Appendix C: Guide to Reading the Primary Sources


Why Primary Sources Matter

Surveillance studies is a field with a rich intellectual tradition, but that tradition is frequently summarized, simplified, and distorted as it circulates in textbooks, journalism, and policy debate. "Foucault says that all power is surveillance." "Zuboff says technology companies are evil." "Bentham designed the perfect prison." None of these characterizations is accurate, and none is useful for serious analysis.

Primary sources are irreplaceable for three reasons. First, they contain the argument — the full chain of reasoning that makes a conclusion persuasive or questionable — not just the conclusion. Understanding why Foucault claims what he claims is necessary to evaluate whether he is right and to apply his insights carefully to new cases. Second, primary sources are richer than summaries. Foucault's analysis of the plague-town, Browne's reading of lantern laws, and Zuboff's reconstruction of Google's early advertising experiments all contain analytical details that get stripped out of summaries but that do significant intellectual work. Third, reading primary sources enables independent judgment — you will know whether the textbook (including this one) has characterized the source accurately, and you will be equipped to bring the source to bear on questions the textbook did not anticipate.

This appendix guides you through six essential primary sources in surveillance studies. Each section provides: historical and intellectual context; guidance on what to look for; advice on Foucault's distinctive (and challenging) writing style; and discussion questions.


Source 1: Jeremy Bentham, Panopticon; or, The Inspection-House (1791)

Context

Jeremy Bentham (1748–1832) was a British philosopher, legal reformer, and the founder of utilitarian philosophy. The Panopticon was not primarily a philosophical work but a practical proposal: Bentham wanted to build it. He had seen a similar design in a factory managed by his brother Samuel in Russia, and he spent years lobbying the British government to fund the construction of a panoptic inspection-house for use as a prison.

The 1791 text consists of a series of letters Bentham wrote describing the design and its applications. It is shorter than most students expect — the core description of the design can be read in an afternoon. Bentham extended the design in subsequent writings to apply to workhouses, factories, madhouses, hospitals, and schools.

Bentham's utilitarianism holds that the goal of governance is to maximize the aggregate happiness of the population. He believed the panopticon served this goal by enabling more efficient punishment (fewer prisoners, better behaved) at lower cost. His proposal included a provision that he himself would manage the panopticon as a private contractor.

What to Look For

The architectural description: Bentham is remarkably precise about the physical design. The inspection lodge at the center, the annular arrangement of cells, the venetian blind arrangement that prevents the inspector from being seen — these details matter because they show how the power effect Foucault analyzes is achieved through specific physical arrangements.

The "apparent omnipresence" mechanism: Bentham explicitly states that the power of the panopticon does not require continuous inspection. He writes that the inspector "need not be actually present" — what matters is that the prisoner believes he might be watched at any moment. This is the mechanism that Foucault will later analyze as the essence of modern disciplinary power.

The range of applications: Bentham proposes applying the panoptic design to penitentiaries, prisons, houses of industry, workhouses, poor-houses, manufactories, mad-houses, lazarettos, hospitals, and schools. This broad application is significant: Bentham himself saw the panopticon as a general administrative technology, not merely a prison design.

The economic dimension: Bentham proposed managing the panopticon as a private contractor, with financial incentives tied to prisoner productivity. This economic logic — surveillance enabling efficiency extraction — is relevant to contemporary algorithmic management analysis.

Key Passages

Letter I, the description of the design: "The building is circular. The apartments of the prisoners occupy the circumference." Pay attention to the precise description of sightlines and the impossibility of prisoners communicating or knowing when they are watched.

Letter VIII, on apparent omnipresence: "Allow me to construct a house of inspection upon this plan, and I will undertake to be the gaoler myself; and I will admit into the establishment as many visitors as you please." This passage is important because it shows Bentham's confidence that surveillance capability changes the social dynamic fundamentally.

Foucault's Use of Bentham

Foucault reads Bentham's panopticon not as architectural history but as a diagram of modern power. Compare Bentham's concrete proposal to Foucault's abstract analysis: What does Foucault add? What does he strip away from Bentham's account? Bentham believed surveillance serves utilitarian goals; Foucault is skeptical of any simple account of surveillance as benevolent.

