Article ID: CBB388750124

Slicing Sound: Speaker Identification and Sonic Skills at the Stasi, 1966–1989 (2021)

unapi

It is well known that the Ministry of State Security in the former German Democratic Republic was deeply involved in wiretapping and eavesdropping on both foreigners and its citizens. It is less widely known that, against this background, the Stasi developed a keen interest in technologies and techniques of speaker identification, such as the visualization of recorded sound and aural analysis. How exactly did Stasi employees analyze the sound of voices? How did listening become a legitimate way of knowing in this context? And why did speaker identification not become as powerful as the Stasi had hoped? Empirically, this essay draws on documents from the Stasi’s former archives. Theoretically, it builds on “sonic skills” in the sciences to clarify the identification practices and distinguishes between the “logic of forensics” and the “logic of surveillance” to understand why the Stasi ran ashore in its sound analysis endeavor. Finally, it aims to contribute to understanding the information paradox in the Stasi historiography and its implications for the history of science.

...More
Citation URI
data.isiscb.org/p/isis/citation/CBB388750124

This citation is part of the Isis database.

Similar Citations

Book Brian Hochman; (2022)
The Listeners: A History of Wiretapping in the United States (/p/isis/citation/CBB775086796/) unapi

Article Evan Selinger; Darrin Durant; (2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service (/p/isis/citation/CBB181826170/) unapi

Article Darren Ellis; (2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia (/p/isis/citation/CBB734944273/) unapi

Article Patrick Petit; (2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization (/p/isis/citation/CBB181724884/) unapi

Article Weiner, Amir; Rahi-Tamm, Aigi; (2013)
Getting to Know You: The Soviet Surveillance System, 1939--57 (/p/isis/citation/CBB001200564/) unapi

Article Alexander Trauth-Goik; (December 2019)
"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System (/p/isis/citation/CBB323886145/) unapi

Thesis Kim, Richard S.Y.; (2010)
Cyber-Surveillance: A Case Study in Policy and Development (/p/isis/citation/CBB001567169/) unapi

Book Ashley Sweetman; (2022)
Cyber and the City: Securing London’s Banks in the Computer Age (/p/isis/citation/CBB340774234/) unapi

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/p/isis/citation/CBB758382142/) unapi

Book Colin Koopman; (2019)
How We Became Our Data: A Genealogy of the Informational Person (/p/isis/citation/CBB981384434/) unapi

Article Dan Bouk; (2018)
The National Data Center and the Rise of the Data Double (/p/isis/citation/CBB460183522/) unapi

Book Duane C. Wilson; (2021)
Cybersecurity (/p/isis/citation/CBB201310866/) unapi

Article Silvan Pollozek; Jan-Hendrik Passoth; (2023)
Provisional by design: Frontex data infrastructures and the Europeanization of migration and border control (/p/isis/citation/CBB906319443/) unapi

Article Bruno Oliveira Martins; (2023)
Security knowledges: Circulation, control, and responsible research and innovation in EU border management (/p/isis/citation/CBB687707247/) unapi

Article Rebecca J. Hester; (2020)
Bioveillance: A Techno-security Infrastructure to Preempt the Dangers of Informationalised Biology (/p/isis/citation/CBB548068287/) unapi

Book Gilliom, John; Monahan, Torin; (2013)
SuperVision: An Introduction to the Surveillance Society (/p/isis/citation/CBB001421286/) unapi

Article Cheryl Higashida; (2022)
Citizens Band: Surveillance, Dark Sousveillance, and Social Movements (/p/isis/citation/CBB195380767/) unapi

Thesis Magnet, Shoshana Amielle; (2008)
Encoding the Body: Critically Assessing the Collection and Uses of Biometric Information (/p/isis/citation/CBB001561133/) unapi

Article Thomas Jepsen; (January 2018)
“A New Business in the World”: The Telegraph, Privacy, and the U.S. Constitution in the Nineteenth Century (/p/isis/citation/CBB159226121/) unapi

Authors & Contributors
Bouk, Daniel B.
Durant, Darrin
Gilliom, John
Jepsen, Thomas C.
Kim, Richard S. Y.
Magnet, Shoshana Amielle
Journals
Science as Culture
American Quarterly
Historical Studies in the Natural Sciences
IEEE Technology and Society Magazine
Kritika: Explorations in Russian and Eurasian History
Technology and Culture
Publishers
University of Chicago Press
New York, City University of
Cornell University Press
Harvard University Press
MIT Press
University of Illinois at Urbana-Champaign
Concepts
Surveillance
Privacy
Security technologies
Communication technology
Technology and society
Technology and government
Time Periods
21st century
20th century, late
20th century
Modern
19th century
18th century
Places
United States
Great Britain
Soviet Union
Canada
China
European Union
Institutions
United States. National Security Agency
Amazon (Firm)
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment