Stasi / Facebook / Big Data DAAD Day 20 – Automation in Stasi postal surveillance: Kleindampfentwickler

Department M, along with the Stasi OTS (Operativ-Technische Sektor), developed and implemented numerous technical tools, intelligence checks, and operational activities to speed their postal surveillance in the GDR. By the 1970’s, the department was already using various modified household appliances or industrial devices to assist in steaming open and closing letters. One example is this “Kleindampfentwickler”—a “small steam generator,” which appears to be a modified espresso maker or water boiler, with an added, V-shaped steam outlet.


The Kleindampfentwickler (Credit: BStU)

The materials and intentional flat and curved lines in the design of the chrome base and plastic handle suggest it was mass produced. The Stasi probably chose the kettle for the wide base and low placement of the electrical connection which serve to keep the center of gravity low and prevent tipping. They used a V-shape for this and other steam outlets to match the angled shape of envelope flaps. This one is designed to loosen the glue on a single envelope, while other steam outlets could accommodate more.

The crude construction of the modified steam outlet sharply contrasts with the retail-ready kettle. The choice of soldered copper for the material of the pipe leading upwards and steam outlet were probably based on what was available, water resistant, and easy to work with. Copper is used for speciality roofs and gutters, with the seams joined together using heat and solder. The joinery on the Stasi’s addition is not pretty, making it stand out against the base, but it exemplifies the experimental methodologies of the engineers who worked behind closed doors, as well as the belief the aesthetics or secrecy of their work would never be scrutinized.


The Kleindampfentwickler Operational Carrying Case (Credit: BStU)

Stasi / Facebook / Big Data DAAD Day 19 – Automation in Stasi postal surveillance: The PiD Trap

In the beginning of the 1970s most of the work of Department M was performed by hand. This labor included sorting and selecting suspicious mail, manually steaming it open, examining the contents, transcribing, copying or photographing the interior or exterior of the letter, in some cases, examining the letter for conspiratorial or stealth writing, resealing the envelope, and placing the letter back into circulation at Deutsche Post. As the secret operations heightened the suspicions during the Cold War, and with the postal service increasingly relied upon for cross-border communications thanks to the Berlin Wall preventing face to face meetings, Department M received more pressure to increase their efficiency through mechanical means.

One such machine used by the Stasi was referred to as the “PiD Trap.” This electronic device automatically scanned and screened regular letters from printed materials like newspaper excerpts, church letters, and advertisements. Like the organizational systems the Stasi employed, this apparatus made it possible to divide and focus the labor of their workers and expedited the sorting and determination of suspicious mail and “negative” or “hostile” influences from the west in the form of Politisch-ideologische Diversion (PiD). (Labrenz-Weiß, 28)

  1. Hanna Labrenz-Weiß, Abteilung M (MfS Handbuch). Hg. BStU. Berlin 2005.

Stasi / Facebook / Big Data DAAD Day 17 – Stasi networks and Facebook Social Graph

Similar to how Facebook uses a user’s connections to determine information about them, the Stasi considered all information they could gather about a person in their intelligence campaigns. They incorporated not only the contents of a target’s mail, but information about professional and personal relationships, love affairs, and organizations to which they belonged. (Reinicke, 106)


Source: ProPublica/BStU

This attention to not only the contents of a person’s postal communications, but their social connections can be evidenced in this hand-made graphic discovered at the BStU by Julia Angwin. The graphic shows forty-six connections, linking a targeted citizen to other potentially interesting persons (e.g. an aunt), places (e.g. “church”), and meetings (e.g. post, phone). Through whichever means necessary the Stasi made and utilized these connections in order to gain additional insights and institute methods of control.


Visual explanation of Facebook Social Graph. Source: Business Insider

This image reinforces the notion that the Stasi’s work was mostly a manual, often experimental, labor. It also tells us their work in surveillance and control, which is seen as a miserable, tyrannical sort, is now standard business practice among the software-automated surveillance capitalist models of the internet used by Facebook, Google, and others. Just as Department M workers like Gerd Reinicke mined the post for intelligence and PiD, the same basic processes the Stasi developed, now used as software by Facebook, are also at work in China, Iran, and other countries to filter and control what people can say and read through elaborate censorship software systems.

