As writers of poetry and fiction, how do we address current events without sounding too heavy-handed? Without losing our claims to art?
Daniel Hornsby’s short story “Metadata,” is one example of a successful crossover. Published in issue 54 of Hayden’s Ferry Review, the piece comments on global surveillance, even as it aestheticizes it.
And so, in honor of Snowden’s quest for asylum, one year ago, we’ve decided to publish Hornsby's piece again—this time online.
NSA be damned.
METADATA
by Daniel Hornsby
At
20:03.55 on 13 April, A. places a call to B. lasting a total of two minutes and
twelve seconds (00:02.12). This call is shortly followed at 20:07.02 by a
similar such call, the contents of which may not be disclosed, but can be said
to have clarified certain ambiguous aspects of the information conveyed within
the previous call. This call, the second, lasts a mere fifteen seconds, ending
at 20:07.17.
***
C.
calls D. at 20:41.19 on 26 May, but the call itself last no longer than four
(0:00.04) seconds, a duration which, given the time necessary for a phone such
as D.’s (Class P, V0000582) to receive the signal and, subsequently, ring,
makes such a response on D.’s part impossible. Minutes later, D., likely seeing
the missed call from C., again attempts to contact C., but this call, too, ends
in a matter of seconds, terminated by C.
***
On
17 June at 23:54.01, E. exchanges a series of messages with F. from a device
located at 40.18120128N, -85.38917542W, at an address associated with G. Later
that same day, from 40.18500454N, -85.37072182W, at an address associated with
F., E. exchanges a series of messages approximating the same length (some 122
bytes) as those shared with F. earlier, but in this instance directed to G. On
the following day, E., at 40.17992255N -85.37557125W, alternately messages both
F. (40.18500454N, -85.37072182W) and G. (40.18120128N,
-85.38917542W), as well as one H., located at 40.18125431 N, -85.38967843W.
***
I.
calls J. who, shortly thereafter, calls K. and, minutes later, L. The following
day, at 11:49.33, L. calls M., who, immediately following the conversation,
places a call to I, which lasts only ten minutes and twelve seconds, but is
itself quickly followed by another call from I. to J. lasting some two hours. For
several months to follow (7 July to 15 September), no such calls from I. to J.
are made.
***
N.
calls O. at 22:53.12. N. calls O. at 00:01.23. N. calls O. at 00:12.45. N.
calls O. again at 00:33.59. In this
final instance, O. answers, and the subsequent conversation lasts a mere
eighteen seconds (00:00.18). Minutes later, N. calls O. at 00:45.02 and
receives no answer. The next morning, N. receives an email from O., sent in
response to a series of previously unanswered emails sent from N. to O. in the
past week (02 March to 09 of the same month). An hour later, N. calls O. and
again receives no answer. The next day, N. calls O. only to find the number has
been blocked. A year later, N. calls O., but it is P. who answers, and N. hangs
up.
***
Q.
places a call to R., which, at 19:43.11 on 4 January, goes unanswered. S., from
the same location as Q., also places a call to R. shortly thereafter, which R.,
does, in fact, answer, and which lasts from 19:51.06 to 20:47.59. At 20:49.22,
Q. again calls R., but R. does not answer.
***
T.
places a collect call to U. at 22:15.06, 19 October, a call which U. accepts
and lasts, after repeated payments, a total of fifty-seven minutes and fourteen
seconds (00:57.14). Exactly two months later, from 40.18120128N, -85.38917542W,
T. places another collect call, which U. again excepts, though this call lasts
a mere two minutes, this time without renewal of payment by U. allowing for
continued conversation. Three months and twelve days later (21 March), T. again
places a call to U., also collect, which U. answers but, after a brief exchange
with the operator, does choose to accept.
***
V.
and W. both call X. in quick succession from the same approximate location, but
X. makes no response. Y. and Z. make similar entreaties via email, and these
too go unanswered, as do a series of text messages from A., B., and C. Days later, the University of M. library
messages X. informing him that books 838 R573O J12, 838 R573O A58ri, and 838
R573O R585 have yet to be returned and will now be considered late. Three days
later, a similar message is sent, this one informing X. that the books
previously described are now considered late. Later that day, X. receives
another message from I., as well as an anonymous email sent from a server
located at 14.102.156.0/22—all of which go unopened. That evening Z. calls, but
is quickly informed that the number he has dialed has been disconnected, please
hang up or dial your operator.
1 comment:
I absolutely love this brilliant piece.
Post a Comment