Site icon The Indian Panorama

Journalists used AI to trace German far-left militant well before police pounced

Berlin (TIP): Investigative journalists using artificial-intelligence tools were on the trail of a fugitive member of the notorious Red Army Faction well before German police announced a breakthrough in the 30-year-old case earlier this week. Daniela Klette, 65, a member of the leftist militant group, was arrested on Monday in her Berlin flat on suspicion of committing a string of robberies and at least one attempted murder between 1999 and 2016 to finance her underground life.
German police and security services have drawn criticism over their failures in some politically charged investigations. Their defenders say strict privacy laws limit their ability to use the kinds of artificial intelligence-enhanced tools that a German TV podcast deployed to track down Klette last year.
Daniela Behrens, the interior minister of Lower Saxony state where many of the crimes were committed, hailed Klette’s arrest as a major breakthrough and a tribute to the diligence of the police and prosecutors on the case.
Last year, however, an ARD television podcast tracked Klette, one of three RAF militants still sought 26 years after the group announced its dissolution, by putting the picture from her wanted notice through image search tool PimEyes.
This yielded online images of a much older woman going by the name “Claudia Ivone” who, until the Covid pandemic struck in 2020, regularly took part in Berlin’s Afro-Brazilian scene and was a practitioner of Brazilian martial dance capoeira.
“I strongly recommend that you follow this trace,” Bellingcat investigative journalist Michael Colborne recalled telling the podcasters in an interview with Die Zeit weekly on Thursday. He said he had run the pictures through a host of face comparison tools and kept turning up the same result.
The ARD podcasters passed their finding to law enforcement authorities, who on Tuesday said they had been put back on Klette’s trail in November by a tip from the public.
“For reasons of investigation tactics we make no disclosures about our detection methods,” prosecutor Alexander Hege said when asked if the podcast was the original source of the tip. (Reuters)

Exit mobile version