  1. Hanna Labrenz-Weiß. Abteilung M (MfS Handbuch). Hg. BStU. Berlin 2005.
  2. Reinicke, Gerd. “Mitlesen für den Klassenkampf: Postkontrolle der Stasi”. In: Heimliche Leser in der DDR: Kontrolle und Verbreitung unerlaubter Literatur (ed. Siegfried Lokatis). Berlin, 2008.
  3. Angwin, J. (2017). You Know Who Else Collected Metadata ? The Stasi. ProPublica, 6–8.

Stasi / Facebook / Big Data DAAD Day 16 – Notes from a former Department M surveillance operator (part2)

During the seven years Gerd Reinicke worked for Department M the scope of surveillance grew steadily. This is particularly evident in the 1980s, when as the government became more and more concerned of the “class struggle,” they dramatically increased the number of operators in Department M, more than doubling the size from 1980 to 1989.


Stasi Dept. M – Total employees (data from Abteilung M (MfS Handbuch). Hg. BStU. Berlin 2005.)

Reinicke and his coworkers in the “Evaluation and Information” unit constantly tried to increase the “Trefferquote” or “hit rate” of material worthy of confiscation by memorizing large numbers of postal codes, names, and handwriting. Their shift managers carefully sampled the work of individual employees, checking for missed letters, which could result in punishment and disciplinary measures.

Once a citizen or group had been classified as “operationally interesting” then all their mail was withheld for inspection. Citizens of the GDR who sent private messages critical of the government or its leaders through the mail first, had their mail confiscated, and second could be brought to court on charges of “anti-state agitation” according to Section 106 of the Criminal Code of the GDR. (Reinicke, 105)

  1. Reinicke, Gerd. “Mitlesen für den Klassenkampf: Postkontrolle der Stasi”. In: Heimliche Leser in der DDR: Kontrolle und Verbreitung unerlaubter Literatur (ed. Siegfried Lokatis). Berlin, 2008.

Stasi / Facebook / Big Data DAAD Day 15 – Notes from a former Department M surveillance operator

In the essay, “Eavesdropping for the class struggle: Postal control of the Stasi,” from the book, “Secret readers in the GDR: Control and distribution of illicit literature” (ed. Siegfried Lokatis), Gerd Reinicke describes his work in the “evaluation and information” section of the Stasi’s Department M. He explains his job was to assess and classify the contents of mailings, personal letters and printed materials, and in extreme cases, make decisions about confiscation.

This work was not easy. The stream of mail was constant and so he had a limited time frame for his work. He operated in secret, but also had to consider the public perception of his decisions. While technically illegal, the government watched all mail moving within the country, as well as that leaving or arriving in the GDR. As far as the population was concerned it was an “open secret,” because they observed the effect of the government’s policy of opening mail to remove valuable items, as well any writing or media considered to be “Politisch-ideologische Diversion (PiD)” (English: “Political-ideological Diversion”)—a task which was not as clear as it might seem.

Upon his hire was told to collect information on people and facts that might be “operatively interesting” to intelligence services. But he also received instructions to remove “anything unnecessary.” This work reflects the dual role that Department M played for the SED as a surveillance and control mechanism. On one hand, they watched for communications between spies or dissidents, but they were often a censorship apparatus.

This flowchart shows the three basic categories by which mail was classified, and subclassified, specifically, as “messages suspicious of being intelligence communications,” “messages suspicious of being PiD,” and “messages determined to be ‘interesting content’.” The assignment into of any of these categories determined further routing into the Department M machinery.


Heimliche Leser in der DDR: Kontrolle und Verbreitung unerlaubter Literatur (ed. Siegfried Lokatis)

These broad definitions also underline the ambiguity in how their surveillance and censorship was officially applied. For example, in dealing with Western and dissident literature, these instructions were followed in different ways. Sometimes operators were generous in their interpretation of “class struggle appropriate” materials, while other times he characterizes their subjective interpretation as “petty.”

  • Hanna Labrenz-Weiß. Abteilung M (MfS Handbuch). Hg. BStU. Berlin 2005.
  • Reinicke, Gerd. “Mitlesen für den Klassenkampf: Postkontrolle der Stasi”. In: Heimliche Leser in der DDR: Kontrolle und Verbreitung unerlaubter Literatur (ed. Siegfried Lokatis). Berlin, 2008.
  • Stasi / Facebook / Big Data DAAD Day 14 – Department M OibE groups

    Thanks to the implementation of index cards across the MfS, Department M had access to sender and receiver addresses, contacts, relatives, etc. to inform their surveillance work. By 1970, the department had instituted the following operational steps for examining mail. Numbers 3–6 were considered highly secretive and operations were performed under the codename “Eagle Flight”.

