Abstract
This article considers solutions to problems associated with State surveillance measures and interference into the privacy of the targeted individuals. Given that in-depth investigative measures to obtain digital evidence regularly encounter more than needed for the performance of State obligations, it argues for the deployment of artificial intelligence algorithms to protect fundamental rights during measures’ preformation. On the premise of the State’s duty to restrict intrusion into the individual’s privacy to a necessary minimum, which should take into account the current state of the art of the technology, it is proposed that the technology should already be used to pre-censor intimate or non-relevant data during the evidence’s seizure and to reduce serendipity (chance discoveries) in the criminal investigations.
This text is a faithful translation of the original German version of the article Gleizer, Algorithmischer Kernbereichsschutz: Zum Einsatz von Künstlicher Intelligenz in der Online-Durchsuchung als Staatspflicht, in: Beck/Kusche/Valerius, Digitalisierung, Automatisierung, KI und Recht. Baden-Baden: Nomos, 2020, p. 535 ff.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
This is also the view of Hilgendorf (2020), p. 405 (412).
- 2.
- 3.
- 4.
Concerning the exclusion of such recordings of “background conversations” during the surveillance of communications under Article 100a StPO, cf. BGHSt 31, 296.
- 5.
Already cautioned by Lobe (2020), p. 74.
- 6.
- 7.
The acoustical monitoring differs from computer and network monitoring in that it exposes the concerned individual to a more dangerous situation and a higher vulnerability, since the individual has a higher level of trust in their personal equipment, furthermore benefitting from and manipulating technical means belonging to them. This also impairs the integrity of private information technology systems. The information technology systems deployed for this purpose are neither at the disposal of the prosecution authorities nor are they owned by them, but by the concerned individual. If we bring home a simple household appliance like a smart television, then are we ourselves bringing a spy into our home? Since we are dealing with an interference of particular quality and intensity, it should be explicitly authorized. On a case of an unauthorized monitoring of sexual intercourse, Záboji (2016).
- 8.
- 9.
Instructive in this context BVerfGE 133, 277 (325 ff.).
- 10.
BVerfGE 120, 274.
- 11.
- 12.
BVerfGE 109, 279 (319). Whether this criterion created by BVerfGE is sufficient and legitimate is a question that cannot be discussed in more detail here.
- 13.
Roggan (2017), p. 821 (826).
- 14.
BVerfGE 109, 279 (374 f.); 120, 274 (338).
- 15.
See Hilgendorf (2020), p. 405 (412).
- 16.
For both requirements, see instead of all, Kingreen and Poscher (2019), p. 95, recital 330 (regarding proportionality), p. 99, recital 352 (regarding the guarantee of the essence).
- 17.
See under 3.2.1.
- 18.
BVerfGE 120, 274 (302 ff.).
- 19.
In this regard, for the first time, BGHZ 13, 334 (338); cf. also BVerfGE 35, 202 (219 ff.); 54, 148 (153); 27, 1 (6).
- 20.
Kingreen and Poscher (2019), p. 121 recital 441.
- 21.
BVerfGE 54, 148 (153); 99, 185 (193).
- 22.
BVerfGE 120, 274 (314).
- 23.
BVerfGE 120, 274 (314).
- 24.
BVerfGE 120, 274 (335 ff.).
- 25.
The question whether the essence coincides with the essence of human dignity can remain open, given its apparent irrelevance for the argument developed here. For that, see Häberle (1983), p. 234 ff.; conversely, Schneider (1983), p. 190 ff.; Barrot (2012), p. 158 ff.; Dammann (2011), p. 141 ff.; see also Warntjen (2007), p. 76 ff.; Duttge (1995), p. 180 ff., who defend the concept of minimum conditions for the core area.
- 26.
- 27.
BVerfGK 11, 164 (172).
- 28.
BVerfGE 6, 32 (41).
- 29.
Dammann (2011), p. 13.
- 30.
Regarding this sphere-related theory, cf. instead of all others Barrot (2012), p. 29 ff.
- 31.
In this sense, also Dammann, (2011), p. 49 ff.
- 32.
Significant is BVerfGE 80, 367 (373) (“diary II”), wherein the Court decided that “the mere recording of information in a diary does not exclude that information from being accessed by the State. The usability rather depends upon the nature and significance of its content”.
- 33.
