Exercises: Surveillance: From Panopticon to Platform
These exercises progress from concept checks to challenging applications. Estimated completion time: 3-4 hours.
Difficulty Guide: - ⭐ Foundational (5-10 min each) - ⭐⭐ Intermediate (10-20 min each) - ⭐⭐⭐ Challenging (20-40 min each) - ⭐⭐⭐⭐ Advanced/Research (40+ min each)
Part A: Conceptual Understanding ⭐
Test your grasp of core concepts from Chapter 8.
A.1. Section 8.1 introduces Bentham's panopticon as a physical architecture. In your own words, explain how the panopticon achieves control through design rather than through continuous observation. Why did Bentham consider this feature an advantage?
A.2. Foucault argued that the panopticon's real power lies not in surveillance itself but in the internalization of surveillance — the prisoner who behaves as if watched even when no guard is present. Using Section 8.2, explain what Foucault meant by "disciplinary power" and how it differs from sovereign power (the power to punish directly). Provide a contemporary example not mentioned in the chapter.
A.3. Section 8.3 traces the expansion of CCTV in the United Kingdom from the early 1990s onward. Identify three claims that proponents made about CCTV's effectiveness and summarize the empirical evidence the chapter presents regarding each claim. What pattern emerges from this evidence?
A.4. Define "dataveillance" as introduced in Section 8.5 and explain how it differs from traditional surveillance. Why does Clarke (1988) argue that dataveillance is qualitatively, not just quantitatively, different from watching someone through a camera?
A.5. Section 8.7 describes the convergence of surveillance capitalism and the surveillance state. In two to three sentences, explain what this convergence means. Why does the chapter argue that the public/private distinction in surveillance has become "functionally meaningless" in certain contexts?
A.6. The chapter introduces the concept of the "chilling effect." Define this term and explain how it applies to surveillance. Why is the chilling effect difficult to measure empirically, and why does that difficulty matter for policy debates about surveillance?
A.7. Section 8.8 discusses tools of resistance, including encryption and anonymity networks. Explain the distinction between encryption (protecting content) and metadata protection (protecting the fact that communication occurred). Why does the chapter argue that both are necessary but neither is sufficient?
Part B: Applied Analysis ⭐⭐
Analyze scenarios, arguments, and real-world situations using concepts from Chapter 8.
B.1. Consider the following scenario:
A shopping mall installs a network of security cameras with facial recognition capability. The mall's stated purpose is "customer safety and loss prevention." However, the system also tracks individual shoppers as they move between stores, measures how long they linger at window displays, and generates demographic profiles (estimated age, gender, and mood based on facial analysis). This data is shared with tenant retailers to optimize store placement and advertising.
Using the frameworks from Sections 8.5 and 8.6, analyze this scenario. At what point, if any, does loss prevention become dataveillance? Identify the power asymmetry and the consent mechanisms (or lack thereof) at work.
B.2. Eli describes Project Green Light in his Detroit neighborhood (Section 8.6.2): cameras mounted at gas stations, convenience stores, and recreational centers, with live feeds accessible to police in real time. A supporter argues: "If you're not doing anything wrong, you have nothing to worry about. These cameras keep the community safe." Using Section 8.2 (Foucault) and Section 8.7 (chilling effects), construct a response to this argument that addresses at least three specific concerns.
B.3. Section 8.4 discusses the NSA's mass surveillance programs revealed by Edward Snowden. The "collect it all" philosophy meant capturing communications data from millions of non-suspects. Apply the proportionality test introduced in Section 8.4.3 to the following argument:
"Mass surveillance prevents terrorism. Even if 99.9% of the data collected involves innocent people, the 0.1% that catches a genuine threat makes it worth it. The benefit — preventing catastrophic attacks — justifies the cost."
Evaluate this argument by considering: (a) the empirical evidence on whether mass surveillance has prevented attacks, (b) the nature of the "cost" to the 99.9%, and (c) whether alternative, less invasive approaches could achieve the same benefit.
B.4. Mira discovers that VitraMed's patient monitoring platform alerts physicians when wearable-device data suggests a patient is not adhering to prescribed exercise or medication schedules (Section 8.6.1). The system is designed to improve health outcomes.
Analyze this system using two different surveillance frameworks: (a) Foucault's disciplinary power, and (b) Zuboff's surveillance capitalism. What does each framework illuminate that the other misses? Is VitraMed's system "surveillance" even though its purpose is beneficent?
B.5. Section 8.3 notes that the UK installed over 6 million CCTV cameras, making it one of the most surveilled nations on Earth. A 2005 study by the Home Office found that CCTV reduced crime in car parks by 51% but had no statistically significant effect on crime in city centers. Explain why the same technology might succeed in one setting and fail in another. What does this tell us about the relationship between surveillance infrastructure and its stated goals?
B.6. The chapter describes how social media platforms function as surveillance architectures that users voluntarily populate with personal data (Section 8.5.2). Compare this dynamic to Bentham's panopticon. In what ways is social media surveillance more effective than the panopticon? In what ways is it less effective or fundamentally different?
Part C: Real-World Application Challenges ⭐⭐-⭐⭐⭐
These exercises ask you to investigate your own data environment.
C.1. ⭐⭐ Surveillance Walk. Take a 15-20 minute walk through a public area near your home or campus (a downtown area, a transit station, a shopping district). Document every surveillance device or system you observe: CCTV cameras, traffic cameras, automatic license plate readers, electronic billboard ads that may contain sensors, public WiFi networks, and any signs disclosing surveillance. Present your findings as an annotated map or table. Write a reflection: Were there more or fewer cameras than you expected? Were any of them disclosed to the public?