    1. Check if the sender or recipient existed in the police card index
    2. Establish an “Operational Comparison Card” to record information found in the mailing
    3. In the case of a suspicious mailing, carry out a search of the mail box
    4. Create photographic documentation of letterheads
    5. Compare the handwriting or typewriting font, spelling, etc. of the letter head. Identify any stealth writing.
    6. Form a special “OibE” group to check mail boxes.

    Offizieren im besonderen Einsatz (OibE) (English: Officers in Special Operations) groups were formed specifically to monitor, and in some cases, empty mailboxes under the cover of the Deutsche Post uniforms and vehicles. They photographed persons of interest as they dropped mail off, and then opened the mail boxes and examined the contents of letters before they even reached the post office. Photographic records of their work exist, and were presented in the exhibition, “Ein offenes Geheimnis. Post- und Telefonkontrolle in der DDR” (English: “An open secret. Postal and telephone control in the GDR”) (Labrenz-Weiß, 22–24)


    Source: BStU

    1. Hanna Labrenz-Weiß, Abteilung M (MfS Handbuch). Hg. BStU. Berlin 2005.

    Stasi / Facebook / Big Data DAAD Day 13 – The Stasi’s Electronic Databases

    The number of cards in the Stasi indexes grew to an incredible 39,000,000 by 1989. In order to provide constant access to this massive material data system they created various special storage units and containers as it expanded. The current mechanical powered card indexes in place at the BTsU were found after the end of the GDR and are still in use in order to meet requests of citizens who wish to view the data the Stasi kept on them.


    Mechanical index card file organization system used by the Stasi.

    Beginning in the 1960s, the MfS also used various electronic databases to track citizens.* These databases were never fully implemented as a primary source of storage because computing and software available in the GDR at the time, even machines stolen or purchased in the west, were unreliable. For six years the Stasi mirrored essential data from the F16 personal card into an electronic format. In 1975, Department XII, responsible for central data collection, information and storage, introduced the “System of automatic pre-selection” (SAVO) which allowed workers to verify that a person was “not yet recorded” in the system. This considerably reduced the time it took for verification, however it still required a substantial 12–21 days for a process to complete.

    By 1986 SAVO 2.0 was introduced providing printing functionality, increased capacity—now containing all data from the F16 card—and reducing search times to 1–6 days. It also provided teletype connections eliminating the need for couriers and allowing multiple agencies (passport control, tourism, etc.) to use the same data source simultaneously. (The Key to Power, 6) While this greatly modernized the surveillance workflow of the Stasi, it continued to act only as a duplicate of the F16 card, which was still faster for priority inquiries, and less susceptible to errors.


    A computer used by the Stasi. Source: BBC

    The logic for these implementations is echoed in modern database planning and use. While redundancy is employed for backups and increasing access speed across global networks, there is still a “master” copy of all data, or in the case of distributed system, automated processes (software) that merge and maintain distributed data into a master. Like the Stasi’s decision to completely mirror portions of the F16 system, modern systems use whichever implementation is most reliable for the master, while summarizations of that data may be “pushed” to other indexes for faster retrieval.

    The Stasi’s use of multiple systems, as well as the F16 and F22 card also preempt the concept of “joins”, which is a powerful feature in relational database management systems (RDBMS), to allow various pieces of data to be spread out across multiple indexes. Like the registration number on the F16/22 cards, records from multiple discrete RDBMS can be “joined” by matching a single identification field in order to supply additional, or limit access to other data, when performing queries.

    Multiple other computerized database systems were developed or used by the Stasi, including SOUD, a collection of information on the “enemy” shared between the GDR, Bulgaria, Cuba, Poland, the USSR, Czechoslovakia, Hungary, and Vietnam. The most expansive of all their electronic indexes, was the central database of personal data (ZPDB). Introduced in 1981, by the end it contained records on over 1,320,000 people, 417,000 situations, 558,000 objects, and numerous related information.

