Grundrechte gelten nicht im Weltall!: Die absurdesten Szenen aus dem NSA-BND-Untersuchungsausschuss

Presented at 32C3 (2015), Dec. 30, 2015, 12:15 a.m. (60 minutes).

In den nunmehr Hunderte A4-Seiten füllenden Live-Protokollen des NSA-BND-Untersuchungsausschusses, die bei netzpolitik.org nachzulesen sind, verbergen sich interessante Antworten auf Fragen, die niemand gestellt hat, vorher unbekannte juristische „Theorien“ des BND und Perlen verlogener Rabulistik.

Das schreit förmlich danach, Teile der Live-Protokolle aufzuarbeiten und vorzulesen. Genau das werden wir tun.


Presenters:

  • anna
    Schreibt bei netzpolitik.org zu Datenschutz, Überwachung und allem möglichen, was die Öffentlichkeit nicht wissen soll, aber sollte.
  • Constanze Kurz
    Constanze is the spokeswoman of the German Chaos Computer Club. Constanze is an author und freelance writer on technical topics and works at Berlin-based netzpolitik.org. She holds a doctoral degree in computer science. She is an activist and expert on surveillance techniques and co-authored technical analyses for the German Constitutional Court on controversial cases like data retention, covert infiltration of IT systems (law on the Federal Criminal Office (BKA-Gesetz)), anti-terror database, and voting computers.
  • cbass
    Cbass started working in communication security for a government agency in 2004. During the time he worked on topics of data protection, technical, physical, organizational security and vulnerability analysis for a variety of corporations. Since 2011 he is working as Lead Auditor ISO 27001, IT Security Consultant and Data Protection Officer mainly for automotive and supply industry.
  • Felix Betzin
    Felix is a Berlin based podcaster and podcast producer. In one of his projects he reports together with a team of other observers right from the German parliament’s special inquiry into the highly controversial surveillance practices revealed by Edward Snowden. Germany is to date the only country to have engaged in such a political review of its and others spy-agencies activities.

Links:

Similar Presentations: