Follow Slashdot stories on Twitter


Forgot your password?
DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Also, Slashdot's Facebook page has a chat bot now. Message it for stories and more. Check out the new SourceForge HTML5 Internet speed test! ×
Privacy Government Your Rights Online

Metadata and the Intrusive State 66

An anonymous reader writes with an excerpt from an intriguing article at TechDirt about the sometimes very low-tech methods of the East German Stasi. They may have been using more pencils than computers, but they were gathering information on their targets using the same kind of metadata whose significance the U.S. government has lately been downplaying: "They amassed dossiers on about one quarter of the population of the country during the Communist regime. But their spycraft — while incredibly invasive — was also technologically primitive by today's standards. While researching my book Dragnet Nation, I obtained the above hand drawn social network graph and other files from the Stasi Archive in Berlin, where German citizens can see files kept about them and media can access some files, with the names of the people who were monitored removed. The graphic shows forty-six connections, linking a target to various people (an 'aunt,' 'Operational Case Jentzsch,' presumably Bernd Jentzsch, an East German poet who defected to the West in 1976), places ('church'), and meetings ('by post, by phone, meeting in Hungary')."
This discussion has been archived. No new comments can be posted.

Metadata and the Intrusive State

Comments Filter:

The unfacts, did we have them, are too imprecisely few to warrant our certitude.