    The desire to track not just people, but occurrences and objects is directly visible in the largest person tracking organization today. In Facebook’s “Social Graph”, introduced in 2007, any person, place, thing, event, anything that can be named, is recorded in a massive attempt to commodify everything and our connections to it. Like the Stasi ZPDB, everything in the Facebook Social Graph is indexed by a unique identification string as single record, which Facebook considers a “node,” with links or “edges” that connect them. These definitions are based on Facebook’s desire to do data science on the their information, applying statistics and other mathematical operations from graph theory in order to understand their data and predict (and manipulate) the behavior of users.

    *Regrettably, all electronic databases and their magnetic storage was destroyed not long after the end of the GDR. Meaning, BStU staff now use the original paper F16 card system to provide services to the public.

    1. The key to power: Card indexes and other finding aids practices of State Security. Archivar 64. Jahrgang Heft 04 November 2011.

    Stasi / Facebook / Big Data DAAD Day 12 – The VSH card system

    The VSH index card system was yet another data storage method developed by the Stasi for monitoring and controlling the population. Introduced in 1974, the system used a red F401 card for all “secretly policed” persons, and a corresponding white F402 information card once that person was captured and began informing for the MfS. The system contained information not included on the Kerbloch index, for example, specifics deemed to be “operationally significant” like that person’s activity in the MfS, and ensured the flow of information on persons of interest across operational departments, districts, and facility services. The VSH files enormously expanded the number of persons surveilled, and were the most important cards used by operational service units until the end of the MfS. (The Key to Power, 6)


    Front of the pre-compaction, search and map card. Source: BStU


    Back of the pre-compression, search and map card. Source: BStU

    The VSH cards were divided into 15 categories ( PK ):

    • PK 1: Staff and agents of the enemy intelligence services
    • PK 2: Senior staff of the centers of political and ideological diversion
    • PK 3: Members of terrorist organizations and individual terrorists
    • PK 4: Members of Zionist hostile immigrant, clerical and other organizations
    • PK 5: persons who carried out orders from hostile intelligence agencies, centers of the political-ideological diversion, Zionistically hostile immigrant, clerical and other organizations against the states of the socialist community
    • PK 6: People unmasked as enemies of the opponent
    • PK 7: people who had not offered the information that was real
    • PK 8: persons who carried out provocative actions on the territories of the states of the socialist community as well as against their representatives and citizens
    • PK 9: Persons who were expelled from the states of the socialist community
    • PK 10: People who had committed particularly dangerous crimes
    • PK 11 diplomats and employees of diplomatic and consular missions of NATO , Japan and the People’s Republic of China
    • PK 12: correspondent of NATO -Mitgliedsländer, Japan and the People’s Republic of China
    • PK 13: Employees of trade and economic representatives
    • PK 14: Members of organizations that have been engaged in international smuggling on a large scale
    • PK 15: Persons whose activities were directed at a damage to the economy of the states of the socialist community
    1. The key to power: Card indexes and other finding aids practices of State Security. Archivar 64. Jahrgang Heft 04 November 2011.
    2. BStU: ( VSH ) of the Central Evaluation and Information Group ( ZAIG )
    3. BStU: Pre-compacting, search and identification card ( VSH ) of Division 1

    Stasi / Facebook / Big Data DAAD Day 11 – Kerblochkarten


    A Stasi Kerbloch card

    The Stasi used several other card systems to assist their postal surveillance. The Kerblochkarten (English: Kerbloch cards) system allowed storage of data encoded as a series of hand-made notches. Like other punch card systems, groups of cards could then be automatically processed by a machine based on the presence of notches and a predefined key. The Kerbloch card system made it possible to perform statistical evaluations and targeted searches on up to 350 cards/persons at a time. Importantly, this card amended the functionality of the the F16 cards and allowed the Stasi to quickly search for potential informants by querying characteristics relevant to a particular job. While anyone who has used a computer spreadsheet software today would take this sorting and searching functionality for granted, this was a highly useful tool for the Stasi, which by 1989 had amassed over 39 million index cards. (The Key to Power, 5)

    1. The key to power: Card indexes and other finding aids practices of State Security. Archivar 64. Jahrgang Heft 04 November 2011.
    2. BStU: Kerblochkarten (KK)
    -->