C.2. ⭐⭐ Platform Surveillance Audit. Choose one social media platform you use regularly. Access your data download or privacy dashboard (most major platforms offer this). Examine the categories of data collected about you. Write a one-page analysis addressing: (a) What data did you expect to find? (b) What surprised you? (c) What inferences about your behavior, preferences, or identity could be drawn from this data? (d) How does this data collection compare to the dataveillance described in Section 8.5?
C.3. ⭐⭐⭐ Encryption in Practice. Install and use an end-to-end encrypted messaging application (such as Signal) for one week. Compare the user experience to a non-encrypted platform. Write a brief report covering: (a) what metadata is still visible to the service provider even with end-to-end encryption, (b) how the user experience differs (if at all), and (c) why, given the availability of such tools, most people still use unencrypted platforms. Connect your findings to the chapter's discussion of resistance tools in Section 8.8.
C.4. ⭐⭐⭐ Local Surveillance Policy Analysis. Research your city or town's surveillance infrastructure. Does your municipality use police body cameras? Automated license plate readers? Facial recognition? ShotSpotter or acoustic gunshot detection? Find the relevant municipal policies or ordinances governing these systems. Write a two-page analysis evaluating: (a) what technologies are deployed, (b) what oversight mechanisms exist, (c) whether the public had input into deployment decisions, and (d) how the situation compares to Eli's experience in Detroit (Section 8.6.2).
Part D: Synthesis & Critical Thinking ⭐⭐⭐
These questions require you to integrate multiple concepts from Chapter 8 and think beyond the material presented.
D.1. The chapter presents a tension between two framings of surveillance: (1) surveillance as a tool of safety and order (the perspective of many law enforcement officials and national security agencies), and (2) surveillance as a mechanism of social control that disproportionately affects marginalized communities (the perspective of Foucault, civil liberties advocates, and communities like Eli's neighborhood in Detroit).
Write a 400-500 word essay that does not simply "pick a side" but instead proposes a framework for determining when surveillance is justified and when it is not. Your framework should include at least three criteria, and you should test it against two examples from the chapter — one where you believe surveillance is justified and one where you believe it is not.
D.2. Section 8.7 argues that the distinction between surveillance capitalism (corporate data extraction) and the surveillance state (government monitoring) is collapsing. Consider the following data flows:
- A tech company collects location data from a weather app
- The company sells that data to a data broker
- A law enforcement agency purchases the data from the broker
- The agency uses the data to track individuals without obtaining a warrant
At no point in this chain did the government conduct "surveillance" in the traditional legal sense — it purchased commercially available data. Yet the result is functionally equivalent to warrantless surveillance.
Analyze this scenario through the frameworks of Chapters 7 and 8. At which point(s) does the chain become ethically problematic? Is the problem with any single actor, or with the system as a whole? What governance mechanisms could break this chain?
D.3. Foucault wrote that the panopticon produces "a state of conscious and permanent visibility that assures the automatic functioning of power." Social media platforms, by contrast, often produce a state of voluntary and enthusiastic visibility — people post selfies, share locations, and document their lives without coercion.
Is voluntary self-exposure a form of surveillance? Can a person surveil themselves? Write a 300-400 word analysis that engages with both Foucault's concept of disciplinary power and Zuboff's concept of behavioral surplus. Consider whether the voluntariness of social media participation makes it categorically different from panoptic surveillance, or whether the structural outcomes are similar despite the different psychological mechanisms.
D.4. Dr. Adeyemi asks the class: "If surveillance disproportionately falls on communities of color, low-income neighborhoods, and immigrant populations, is it possible for any surveillance system to be 'neutral' — regardless of its technical design?" Drawing on Sections 8.3, 8.6, and 8.7, construct a response that addresses both the technical and social dimensions of this question. Reference at least one specific example from the chapter.
Part E: Research & Extension ⭐⭐⭐⭐
These are open-ended projects for students seeking deeper engagement. Each requires independent research beyond the textbook.
E.1. The Snowden Archive, Ten Years On. Edward Snowden's 2013 revelations are discussed in Section 8.4. Conduct independent research on the legislative and policy changes that followed the Snowden disclosures in the United States and at least one other country (the United Kingdom, Germany, or Brazil are good options). Write a 1,000-word report assessing: (a) what reforms were enacted, (b) how effective they have been, (c) what surveillance practices continue despite the reforms, and (d) whether the current situation is better, worse, or largely unchanged compared to 2013. Use at least four sources beyond this textbook.
E.2. Facial Recognition and Racial Bias. Section 8.6 discusses facial recognition technology and its deployment in law enforcement. Research the technical accuracy disparities documented by NIST (National Institute of Standards and Technology) and by Joy Buolamwini and Timnit Gebru's "Gender Shades" study. Write a 1,000-word report covering: (a) how accuracy rates differ across demographic groups, (b) what causes these disparities (training data, algorithmic design, or both), (c) the real-world consequences of these disparities (drawing on at least one case of wrongful identification), and (d) whether technical improvements alone can solve the problem or whether governance interventions are also necessary.
E.3. Surveillance and Resistance: A Case Study. Choose one historical or contemporary resistance movement that operated under surveillance conditions (options include the civil rights movement in the United States, pro-democracy movements in Hong Kong, feminist activism in Iran, or indigenous land defense movements). Research how surveillance was used against the movement and how the movement adapted. Write a 1,200-word analysis covering: (a) the surveillance infrastructure deployed, (b) the effects on movement participants (chilling effects, arrests, infiltration), (c) counter-surveillance strategies adopted, and (d) lessons for understanding the relationship between surveillance and democratic participation.
Solutions
Selected solutions are available in appendices/answers-to-selected.md.