Stasi / Facebook / Big Data DAAD Day 13 – The Stasi’s Electronic Databases

The number of cards in the Stasi indexes grew to an incredible 39,000,000 by 1989. In order to provide constant access to this massive material data system they created various special storage units and containers as it expanded. The current mechanical powered card indexes in place at the BTsU were found after the end of the GDR and are still in use in order to meet requests of citizens who wish to view the data the Stasi kept on them.


Mechanical index card file organization system used by the Stasi.

Beginning in the 1960s, the MfS also used various electronic databases to track citizens.* These databases were never fully implemented as a primary source of storage because computing and software available in the GDR at the time, even machines stolen or purchased in the west, were unreliable. For six years the Stasi mirrored essential data from the F16 personal card into an electronic format. In 1975, Department XII, responsible for central data collection, information and storage, introduced the “System of automatic pre-selection” (SAVO) which allowed workers to verify that a person was “not yet recorded” in the system. This considerably reduced the time it took for verification, however it still required a substantial 12–21 days for a process to complete.

By 1986 SAVO 2.0 was introduced providing printing functionality, increased capacity—now containing all data from the F16 card—and reducing search times to 1–6 days. It also provided teletype connections eliminating the need for couriers and allowing multiple agencies (passport control, tourism, etc.) to use the same data source simultaneously. (The Key to Power, 6) While this greatly modernized the surveillance workflow of the Stasi, it continued to act only as a duplicate of the F16 card, which was still faster for priority inquiries, and less susceptible to errors.


A computer used by the Stasi. Source: BBC

The logic for these implementations is echoed in modern database planning and use. While redundancy is employed for backups and increasing access speed across global networks, there is still a “master” copy of all data, or in the case of distributed system, automated processes (software) that merge and maintain distributed data into a master. Like the Stasi’s decision to completely mirror portions of the F16 system, modern systems use whichever implementation is most reliable for the master, while summarizations of that data may be “pushed” to other indexes for faster retrieval.

The Stasi’s use of multiple systems, as well as the F16 and F22 card also preempt the concept of “joins”, which is a powerful feature in relational database management systems (RDBMS), to allow various pieces of data to be spread out across multiple indexes. Like the registration number on the F16/22 cards, records from multiple discrete RDBMS can be “joined” by matching a single identification field in order to supply additional, or limit access to other data, when performing queries.

Multiple other computerized database systems were developed or used by the Stasi, including SOUD, a collection of information on the “enemy” shared between the GDR, Bulgaria, Cuba, Poland, the USSR, Czechoslovakia, Hungary, and Vietnam. The most expansive of all their electronic indexes, was the central database of personal data (ZPDB). Introduced in 1981, by the end it contained records on over 1,320,000 people, 417,000 situations, 558,000 objects, and numerous related information.

The desire to track not just people, but occurrences and objects is directly visible in the largest person tracking organization today. In Facebook’s “Social Graph”, introduced in 2007, any person, place, thing, event, anything that can be named, is recorded in a massive attempt to commodify everything and our connections to it. Like the Stasi ZPDB, everything in the Facebook Social Graph is indexed by a unique identification string as single record, which Facebook considers a “node,” with links or “edges” that connect them. These definitions are based on Facebook’s desire to do data science on the their information, applying statistics and other mathematical operations from graph theory in order to understand their data and predict (and manipulate) the behavior of users.

*Regrettably, all electronic databases and their magnetic storage was destroyed not long after the end of the GDR. Meaning, BStU staff now use the original paper F16 card system to provide services to the public.

  1. The key to power: Card indexes and other finding aids practices of State Security. Archivar 64. Jahrgang Heft 04 November 2011.

Stasi / Facebook / Big Data DAAD Day 10 – Card systems of the Stasi

The early days of the Stasi were marked by the development of new systems for monitoring the population. In the 1950s, having already incorporated a post-WWII file system used for denazification, the MfS implemented three new index card types to track citizens, all of which were stored in a central card index. These cards were distinguished by color and used to track persons considered hostile to the state (form A1 which was yellow), official staff (form B1, later replaced by the blue and grey F19), and persons who were arrested (the red, form C1).

While official staff had titles and were on the payroll, the Stasi used hundreds of “unofficial staff.” These “Inoffizielle Mitarbeiter” (or IMs) were either foreign citizens who turned over valuable information like trade secrets, or domestic informants who spied on their colleagues, neighbors, and relatives (and sometimes even spouses). While money was a primary motivation, they were compelled for a number of other reasons, including blackmail, ideological commitments to the GDR, or gifts other than money, like lavish vacations, prostitutes, and official state awards. In fact, the Stasi implemented an impressive number of medals and rewards in order to convince both IMs and official staff to maintain loyalty and faithfully contribute their labor to the state. (Macrakis, loc 386) These awards are not unlike the loyalty cards, badges, and other gamification tactics that today’s corporations employ across their databases of customers in order to increase brand allegiance and sales.

Similar to modern software development, the Stasi index card systems, like many of their methods over the years, were constantly being reworked and improved with each new iteration. For example, while the previous system used separate cards to track “enemies” and “friends,” as the Stasi learned to coerce those formerly consider hostile into becoming secret informants it became necessary to track persons who evolved into “frenemies of the state.”

This situation presented a particular problem, as the Stasi needed to record and track personal data on these people, but their real identities needed to be protected should they agree to turn over valuable information. For these persons the Stasi implemented a separate “transaction card” (F22) that augmented the standard cards. The change updated the yellow card (F16, formerly A1), which contained the real name, address, birth date and place, occupational status, workplace or school, and the red card (F18, formerly C1), used for those arrested, which contained this information, as well as a mugshot, a visual description, and data related to their crime, and added a registration number if they were a Stasi informer or agent. (The Key to Power, 3–4)


The central operation card “F22” Credit: BStU

The new “transaction card” (F22) recorded Stasi informants only by this registration number, as well as a secret code name and name of the case officer who managed the agent. Finding the real name of a Stasi operative meant matching not only the registration numbers on these cards, but additional comparisons, because many agents purposely shared registration numbers to add extra layers of secrecy. (Macrakis, 78) This method is similar in theory to modern relational database lookup tables, where a user’s personally identifiable information (PII) is separated and protected from data dumps containing so-called “anonymized data” , or public key encryption, where data is transmitted securely by performing mathematical operations on it using a combination of a unique private and public key.

  1. The key to power: Card indexes and other finding aids practices of State Security. Archivar 64. Jahrgang Heft 04 November 2011.
  2. Macrakis, Kristie. Seduced by Secrets: Inside the Stasi’s Spy-Tech World (Kindle Location 1615). Cambridge University Press.
  3. Jason Koebler This Visualization of NYC’s Taxis Shows the Promise and Pitfalls of Big Data Motherboard (2014)
  4. Alex Hern New York taxi details can be extracted from anonymised data, researchers say The Guardian (2014)