Follow Slashdot stories on Twitter


Forgot your password?

Slashdot videos: Now with more Slashdot!

  • View

  • Discuss

  • Share

We've improved Slashdot's video section; now you can view our video interviews, product close-ups and site visits with all the usual Slashdot options to comment, share, etc. No more walled garden! It's a work in progress -- we hope you'll check it out (Learn more about the recent updates).

Privacy Government Your Rights Online

Metadata and the Intrusive State 66

Posted by timothy
from the zum-beispiel dept.
An anonymous reader writes with an excerpt from an intriguing article at TechDirt about the sometimes very low-tech methods of the East German Stasi. They may have been using more pencils than computers, but they were gathering information on their targets using the same kind of metadata whose significance the U.S. government has lately been downplaying: "They amassed dossiers on about one quarter of the population of the country during the Communist regime. But their spycraft — while incredibly invasive — was also technologically primitive by today's standards. While researching my book Dragnet Nation, I obtained the above hand drawn social network graph and other files from the Stasi Archive in Berlin, where German citizens can see files kept about them and media can access some files, with the names of the people who were monitored removed. The graphic shows forty-six connections, linking a target to various people (an 'aunt,' 'Operational Case Jentzsch,' presumably Bernd Jentzsch, an East German poet who defected to the West in 1976), places ('church'), and meetings ('by post, by phone, meeting in Hungary')."
This discussion has been archived. No new comments can be posted.

Metadata and the Intrusive State

Comments Filter:

"Pull the trigger and you're garbage." -- Lady Blue