Bijsterveld, Karin (Author)
It is well known that the Ministry of State Security in the former German Democratic Republic was deeply involved in wiretapping and eavesdropping on both foreigners and its citizens. It is less widely known that, against this background, the Stasi developed a keen interest in technologies and techniques of speaker identification, such as the visualization of recorded sound and aural analysis. How exactly did Stasi employees analyze the sound of voices? How did listening become a legitimate way of knowing in this context? And why did speaker identification not become as powerful as the Stasi had hoped? Empirically, this essay draws on documents from the Stasi’s former archives. Theoretically, it builds on “sonic skills” in the sciences to clarify the identification practices and distinguishes between the “logic of forensics” and the “logic of surveillance” to understand why the Stasi ran ashore in its sound analysis endeavor. Finally, it aims to contribute to understanding the information paradox in the Stasi historiography and its implications for the history of science.
...More
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/p/isis/citation/CBB775086796/)
Article
Evan Selinger;
Darrin Durant;
(2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service
(/p/isis/citation/CBB181826170/)
Article
Darren Ellis;
(2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia
(/p/isis/citation/CBB734944273/)
Article
Patrick Petit;
(2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization
(/p/isis/citation/CBB181724884/)
Article
Weiner, Amir;
Rahi-Tamm, Aigi;
(2013)
Getting to Know You: The Soviet Surveillance System, 1939--57
(/p/isis/citation/CBB001200564/)
Article
Alexander Trauth-Goik;
(December 2019)
"Constructing a Culture of Honesty and Integrity": The Evolution of China's Han-centric Surveillance System
(/p/isis/citation/CBB323886145/)
Thesis
Kim, Richard S.Y.;
(2010)
Cyber-Surveillance: A Case Study in Policy and Development
(/p/isis/citation/CBB001567169/)
Book
Ashley Sweetman;
(2022)
Cyber and the City: Securing London’s Banks in the Computer Age
(/p/isis/citation/CBB340774234/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/p/isis/citation/CBB758382142/)
Book
Colin Koopman;
(2019)
How We Became Our Data: A Genealogy of the Informational Person
(/p/isis/citation/CBB981384434/)
Article
Dan Bouk;
(2018)
The National Data Center and the Rise of the Data Double
(/p/isis/citation/CBB460183522/)
Book
Duane C. Wilson;
(2021)
Cybersecurity
(/p/isis/citation/CBB201310866/)
Article
Silvan Pollozek;
Jan-Hendrik Passoth;
(2023)
Provisional by design: Frontex data infrastructures and the Europeanization of migration and border control
(/p/isis/citation/CBB906319443/)
Article
Katrin M. Kämpf;
(2020)
Pedophilia Screening in Technosecurity Culture The Construction of Dangerous Sub-populations in the Name of Security
(/p/isis/citation/CBB009060974/)
Article
Bruno Oliveira Martins;
(2023)
Security knowledges: Circulation, control, and responsible research and innovation in EU border management
(/p/isis/citation/CBB687707247/)
Article
Rebecca J. Hester;
(2020)
Bioveillance: A Techno-security Infrastructure to Preempt the Dangers of Informationalised Biology
(/p/isis/citation/CBB548068287/)
Book
Gilliom, John;
Monahan, Torin;
(2013)
SuperVision: An Introduction to the Surveillance Society
(/p/isis/citation/CBB001421286/)
Article
Cheryl Higashida;
(2022)
Citizens Band: Surveillance, Dark Sousveillance, and Social Movements
(/p/isis/citation/CBB195380767/)
Thesis
Magnet, Shoshana Amielle;
(2008)
Encoding the Body: Critically Assessing the Collection and Uses of Biometric Information
(/p/isis/citation/CBB001561133/)
Article
Thomas Jepsen;
(January 2018)
“A New Business in the World”: The Telegraph, Privacy, and the U.S. Constitution in the Nineteenth Century
(/p/isis/citation/CBB159226121/)
Be the first to comment!