Tech

Constitutional Protection Act: Saxony-Anhalt wants to use state Trojans


Saxony-Anhalt wants to adapt its constitution protection law to technical development: constitutional protectors should be able to follow encrypted communication in the future, if a judge agrees, the Interior Ministry announced on Tuesday in Magdeburg. "We have adjusted the legal rules so that we can basically continue to do what we have always been allowed to do before the Internet came before encryption techniques were used," said Defense Commissioner Jochen Hollmann. The law has yet to be decided by the state parliament.

"Over time, as many intelligence agencies and the police have done, we have been less and less in the habit of listening to conversations in terms of content." Hollmann emphasized that the so-called source TKÜ is limited to the absolute exceptional case, maybe one or two a year. The constitutional protection is also dependent on the Federal Office for the Protection of the Constitution. It's about every ongoing communication from phone calls to messenger services. The LKA Berlin had recently bought in vain expensive FinFischer spy technology – it was not allowed to be used. The federal government wants to be able to clear up burglaries more effectively with the state trojan.

Saxony-Anhalt's new law also stipulates that findings about 14- and 15-year-olds can not only be stored, but also passed on to the constitution protection association. So far, data would be stored in two-digit numbers, said Hollmann. As an example, he called 15-year-old, who have left for the IS terrorist militia. If the federal government or in other countries knowledge leaked, could be saved from Saxony-Anhalt to. This is important for a common security architecture in Germany, said Interior Minister Holger Stahlknecht (CDU).

The bill enumerates the intelligence resources for covert information gathering. Everything that is not enumerated, do not go either. According to constitutional protection chief Jochen Hollman are listed, for example, the observation, the use of trusted persons and undercover agents, image recordings, covert investigations with and without technology, camouflage papers and camouflage marks and the enlightenment of the Internet.

New is also a stronger parliamentary control of the protection of the Constitution. Two consultations of the Parliamentary Control Panel provided for a public part. So far, the public is completely excluded. So far, the body was called the Parliamentary Control Commission (PKK) and is now called the Parliamentary Control Panel (PKG) because the abbreviated PKK is also used for the banned Kurdistan Workers' Party.


(emw)



. (TagsToTranslate) Federal Government (t) LKA (t) Landeskriminalamt (t) source TKÜ (t) Trojans