Surveillance in Germany

Get Started. It's Free
or sign up with your email address
Surveillance in Germany by Mind Map: Surveillance in Germany

1. by organisations

1.1. surveys

1.2. marketing research

1.3. management

1.4. security

2. laws

2.1. examples

2.1.1. Telecommunications Data Retention Law

2.1.2. Flight Passengers Data Law

2.1.3. Video Surveillance Improvement Law

2.1.4. new surveillance laws

2.1.4.1. alows government authorities installing malware ("state trojan"

2.1.4.1.1. on smartphones, tablet, computer

2.1.4.1.2. for criminal investigation

2.1.4.2. passed October 2016 by Bundestag

2.1.4.3. allows BND cooperating with foreign intelligence services

2.1.4.3.1. NSA

2.1.4.3.2. at EU institutions + other EU member states

2.1.4.4. for specific purposes

2.1.4.4.1. fighting terrorism

2.1.4.4.2. supporting German military on foreign missions

2.1.4.4.3. collecting information concerning safety Germans abroad

2.1.4.5. prohibits monitoring of German citizen

2.1.4.6. contains no restriction on surveillance of non-Germans

3. reasons

3.1. high crime rate

3.2. terror attacks

3.2.1. Berlin Christmas market 2016

3.3. voyeurism

4. problems

4.1. cotradiction/conflict between

4.1.1. privacy + safety

4.1.2. human rights + collection of data

4.1.3. data protection + techological possibility/progress

4.1.3.1. data collection more comprehensive + simply

5. technology

5.1. video cameras

5.1.1. kitted out with biometric technology

5.1.2. government: hope install on train stations

5.1.3. images recorded within seconds

5.1.4. checks if person on wanted list

5.2. necessary development

5.2.1. globalization

5.2.2. migration

5.2.3. digitalization

6. by the authorities

6.1. security

6.1.1. public safety

6.1.2. employee safety

6.2. big brother

6.3. intelligence

6.4. secret service

6.5. law enforcement

6.6. security authorities

6.6.1. examples

6.6.1.1. Federal Office for the Protection of the Constitution (BfV)

6.6.1.2. Federal Criminal Police Office (BKA)

6.6.1.2.1. use IMSI-Catcher

6.6.1.2.2. eavesdropping device

6.6.2. use mobile phones to secretly locate suspects

6.6.3. find out where mobile phones are

6.6.4. create profiles of suspect´s movements

6.7. actions

6.7.1. dramatically reduce public´s trust in digital privacy

7. by individuals

7.1. normal social interaction

7.2. voyeurism

7.3. stalking

7.4. hackers

8. intentions

8.1. control

8.2. safety

8.3. scaring off

8.4. containment of voyeurism

8.5. reduce crime rate

9. definition

9.1. observation (person/place)

9.2. by army, police, camera

9.3. collection, comparison, analysis, dissemination of data

9.4. type of observational study

9.4.1. continous monitoring of disease occurence within population