Yulianis focus on weak KPK Supervision Handle Corruption

By : Aldi Firhand Alqudri | Tuesday, July 25 2017 - 14:47 IWST

Yulianis the Key Witness of corruption case
Yulianis the Key Witness of corruption case

INDUSTRY.co.id - Jakarta- key witness of the athlete's homes corruption case, Yulianis, highlighted the weakness of the KPK's supervision function against other law enforcement agencies in handling corruption because other agencies have difficulty obtaining evidence since they have submitted them to the KPK.

"Coordination between agencies in the KPK is not running, because for example other institutions difficult to borrow evidence of corruption cases that I have, even though I have submitted all to KPK," said Yulianis in Public Hearing Meeting of KPK Rights Questionnaire, at the Nusantara Building, Jakarta, Monday (7/24/2017)

He cited when the police wanted to check him in relation to one of the cases, the investigator of the agency asked for evidence.

Then Yulianis said she had submitted all the evidence to the KPK so that the police investigators better ask directly to the KPK.

"The police investigator said that they has sent a letter requesting to borrow the evidence to the KPK but not responded by the KPK," she said.

According to him, the incident also occurred in the KPK internal for example, KPK investigators want to investigate the project in the Ministry of Transportation and ask for his information and ask for evidence it has.

Yulianis said she had told the investigator that all the data had been submitted to the KPK.

"They asked for the data, then I said why ask for more data because the KPK already hold it all so just stay asking for it. They say it's a hassle, I finally said that do not bring proof and data so do not check me," she said.

She also highlighted the handling of cases in the KPK of 162 projects run by Nazaruddin, anti-corruption agencies that only handle five projects and ensnare the former Treasurer of the Democratic Party in the case of Wisma Athletes only.

The five projects, according to her, are Solar Power Station (PLTS) in Mesuji, Lampung, with suspects Nazaruddin wife, procurement at Udayana University Bali with suspect Marisi Matondang, procurement laboratory of Airlangga University with Minarsih suspect.

"Then the procurement of health equipment at Airlangga University Hospital with suspect Minarsih, then Wisma Athletes with suspects Rosa, Nazaruddin, Andi Mallarangeng, and Wafid Muharam," she said.

News Comment

Today's Industry

World Bank Group (Images by ITU)

Kamis, 05 Maret 2020 - 07:23 WIB

World Bank Group Announces Up to $12 Billion Immediate Support for Covid-19 Country Response

As Covid-19 reaches more than 60 countries, the World Bank Group is making available an initial package of up to $12 billion in immediate support to assist countries coping with the health and…

Synopsys, Inc. (Images by PR Newswire)

Rabu, 04 Maret 2020 - 16:57 WIB

Better IoT Security Depends on Changes in Culture, habits

Ironically enough, the good news about the atrocious security of Internet of Things (IoT) devices might be that the bad news is getting a higher profile.Stories about security cameras getting…

Line Security Bug Bounty Program (Images by LINE Corporation)

Rabu, 04 Maret 2020 - 16:47 WIB

LINE Security Bug Bounty Program Report 2019

In late 2018 through early 2019, we began investigating the potential benefits of moving our program to HackerOne. After careful consideration, we concluded that we could likely improve the…

Check Point Software Technologies (Images by Acclaim)

Rabu, 04 Maret 2020 - 16:34 WIB

Check Point’s Hits Major Milestone as 100th Academic Institution Joins the Global Education

Check Point Software Technologies Ltd. NASDAQ: CHKP, a leading provider of cyber security solutions globally, has today announced that its Check Point SecureAcademy education initiative reached…

CloudGuard SaaS (Images by Check Point Software)

Kamis, 27 Februari 2020 - 14:08 WIB

Why are we still talking about email security?

with the rapid adoption of the internet and then the mobile internet, the email security market matured as enterprises understood that accessing proprietary information via the network exposed…