Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
For the out-of-band Slashdot experience (mostly headlines), follow us on Twitter, or Facebook. ×
Privacy Government Your Rights Online

Metadata and the Intrusive State 66 66

An anonymous reader writes with an excerpt from an intriguing article at TechDirt about the sometimes very low-tech methods of the East German Stasi. They may have been using more pencils than computers, but they were gathering information on their targets using the same kind of metadata whose significance the U.S. government has lately been downplaying: "They amassed dossiers on about one quarter of the population of the country during the Communist regime. But their spycraft — while incredibly invasive — was also technologically primitive by today's standards. While researching my book Dragnet Nation, I obtained the above hand drawn social network graph and other files from the Stasi Archive in Berlin, where German citizens can see files kept about them and media can access some files, with the names of the people who were monitored removed. The graphic shows forty-six connections, linking a target to various people (an 'aunt,' 'Operational Case Jentzsch,' presumably Bernd Jentzsch, an East German poet who defected to the West in 1976), places ('church'), and meetings ('by post, by phone, meeting in Hungary')."
This discussion has been archived. No new comments can be posted.

Metadata and the Intrusive State

Comments Filter:

You can do this in a number of ways. IBM chose to do all of them. Why do you find that funny? -- D. Taylor, Computer Science 350

Working...