TNI Commander Marshal Hadi Tjahjanto Full Authority Canceled the Decision on the Mutation of Senior Officials

By : Candra Mata And Aldo Bella Putra | Wednesday, December 20 2017 - 18:30 IWST

Panglima TNI Marsekal Hadi Tjahjanto (Foto Dok Industry.co.id)
Panglima TNI Marsekal Hadi Tjahjanto (Foto Dok Industry.co.id)

INDUSTRY.co.id - Jakarta, TNI Commander Marshal Hadi Tjahjanto has the full authority to overturn the decision of a high-ranking officer mutation (starch) that the previous Commander General Gatot Nurmantyo has taken.

This was conveyed by Vice Chairman of Commission I of the House of Representatives Hanafi Rais in Jakarta, Wednesday (20/12).

According to him, the mutation of Senior Officers in the TNI is indeed the full authority of a TNI Commander.

Rais said, the mutation in the TNI is also normal and not the same logically with the cabinet reshuffle.

"Mutations in the TNI are not as logical as the cabinet reshuffle, so we should not politicize them," he said.

Meanwhile, members of Commission I of the House Evita Nursanti support the decision of TNI Commander Marshal Hadi Tjahjanto to change the Decision of TNI Commander General Gatot Nurmantyo No. Kep ​​/ 982 / XII / 2017 dated December 4, 2017.

Evita heard of 85 people who experienced Marshal Hadi rotation through Decree No. 982.1 / XII / 2017 dated December 19 eliminate the rotation of 16 people.

"But whatever I support the decision of Marshal Hadi.The first reason is indeed inappropriate if the rotation decision is taken by a TNI commander who was at the end of his term," he said as quoted by Antara.

It is said Evita it may be true that the rotation process has been going on far away but as the commander to be replaced should hand the decision to the new commander.

The second reason according to him, Marshal Hadi must have done an evaluation about the condition of human resources (HR) in TNi so inaugurated by President Joko Widodo.

"So he knows the power of the existing personnel so that the decision is made to maintain the position of personnel in the organization. Then there is a consideration of professionalism and` merit-system," he concluded.

News Comment

Today's Industry

Ilustration Brand phishing (Photo by Technonlogy For You)

Rabu, 21 Oktober 2020 - 15:30 WIB

Microsoft is Now Most Imitated Brand by Hackers

Microsoft soars from 5th place in Q2 to 1st place in Q3 for brand phishing attacks, making up 19% of all global phishing attacks in July, August and September.

Friedhelm Best - Vice President Asia Pacific, HIMA (Photo by HIMA)

Rabu, 21 Oktober 2020 - 14:20 WIB

Pharma 4.0: How Technology Is Transforming an Industry

Digital advancements in areas like systems integration, track-and-trace technology, and deep learning are helping the industry optimize its supply chain, improve safety, and even develop new…

Evan Dumas, Regional Director, Southeast Asia, Check Point Software Technologies (Photo by Linkedin)

Rabu, 21 Oktober 2020 - 13:50 WIB

Key Pillars To Optimal Endpoint Security In Today’s Climate

What does it take for businesses to be confident in the resilience of their endpoint protection? Check Point shares 4 key pillars for optimal endpoint security solutions for CISOs and IT professionals…

L/R: Alwin Zecha, Founder - Pacific Leisure Group, Thailand; Hiran Cooray Chairman - Jetwing Symphony PLC, Sri Lanka; and Akbar Shareef, Chairman & Chief Executive - Rakaposhi Tours (Pvt) Ltd., Pakistan (Photo by Global Travel Media)

Jumat, 16 Oktober 2020 - 17:15 WIB

PATA Honours Industry Leaders, Pioneers and Professionals at 69th Annual General Meeting

The following awards were presented during the 69th Annual General Meeting held online PATA Gallery of Legends Award, PATA Life Membership, and PATA Chair’s Award.

Evan Dumas, Regional Director, Southeast Asia, Check Point Software Technologies (Photo by Linkedin)

Jumat, 16 Oktober 2020 - 17:00 WIB

3 Key Principles Businesses Must Keep In Mind When Securing the Remote Workforce

It is critical that organisations take steps to secure the remote workforce to prevent falling victim to the next cyber attack.