Implementation of Resolution No. 4/2016 of the ICPO-INTERPOL Concerning Biometric Data Sharing: Between Countermeasures Against Terrorist Foreign Fighters (FTFS) and Protection of the Privacy of Indonesian Citizens

Authors

  • Amira Paripurna Airlangga University, Indonesia
  • Masitoh Indriani Faculty of Law, Universitas Airlangga
  • Ekawestri Prajwalita Widiati Airlangga University, Indonesia

DOI:

https://doi.org/10.21776/ub.blj.2018.005.01.08

Keywords:

INTERPOL, Biometric Data, Intelligence Sharing, Data Privacy, Terrorism

Abstract

This study aims to identify and explore the challenges in the implementation of Resolution No. 4/2016 of the ICPO-INTERPOL concerning sharing and exchanging biometric data among the members of ICPO-INTERPOL in order to counter terrorist foreign fighters (FTFs). This research also aims to elaborate and describe the mechanism of collecting, recording, storing, and exchanging biometric data conducted by the Indonesian government.

The mechanism of collecting, recording, and storing biometric data works through 3 main doors, namely: 1) in the process of making electronic Resident's ID Cards (e-ID Cards); 2) in the process of making SKCK (Certificates of Police Record); 3) in the process of making e-Passports. In the implementation of Resolution No. 4/2016 of ICPO-INTERPOL, the most obvious obstacles and challenges are the absence of regulations concerning the protection of personal data, and also the fact that the biometric data system itself is still relatively new and the database is not fully developed. Until today, the INTERPOL National Central Bureau (NCB) for Indonesia does not have its own biometric database system; instead they are using the database that is centralized at Pusinafis Polri (the Indonesian National Police's Center of Automatic Fingerprint Identification System).

The results of the study reveal that the biometric data recorded, collected, and stored are big data, but so far in supporting law enforcement and crime prevention processes the data have only been used as comparative data. In addition, there have also been found indications of violations of personal data and privacy, for example in relation to the absence of mechanism for data retention, consent, processing, notification, and disclosure.

Downloads

Download data is not yet available.

References

Book

Asshiddiqie, Jimly, Perihal Undang-Undang (Rajawali Pers, 2010).

Boehm, Franziska, Information Sharing and Data Protection in the Area of Freedom, Security and Justice: Toward Harmonized Data Protection Principles for Information Exchange at EU-Level (Springer, 2012)

Buhrow, C. William, Biometrics in Support of Military Operations: Lessons from the Battlefield (CRC Press Taylor & Francis Group, 2017)

Gardner, A, Bryan, Black’s Law Dictionary (West Group, 8th Ed, 2004)

Chalk, Peter, et.al, The Evolving Terrorism in South East Asia (RAND Corporation, 2009)

Chopra, Samir and Laurence White, A Legal Theory for Autonomous Artificial Agents (University of Michigan Press, 2011)

Deflem, Mathieu and Samantha Hauptman, ‘Policing International Terrorism’ in Francis Pakes (ed.), Globalisation and the Challenge to Criminology (Routledge, 2013)

Els J. Kindt, Privacy and Data Protection Issues of Biometric Applications: A Comparative Legal Analysis (Springer, 2013)

Kurbalija, Jovan, An Introduction to Internet Governance (Diplo Foundation, 6th ed, 2014)

Kumar, Ajay Zhang, David (Eds), Ethics and Policy of Biometric (Springer, 2010)

Ratcliffe, JH, Intelligence-Led Policing (Willan publishing, 2008)

Woodward, D, Jr, Facing Up to Terrorism (RAND Publication, 2001)

Yue Liu, Nancy, Bio-Privacy: Privacy Regulations and the Challenge of Biometric (Routledge, 2013)

Journal Articles

Crelinsten, Ronald, ‘Perspectives on Counterterrorism: From Stovepipes to a Compehensive Approach’ (2014) 1 Perspectives on Terrorism 8

Eichensehr, E. Kristen, ‘The Cyber-Law of Nations’ (2014) 103 The Georgeton Law Journal 317.

