Skip to content
zensation
🔬

Research overview

Three tracks, architecture and agenda

📐

Methodology

Operational standards and validation

📄

Publications

Preprints, software, identifiers

⚖️

Research ethics

Fundamental-rights nexus and compliance

🏛️

Public sector & funding

Collaborations in the public sector

🧰

Resources

Code, data, citation, open science

AboutOpen SourceDevelopersBlog
Contact
zensation
🔬Research overview📐Methodology📄Publications⚖️Research ethics🏛️Public sector & funding🧰Resources
AboutOpen SourceDevelopersBlogContact

Research ethics and compliance

Research grounded in fundamental rights

This page documents the legal, ethical, and methodological framework under which we conduct research — particularly Track B (safety in public spaces), where the relationship to fundamental rights is addressed structurally, not as an add-on.

Scope

The principles documented here apply to all research activities. The emphasis is on Track B (predictive early-warning in public spaces), where the tensions between safety research and fundamental rights are most acute.

Legal framework

Legal bases the research is designed for

GDPR Art. 89 in conjunction with § 27 BDSG

Processing for scientific research purposes operates under the safeguards of Art. 89(1) GDPR and the German specification in § 27 BDSG: pseudonymisation where feasible, data minimisation, purpose limitation, technical and organisational measures. The current research design does not process special categories of personal data under Art. 9 GDPR.

Regulation (EU) 2024/1689 — AI Act, Art. 5(1)(h)

The research architecture is designed to remain outside the scope of prohibited practices under Art. 5 AI Act. In particular, it performs no real-time remote biometric identification (Art. 5(1)(h)) and does not identify natural persons. Classifications refer exclusively to statistical properties of crowd dynamics, not to identifying features.

Demarcation from predictive policing (Art. 5(1)(d) AI Act)

The AI Act prohibits AI systems that assess natural persons in order to predict the likelihood of a criminal offence. The research architecture does not assess individuals. It analyses statistical properties of collective dynamics with respect to escalation potential. It produces no offence prognoses, no attributions of guilt or threat-actor labelling, and does not operate within the scope of Art. 5(1)(d) AI Act.

High-risk classification under AI Act Annex III

When used by or on behalf of law enforcement or public security authorities, the system may fall under the high-risk classification of Annex III No. 6. The architecture is therefore designed to meet the requirements of Art. 8–15 AI Act: risk management system, data and data governance, technical documentation, automated logging, transparency and information duties, human oversight, as well as accuracy, robustness, and cybersecurity.

Freedom of assembly (Art. 8 Basic Law, Brokdorf doctrine)

The architecture contains structural safeguards for political assemblies in line with the German Federal Constitutional Court's doctrine (BVerfGE 69, 315 — Brokdorf): assemblies are not the object of investigation but a constitutionally protected context. The detection logic is explicitly designed not to classify assembly dynamics as anomalous.

Civil-liberties by design

Four structural architectural decisions

These commitments are written into the research architecture as design principles, not retrofitted as add-ons.

No biometric identification

The pipeline processes skeletal and motion data without facial features. Neither face recognition nor re-identification via biometric templates takes place.

No real-time person tracking

Trajectories are used only within a bounded analysis window for statistical aggregation, not for persistent tracking of individuals across spaces or time.

Helper protection as an explicit objective

The three-outlier model distinguishes three roles in a crisis situation: source (initiating actor), helper (intervening or assisting party), and knower (contextually reacting bystander). Helper protection is not post-processing but encoded as a penalty term in the loss function — misclassifying a helping person as an initiator is structurally penalised more strongly than other errors.

Probabilistic classification with coverage guarantee

Outputs are calibrated probabilities — not deterministic person-level labels. Calibration uses conformal prediction, a statistical method with a verifiable confidence level: at a threshold of 0.9, the output set contains the correct class in at least 90 % of cases. Thresholds and confidences are explicitly reported for every decision.

Eight mandatory corrections

Structural corrections to established methods

Overview of corrections we systematically incorporate against existing risk-analysis methods (notably SPOT and the Berlin three-stage model). The full derivation is presented in a position paper in preparation.

  1. 01

    Demarcation from SPOT and the Berlin three-stage model

    Methodological distance from methods without controlled validity.

  2. 02

    Helper protection

    Helper differentiation as a structural element of classification.

  3. 03

    Counterfactual attribution

    Individual contributions are tested counterfactually against the crowd baseline.

  4. 04

    Crowd median as baseline

    Anomaly is defined against the current crowd median, not a normative target.

  5. 05

    Probabilistic contributions

    Every contribution is a probability with confidence interval, not a categorical attribution.

  6. 06

    Right to audit log

    Every classification is documented with a traceable audit trail, accessible to lawful review.