The criterion of direct relationship is being applied by the Federal Constitutional Court since the Diary-II-decision: BVerfGE 80, 367 (375). Regarding the criterion, Dammann, (2011), p. 43 ff., 51 f., who pointed out with good reason that a direct relationship only exists when “the revealed content of thoughts itself shows a relation to the offence, in other words, is related to the planning or commission of a criminal conduct. Not sufficient is the existence of hints of a tendency of committing offences or other traits of character of the expressing individual indirectly related to the solution of an offence”. Cf. also BVerfGE 80, 367 (382 f.).
- 34.
BVerfGE 113, 348 (391); NJW 2007, p. 2753 (2754); BVerfG NJW 2009, p. 2431 (2436); BVerfG 26. Juni 2008, Az.: 2 BvR 219/08, recital 19 ff.
- 35.
BVerfGE 80, 367 (382), Tagebuch II—dissenting vote.
- 36.
In the same way, also Dammann, (2011), p. 43 with further references.
- 37.
Dammann, (2011), p. 51.
- 38.
In this sense, Dammann, (2011), p. 51.
- 39.
Dammann, (2011), p. 40.
- 40.
BGHSt 57, 71.
- 41.
The same should apply to keyboard input still pertaining to the sphere of the remitter arising during the use of information technology systems (see Lobe (2020), p. 74), because it is also “characterized by contents of conscience that occur subconsciously” (BGHSt 57, 71 [77]).
- 42.
BGHSt 57, 7 (77).
- 43.
- 44.
BVerfGE 120, 274 (337); cf. also BVerfGE 109, 279 (318); 113, 348 (391 f.).
- 45.
For the application of an accompanying judicial control see Perne (2006,) p. 1486 (1489 ff.).
- 46.
Dammann, (2011), p. 50 f.
- 47.
Kingreen and Poscher (2019), p. 95 recital 330 ff.
- 48.
- 49.
- 50.
BVerfGE 109, 279 (322).
- 51.
Similarly, see Hilgendorf (2020) p. 405 (412): “Applied to the information and communication technology, this means that the State must protect its citizens against threats which emanate from novel technical possibilities. It equally follows that the State must observe closely the technological evolution, because only then it is able to fulfil its protection obligation in due time” (translated from the German original).
- 52.
For an introduction, see Lenzen (2018), p. 52 ff; Kelleher (2019), p. 1 ff. A very interesting explanation of similar processing methods of human neuronal networks can be found in Carr, What the internet is doing to our brains: the shallows, New York 2011, p. 17 ff.
- 53.
Regarding Hilgendorf’s convincing claim for more attention to an inclusion of technical subjects in the training of future generations of legal experts, see Hilgendorf, Digitalisierung (fn. 2), p. 405 (421).
- 54.
Lenzen (2018), p. 55.
- 55.
Kelleher (2019), p. 12.
- 56.
Kelleher (2019), p. 14.
- 57.
Kelleher (2019), p. 16.
- 58.
Kelleher (2019), p. 16; for a technical explanation, see Skansi (2018), p. 32 (37 ff.).
- 59.
Kelleher (2019), p. 20; for a technical explanation, see Skansi (2018), p. 107 ff.
- 60.
- 61.
Kelleher (2019), p. 159 ff.
- 62.
Kelleher (2019), p. 25.
- 63.
Vacca (2012), p. 486.
- 64.
Hilgendorf. In: Bendel (ed.) (2019), p. 355 (367).
- 65.
- 66.
Greco (2020), p. 29–62.
- 67.
Regarding the prognosis of the solution to the core area dilemma as proposed by the Federal Constitutional Court, see Dammann, Kernbereich (fn. 26), p. 40 ff., 50; cf. also BVerfGE 109, 279 (320).
- 68.
Cf. instead of all others Singelnstein, in: Münchener Kommentar zur StPO, München 2019, § 477, recital 24 ff.
- 69.
Regarding the prohibition of circumvention, Wolter, Beweisverbote und Umgehungsverbote zwischen Wahrheitserforschung und Ausforschung, in: Roxin/Widmaier (eds.), 50 Jahre Bundesgerichtshof. Festgabe aus der Wissenschaft, Vol. IV: Strafrecht, Strafprozeßrecht, München 2000, pp. 964–1009.
