KPK Scheduled to Check Five Witnesses For Setya Novanto Related E-KTP

By : Herry Barus And Aldo Bella Putra | Monday, August 21 2017 - 13:03 IWST

5166
5166

INDUSTRY.co.id - Jakarta - The Corruption Eradication Commission (KPK) will examine five witnesses in a corruption crime procurement procurement package on the application of ID card based on national identity number (e-KTP).

"Five men were examined as witnesses for the suspect Setya Novanto (SN)," said KPK spokesman Febri Diansyah in Jakarta, Monday (21/8/20017)

The five witnesses to be examined are the Head of Section for the Registration of the Change of Non-Birth Citizenship of Directorate General of Population and Civil Registration of the Ministry of Home Affairs Diana Anggraeni and Administrative Staff of the Directorate General of Population and Civil Registry of Kemendagri Henry Manik.

Furthermore, two people from private parties respectively Rudiyanto and Ferry Tan and Aby Hartanto work as a lawyer.

Related to the investigation of the KTP-e case with suspect Setya Novanto, KPK will continue to conduct examination of witnesses, especially for the roles of private parties and DPR.

KPK has appointed Chairman of the House Setya Novanto (Setnov) as suspect cases of alleged corruption crime procurement package implementation of ID card based on national population number (KTP-E) in 2011-2012 at Kemendagri.

"The KPK found sufficient initial evidence to appoint another suspect as KPK assigned SN (Setya Novanto) member of House of Representatives for the period 2009-2014 as a suspect for allegedly to benefit himself or others or a corporation abusing the authority, opportunity or means Which is in existence because of his position or position so that it is suspected to cause a state loss of at least Rp2.3 trillion of the procurement package value of around Rp5.9 trillion in the procurement package of e-KTP on Kemendagri," said KPK Chairman Agus Rahardjo at the KPK building here on Monday 17/7).

Setnov is suspected of violating Article 2 paragraph (1) of Article 3 of Law No 31 Year 1999 as amended by Law No. 20 Year 2001 on Corruption Eradication jo Article 55 paragraph (1) to the Criminal Code.

The Article regulates the person who violates the law, misuses the authority, opportunity or facilities in which the position or position may be detrimental to the state's finances and economy and enriches itself, another person or corporation with a maximum imprisonment of 20 years and a maximum fine of Rp 1 billion. (Ant)

News Comment

Today's Industry

World Bank Group (Images by ITU)

Kamis, 05 Maret 2020 - 07:23 WIB

World Bank Group Announces Up to $12 Billion Immediate Support for Covid-19 Country Response

As Covid-19 reaches more than 60 countries, the World Bank Group is making available an initial package of up to $12 billion in immediate support to assist countries coping with the health and…

Synopsys, Inc. (Images by PR Newswire)

Rabu, 04 Maret 2020 - 16:57 WIB

Better IoT Security Depends on Changes in Culture, habits

Ironically enough, the good news about the atrocious security of Internet of Things (IoT) devices might be that the bad news is getting a higher profile.Stories about security cameras getting…

Line Security Bug Bounty Program (Images by LINE Corporation)

Rabu, 04 Maret 2020 - 16:47 WIB

LINE Security Bug Bounty Program Report 2019

In late 2018 through early 2019, we began investigating the potential benefits of moving our program to HackerOne. After careful consideration, we concluded that we could likely improve the…

Check Point Software Technologies (Images by Acclaim)

Rabu, 04 Maret 2020 - 16:34 WIB

Check Point’s Hits Major Milestone as 100th Academic Institution Joins the Global Education

Check Point Software Technologies Ltd. NASDAQ: CHKP, a leading provider of cyber security solutions globally, has today announced that its Check Point SecureAcademy education initiative reached…

CloudGuard SaaS (Images by Check Point Software)

Kamis, 27 Februari 2020 - 14:08 WIB

Why are we still talking about email security?

with the rapid adoption of the internet and then the mobile internet, the email security market matured as enterprises understood that accessing proprietary information via the network exposed…