the forced involuntary attempts requested by Parliament are not provided for in the Criminal Procedure Code.

"Do not let the attitude of Police who implement this would be a boomerang and blame many parties," he said.

He explained that in view of the Criminal Procedure Code, not recognizing the involuntary call by the DPR, including those relating to the Police duties are not explicitly stated.

Then Chairman of Commission III of the House of Representatives, Bambang Soesatyo cut off Tito's explanation, and said that in the Act No. 17 of 2014 on the MPR, DPR, DPD and DPRD (UU MD3) it was explained that the DPR could make a forced calling effort by asking for help to the Police.

"This is a matter of involuntary calling, which we regulate in the law is the Police of the Republic of Indonesia.If the order is Pamdal, we do not ask the Police," he said.

Golkar Party politician asked the National Police to think deeply about it because it is set in the law so that if refusing the forced call will reduce the authority of the Act.

Tito then explained that in the Act in question Bambang did not explain the technical matter of the summoning his name because Polri could not give an attitude to this problem.

According to him, if there is one paragraph or one article that conveys that the technical involuntary summons and hostage adjusted with the Criminal Procedure Code. (Ant)

News Comment

Today's Industry

World Bank Group (Images by ITU)

Kamis, 05 Maret 2020 - 07:23 WIB

World Bank Group Announces Up to $12 Billion Immediate Support for Covid-19 Country Response

As Covid-19 reaches more than 60 countries, the World Bank Group is making available an initial package of up to $12 billion in immediate support to assist countries coping with the health and…

Synopsys, Inc. (Images by PR Newswire)

Rabu, 04 Maret 2020 - 16:57 WIB

Better IoT Security Depends on Changes in Culture, habits

Ironically enough, the good news about the atrocious security of Internet of Things (IoT) devices might be that the bad news is getting a higher profile.Stories about security cameras getting…

Line Security Bug Bounty Program (Images by LINE Corporation)

Rabu, 04 Maret 2020 - 16:47 WIB

LINE Security Bug Bounty Program Report 2019

In late 2018 through early 2019, we began investigating the potential benefits of moving our program to HackerOne. After careful consideration, we concluded that we could likely improve the…

Check Point Software Technologies (Images by Acclaim)

Rabu, 04 Maret 2020 - 16:34 WIB

Check Point’s Hits Major Milestone as 100th Academic Institution Joins the Global Education

Check Point Software Technologies Ltd. NASDAQ: CHKP, a leading provider of cyber security solutions globally, has today announced that its Check Point SecureAcademy education initiative reached…

CloudGuard SaaS (Images by Check Point Software)

Kamis, 27 Februari 2020 - 14:08 WIB

Why are we still talking about email security?

with the rapid adoption of the internet and then the mobile internet, the email security market matured as enterprises understood that accessing proprietary information via the network exposed…