References
Barrot JM (2012) Der Kernbereich privater Lebensgestaltung. Nomos, Baden-Baden
Beulke W, Ruhmannseder F (2011) Strafprozessuale Zwangsmaßnahmen in der Verteidigungssphäre (Teil 1). StV:180
Dammann I (2011) Kernbereich der privaten Lebensgestaltung. Dunkler & Humblot, Berlin
Duttge G (1995) Der Begriff der Zwangsmaßnahme im Strafprozessrecht. Nomos, Berlin
Eschelbach R (2018) §100c recital 5. In: Satzger H, Schluckebier W, Widmaier G (eds) Strafprozessordnung, 3rd edn. Publisher, Köln
Greco L (2020) Richterliche Macht ohne richterliche Verantwortung. Warum es den Roboter-Richter nicht geben darf. Rechtswissenschaft 11:29–62
Häberle P (1983) Die Wesensgehaltgarantie des Art. 19 Abs. 2 Grundgesetz, 3rd edn. C.F.Müller, Heidelberg
Hilgendorf E (2019) Automatisiertes Fahren als Herausforderung für Ethik und Rechtswissenschaft. In: Bendel O (ed) Handbuch Maschinenethik. Springer, Wiesbaden, pp 355–372
Hilgendorf E (2020) Digitalisierung, Virtualisierung und das Recht. In: Kasparowicz D, Rieger S (eds) Handbuch Virtualität. Springer, Wiesbaden
Kelleher JD (2019) Deep learning. Publisher, Cambridge
Kingreen T, Poscher R (2019) Grundrechte Staatsrecht II, 35th edn. C.F.Müller, Heidelberg
Lobe A (2020) Speichern und Strafen: Die Gesellschaft im Datengefängnis. Beck, München
Mainzer K (2019) Künstliche Intelligenz, 2nd edn. Springer, München
Nida-Rümelin J, Battaglia F (2019) Maschinenethik und Robotik. In: Bendel O (ed) Handbuch Maschinenethik. Springer, Wiesbaden, p 167
Perne V (2006) Richterband und Kernbereichsschutz. Dvbl 2006:1486
Pham HNA, Triantaphyllou E (2008) The Impact of overfitting and overgeneralization on the classification accuracy in data mining. In: Maimon O, Rokach L (eds) Soft computing for knowledge discovery and data mining. Springer, Boston, pp 391–431
Roggan F (2017) Die strafprozessuale Quellen-TKÜ und online-Durchsuchung. StV:821–829. https://doi.org/10.1515/stv-2017-1204
Rottmeier C (2017) Kernbereich privater Lebensgestaltung und strafprozessuale Lauschangriffe. Mohr Siebeck, Tübingen
Rüscher D (2018) Alexa, Siri und Google als digitale Spione im Auftrag der Ermittlungsbehörden? NStZ:687–692
Russell S, Norvig P (2016) Artificial Intelligence: a modern approach. Pearson, Harlow
Schneider L (1983) Der Schutz des Wesensgehalts von Grundrechten nach Art. 19 Abs. 2. Dunkler & Humblot, Berlin
Singelnstein T, Derin B (2017) Das Gesetz zur effektiveren und praxistauglicheren Ausgestaltung des Strafverfahrens. NJW:2646
Singelnstein T (2019) §477, recital 24 ff. In: Knauer C, Schneider H (eds) Münchener Kommentar zur StPO. Beck, München
Soiné M (2018) Die strafprozessuale Online-Durchsuchung. NStZ:497
Vacca JR (2012) Computer and information security handbook. Morgan Kaufmann, Massachusetts
Warntjen M (2007) Heimliche Zwangsmaßnahmen und der Kernbereich privater Lebensgestaltung. Nomos, Berlin
Wolter J, Greco L (2016) §100a recital. In: Wolter J (ed) Systematischer Kommentar zur Strafprozessordnung, 5th edn. Carl Heymanns, Köln
Wolter J (2000) Beweisverbote und Umgehungsverbote zwischen Wahrheitserforschung und Ausforschung. In: Roxin C, Widmaier G (eds.) 50 Jahre Bundesgerichtshof. Festgabe aus der Wissenschaft, vol IV: Strafrecht, Strafprozeßrecht. Beck, München 2000, pp. 964–1009
Záboji Von N (2016) Unheimliche Bilder. Available at Frankfurter Allgemeine Zeitung http://bit.ly/2LZUCKM
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Gleizer, O. (2024). Algorithmic Protection of the Core Area of Private Life. On the Deployment of Artificial Intelligence in Computer and Network Surveillance as a Duty of the State. In: Moura Vicente, D., Soares Pereira, R., Alves Leal, A. (eds) Legal Aspects of Autonomous Systems. ICASL 2022. Data Science, Machine Intelligence, and Law, vol 4. Springer, Cham. https://doi.org/10.1007/978-3-031-47946-5_10
Download citation
DOI: https://doi.org/10.1007/978-3-031-47946-5_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-47945-8
Online ISBN: 978-3-031-47946-5
eBook Packages: Law and CriminologyLaw and Criminology (R0)