Hornung, Gerrit, Monika Desoi and Mattihias Pocs, ‘Biometric System in Future Scenarios—Legal Issues and Challenges’ (2016) Protection of Privacy in Biometric Data, IEEE Access

Hilbert, Martin, ‘Big Data for Development: A Review of Promises and Challenges’ (2016) 1 Development Policy Review 34

Liu, Yue, ‘Identifying Legal Concerns in the Biometric Context’ (2008) 1 Journal of International Commercial Law and Technology 3

Madensen, D, Tamara, ‘Europol and the Policing of International Terrorism: Counter-Terrorism in a Global Perspective’ (2007) 1 Policing: An International Journal of Police Strategies & Management 30

Morris R, Victor, ‘Identity and Biometrics Enabled Intelligence (BEI) Sharing for Transnational Threat Actors’ (2016) Small Wars Journal

Pan, Sheri, B, ‘Get to Know Me: Protecting Privacy and Autonomy Under Big Data’s Penetrating Gaze’ (2016) 1 Harvard Law Journal & Technology 30

Tene, Omer and Polonetsky, Jules, Big Data for All: Privacy and User Control in the Age of Analytics (2013) Northwestern Journal of Technology and Intellectual Property 239

Rahmaniar, Mirna , Lucky Endrawati and Milda Istiqomah, ‘Analisis Yuridis Data Kependudukan Kartu Tanda Penduduk Elektronik Untuk Penyidikan Tindak Pidana (Juridical Analysis of Population Data on Electronic Identity Cards for Criminal Investigation)’ (2014) Jurnal Hukum Fakultas Hukum

Unversitas Brawijaya <http://hukum.studentjournal.ub.ac.id/index.php/hukum/issue/view/31>

Website

European Commission, ‘Data protection Rules for the protection of personal data inside and outside the EU’ <http://ec.europa.eu/justice/data-protection/index_en.htm>

European Commission, ‘Identification of applicants (EURODAC)’ <https://ec.europa.eu/home-affairs/what-we-do/policies/asylum/identification-of-applicants_en>

Fromkin,M, Lesson learned too well: The Evolution of Internet Regulation, cdt (online) <https://cdt.org/blog/lessons-learned-too-well-the-evolution-of-internet-regulation/>

GDPR, ‘GDPR Key Changes’,eugdpr (online) <https://www.eugdpr.org/>

INTERPOL, ‘Foreign Terrorist Fighters,’ <https://www.INTERPOL.int/Crime-areas/Terrorism/Foreign-terrorist-fighters>

INTERPOL, ‘Practical Guidelines: Sharing Information with Law Enforcement,’ < file:///C:/Users/parip/Downloads/Practical%20Guidelines%20for%20sharing%20Information%20with%20Law%20Enforcement%20v2017.pdf>

INTERPOL, ‘Data Exchange’ <https://www.interpol.int/INTERPOL-expertise/Data-exchange>

INTERPOL, ‘Databases’ <https://www.interpol.int/INTERPOL-expertise/Databases>

Kementerian Dalam Negeri RI, ‘Apa dan Mengapa E-KTP (What e-ID Cards Are and Reasons (for their use))’, e-ktp (online), 20 June 2011 <http://www.e-ktp.com/2011/06/hello-world/>

Reports

‘Roundtable on Biometric Data Sharing for Identity Verification: Introduction To The Regional Data Sharing Initiative,’ Baliprocess.net (online), October 2014 <http://www.baliprocess.net/UserFiles/baliprocess/File/Discussion%20Paper%20on%20Biometric%20Data%20Sharing.pdf>

OECD, ‘The OECD Privacy Guidelines’ <http://www.oecd.org/sti/ieconomy/49710223.pdf>

Guidelines for the Regulation of Computerized Personal Data Files Adopted by General Assembly resolution 45/95 on 14 December 1990 <http://www.refworld.org/pdfid/3ddcafaac.pdf>

Home Office, ‘Biometric data-sharing process (Five Country Conference (FCC) data-sharing process)’ 2016, <https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/557896/biometric-data-sharing-v7.0.pdf>

Agreement on Information Exchange And Establishment of Communication Procedures <http://www.asean.org/storage/images/archive/17346.pdf>

European Union Committee, ‘House of Lords European Union Committee Europol: Coordinating the Fight Against Serious and Organised Crime : Report with Evidence’, 29th Report of Session 2007–08, < https://publications.parliament.uk/pa/ld200708/ldselect/ldeucom/183/183.pdf>

Buskey, Carlos, Delano, How Face Recognition Will Be Used to Counter Terrorism, Biometrics Report (2001), http://csis.pace.edu/ctappert/dps/d860-01/options/carlos.pdf >

Conference Paper

Boyd, Dana and Kate Crawford, ‘Six Provocations for Big Data: A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society’ (2011). <https://ssrn.com/abstract =1926431> or <http://dx.doi.org/10.2139 /ssrn.1926431>

Sherman, Darcie, ‘Biometric Technology: the Impact on Privacy’, Comparative Research in Law & Political Economy (2005) 1 (1)CLPE Research Paper.

