This is the continuation of my previous post/ press release of the BKA on the arrest of 36 dissidents.
Photo below from Deutsche Wirtschafts Nachrichten 22. Juni 2017
Süddeutsche Zeitung 22. Juni 2017: The government wants to adopt a comprehensive monitoring law.
It contains, among other things, the so-called State Trojans. In this way, investigative authorities can secretly use malicious software for monitoring purposes.
Public debate has not taken place. This is because the law is introduced by the back door and hardly anyone knows.
On the agenda of the Bundestag this Thursday is one of the most extensive monitoring laws in the history of the Federal Republic. The Bundestag is to decide the law on the introduction of the so-called State Trojan at the request of the political groups of the CDU / CSU and SPD .
The investigative authorities are thus given the opportunity to secretly play malicious software on private computers, laptops, mobile phones and tablets – to monitor communication directly at the source and to read ongoing communication. They can also use these methods to access messenger services such as Whatsapp
At the same time, the planned law allows online search; A malicious software must also be installed on the device; It can then be accessed not only on ongoing communication, but on all stored contents. It is therefore possible to read the entire hard disk.
This law, which is to be passed at first reading, has not been discussed in public. This is remarkable because of the fact that other listening laws – for example, the large bugger attack on apartments – were bitterly denied for years.
The catalog of criminal offenses, where state infiltration of private computers is to be possible, is very long, ranging from terrorism to corruption, to “misleading asylum applications”. Not only the equipment of an accused can be searched, but also the equipment of other persons, if the investigators find it necesary.
In 2008, the Federal Constitutional Court had authorized the online search only in special cases of specific danger, under strict judicial control. At that time, the basic computer right was derived from the basic right of free development of personality – which is supposed to protect the “integrity of information technology systems”.
THIS IS LONG PLANNED AT THE EU LEVEL