  7. 07

    Pressure-sensitive transparency

    Transparency obligations scale with intervention depth — deeper intervention requires fuller disclosure.

  8. 08

    Protection of political assemblies

    Assembly dynamics are methodologically separated from crisis dynamics; assemblies are never the object.

Research integrity

How we document our research

OpenTimestamps anchoring

Core research documents (architectural specifications, position-paper drafts, grant outlines) are anchored in time via OpenTimestamps. This produces a forensically verifiable priority anchor independent of later publication dates.

Open access

Published research outputs appear on arXiv and Zenodo with DOI. Software releases are made available under Apache 2.0 on GitHub and npm.

Subjunctive discipline

Outreach to potential co-authors is conducted consistently in the subjunctive; names are not communicated before written consent. Work in preparation is labelled as such.

Reference-case dossier

The validation basis consists of publicly documented incidents from 2015–2025, selected for forensic documentation density and suitability for methodological differentiation. Source material is exclusively publicly accessible. Out of respect for bereaved relatives, ongoing proceedings, and memorial structures, individual case names are not foregrounded in this overview documentation; the selection logic is presented separately in a methodological companion text.

External ethics oversight (being established)

Independent research laboratories do not have access to the institutional ethics committees of a university. The establishment of an external ethics-oversight structure is part of our medium-term structural development. In the interim, external oversight and validation instances are used: notified-body pre-assessments (TÜV SÜD, TÜV Rheinland, Bureau Veritas) and legal opinions on the constitutional compliance of the architecture.

Operational methodological standards in detail→

Conflicts of interest

Disclosure

The work is conducted as an independent research lab under the scientific leadership of Alexander Bering. It is currently self-funded without external third-party funding and pursues no commercial intent. Participation by third-party funders, consortia, or research-funding bodies is foreseen and is actively explored; any such funding is publicly disclosed upon acceptance. Subsequent exploitation of individual research outputs is not excluded but is not the primary purpose of the current work. Publications, software releases, and position papers are scientifically grounded independently of economic considerations, anchored via OpenTimestamps prior to publication, and — where feasible — made openly accessible via preprint servers (arXiv) and with DOI (Zenodo). The formal legal form is documented in the imprint.

Data protection in research operations

Data minimisation as a design principle

At the current research stage, validation draws exclusively on publicly available recordings of documented incidents. Processing of personal data for training or evaluation will only take place once a research clause under Art. 89 GDPR in conjunction with § 27 BDSG is in place, alongside a documented Data Protection Impact Assessment (DPIA) under Art. 35 GDPR. Annotation schemata are designed so that no biometric features (in particular no facial, gait, or voice features) are recorded.

Controller under Art. 4(7) GDPR

Alexander Bering, sole proprietorship (DUNS 317163443). Full contact details in the legal notice.

Retention periods

Research data are retained in a traceable manner for at least ten years in accordance with the DFG guidelines on safeguarding good scientific practice. Material that does not serve scientific traceability is deleted or anonymised once the research purpose has been fulfilled.

Data subject rights

The rights to access, rectification, erasure, restriction, and data portability under Art. 15–20 GDPR are granted unless restricted under Art. 89(2) GDPR in conjunction with § 27(2) BDSG for the purposes of scientific research. Any such restrictions are documented and justified on a case-by-case basis.

Processing location and third-country transfer

Data processing takes place on servers within the European Union. Third-country transfers do not occur under the current research design. Should processing outside the EU become necessary in the future, it will only take place under standard contractual clauses pursuant to Art. 46 GDPR and following a prior impact assessment.

Ethics inquiries

Contact for research ethics and data protection

For inquiries on research ethics, data protection impact assessment, auditing, notified-body pre-assessment, or consortium projects, please get in touch at the address below. We typically respond within ten working days.

Send ethics inquiry →

More from this research

Related pages

Three tracks, one core, a shared ethics foundation.

  • Research →Three tracks: cognitive architectures, safety in public spaces, applied AI.
  • Methodology →Pre-registration, reproducibility, external validation, data minimisation — operational standards in detail.
  • Publications →arXiv, Zenodo (DOI), software releases, open-access principles.
  • Resources →Code, replication material, BibTeX citation, licences, identifiers.
  • Public sector & research →Research offerings for BMI, BSI, BBK, universities, research consortia.
  • Principal Investigator →Profile, background, identifiers, contact paths.

Newsletter

No spam. GDPR-compliant.

© 2026 Alexander Bering / ZenSation Enterprise Solutions

HomeResearchMethodologyResearch ethicsPublic sectorPublicationsResourcesZenAIOpen SourceDevelopersTechnologyAboutBlogChangelogPrivacy PolicyLegal Notice
Download on theApp Store
GitHubLinkedInarXivZenodoORCIDScholarSemantic ScholarHuggingFacenpmDiscord