Hansen M, Raguse M. and Storf K., Zwingelberg H. (2010) Delegation for Privacy Management from Womb to Tomb – A European Perspective in Bezzi M., Duquenoy P., Fischer-Hübner S., Hansen M., Zhang G. (eds) Privacy and Identity Management for Life Privacy and Identity (IFIP Advances in Information and Communication, 2009)

Shinta Dewi, Nilai Komersial dalam Data Pribadi dan Konsep Perlindungannya, Makalah, 2015 cited in Anggara et al, Menyeimbangkan Hak: Tantangan Perlindungan Privasi dan Menjamin Akses Keterbukaan Informasi dan Data di Indonesia 2015, <http://icjr.or.id /data/wp-ontent/uploads/2015/11/paper-3-final-Menyeimbangkan-Hak.pdf>

International Treaties And Legislations

Universal Declaration of Human Rights <http://www.un.org/en/universal-declaration-human-rights/>.

The 1951 Convention Relating to the Status of Refugees; the 1967 Protocol Relating to the Status of Refugees; Resolution 2198 (XXI) adopted by the United Nations General Assembly available at <http://www.unhcr.org/protection/basic/3b66c2aa10/convention-protocol-relating-status-refugees.html>

International Covenant on Civil and Political Rights, Adopted and opened for signature, ratification and accession by General Assembly resolution 2200A (XXI) of 16 December 1966 entry into force 23 March 1976, in accordance with Article 49 <http://www.ohchr.org/en

/professionalinterest/pages/ccpr.aspx>

Convention against Torture and Other Cruel, Inhuman or Degrading Treatment or Punishment, adopted and opened for signature, ratification and accession by General Assembly resolution 39/46 of 10 December 1984 entry into force 26 June 1987 <http://www.ohchr.org/EN

/ProfessionalInterest/Pages/CAT.aspx>.

The United Nations Convention against Transnational Organized Crime, adopted by General Assembly resolution 55/25 of 15 November 2000, < https://www.unodc.org/unodc/en/treaties/CTOC/ >

Newspaper

Bramantoro, Toni, ‘Koordinasi Antar Negara Adalah Kunci Untuk Mencegah Aksi Foreign Terrorist Fighter’, Tribunnews (online), 11 August 2016

Lee, Justin, ’INTERPOL says Lack of Biometric Data on Terrorists a Security Vulnebaribility’, Biometricupdate (online), 10 November 2016

Paripurna, Amira, ‘Time to Improve Info Sharing and Law,’ Jakarta Post (online) 28 January 2016 < http://www.thejakartapost.com/news/2016/01/28/time-improve-info-sharing-and-law.html >

Saifulloh, Muhammad, ‘BNPT Pimpin Negara ASEAN Bahas Foreign Terrorist Fighter’, Okezone (online), 11 August 2016, <http://news.okezone.com/read /2016/08/11/337/1460830/bnpt-pimpin-negara-asean-bahas-foreign-terrorist-fighter>

BBC Indonesia, ‘Kasus Saracen: Pesan kebencian dan hoax di media social ‘memang terorganisir’, BBC (online) 24 August 2017 <http://www.bbc.com/ indonesia/trensosial-41022914>

National Legsilations

Undang-undang Nomor 23 Tahun 2006 tentang Administrasi Kependudukan (Tambahan Lembaran Negara Republik Indonesia Nomor 4674)

Undang-undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik (Tambahan Lembaran Negara Republik Indonesia Nomor 4843)

Undang-undang Nomor 19 Tahun 2016 tentang Perubahan Atas Undang-undang Nomor 11 Tahun 2008 tentang Informasi dan Transaksi Elektronik (Tambahan Lembaran Negara Republik Indonesia Nomor 5952)

Undang-undang Nomor 14 Tahun 2008 tentang Keterbukaan Informasi Publik (Tambahan Lembaran Negara Republik Indonesia Nomor 4846)

Peraturan Pemerintah No 82 Tahun 2012 tentang Penyelenggaran Sistem Transaksi Elektronik (Tambahan Lembaran Negara Republik Indonesia Nomor 5348)

Downloads

Published

2018-04-20

How to Cite

Paripurna, Amira, Masitoh Indriani, and Ekawestri Prajwalita Widiati. 2018. “Implementation of Resolution No. 4/2016 of the ICPO-INTERPOL Concerning Biometric Data Sharing: Between Countermeasures Against Terrorist Foreign Fighters (FTFS) and Protection of the Privacy of Indonesian Citizens”. Brawijaya Law Journal 5 (1):117-42. https://doi.org/10.21776/ub.blj.2018.005.01.08.