Discussion Questions for Bentham

  1. Bentham believed the panopticon would reform prisoners by making them feel constantly observed. Does this claim hold? What assumptions about human psychology does it rest on?
  2. Bentham applied the panopticon design to factories and workhouses, not just prisons. How does this application change your assessment of the design?
  3. Bentham proposed himself as the private manager of a government panopticon. What does this tell us about the relationship between surveillance and private economic interest in his design?

Source 2: Michel Foucault, Discipline and Punish, Part III: "Discipline" (1975)

Context

Michel Foucault (1926–1984) was a French philosopher and historian whose work examined the relationship between knowledge, power, and the formation of human subjects. Discipline and Punish (Surveiller et punir, 1975) was written during a period when Foucault was involved in prison reform activism in France.

The book is structured in four parts. Part I ("Torture") analyzes the pre-modern punishment of public execution as a performance of sovereign power. Part II ("Punishment") traces the reform of punishment in the late eighteenth century. Part III ("Discipline") is the core of the book for surveillance studies: it develops the analysis of disciplinary power through the panopticon. Part IV ("Prison") traces the persistence of the prison as a disciplinary institution.

Foucault's Style: What You're Getting Into

Foucault writes dense, allusive prose that can be frustrating at first but richly rewards close reading. Several features of his style deserve preparation.

He argues through juxtaposition: Foucault rarely states his argument directly. Instead, he places documents and descriptions in sequence and allows their juxtaposition to make the argument. A 17th-century military manual appears next to a contemporary school regulation; the reader is meant to see the structural similarities themselves.

He historicizes things that seem natural: Foucault's characteristic move is to show that things that seem natural and necessary — the criminal justice system, the hospital, the normal/abnormal distinction — are historically contingent, the products of specific power struggles. This can feel like it leaves nowhere to stand, but Foucault believes showing something is contingent is the first step toward changing it.

He distinguishes "power" from domination: Foucault is not saying that surveillance is simply a weapon of one class or group against another. His analysis of power is more diffuse and complex than this. Power produces knowledge; knowledge enables power; neither is prior to the other. This makes his framework different from simple conspiracy theories about surveillance.

He is interested in effects, not intentions: Foucault does not ask whether individual prison administrators wanted to reform or to punish prisoners. He is interested in the structural effects of disciplinary institutions, regardless of the intentions of their designers or operators.

Key Chapters in Part III

"The Means of Correct Training" (Chapter 2 of Part III): This chapter introduces the three instruments of disciplinary power: hierarchical observation (watching), normalizing judgment (comparing to a norm), and the examination (the combination of both that produces subjects who can be measured, compared, and certified). These concepts are essential for analyzing contemporary surveillance: HR performance reviews, social media reputation scores, credit scoring, and academic grades all exemplify these mechanisms.

"Panopticism" (Chapter 3 of Part III): Foucault begins with the plague-town — the sealed, surveilled, ordered city responding to epidemic disease — as an example of disciplinary apparatus. He then analyzes Bentham's panopticon as the architectural form of the plague-town's power. The key argument: the panopticon "automatizes and disindividualizes power." The gaze "induces in the inmate a state of conscious and permanent visibility that assures the automatic functioning of power." The subject becomes their own guard. Foucault then generalizes: the panopticon is not just a building; it is a diagram of modern power that has been deployed throughout social institutions.

Sample Annotation: Panopticism Passage

Original passage (Sheridan translation): "Hence the major effect of the Panopticon: to induce in the inmate a state of conscious and permanent visibility that assures the automatic functioning of power. So to arrange things that the surveillance is permanent in its effects, even if it is discontinuous in its action; that the perfection of power should tend to render its actual exercise unnecessary; that this architectural apparatus should be a machine for creating and sustaining a power relation independent of the person who exercises it; in short, that the inmates should be caught up in a power situation of which they are themselves the bearers."

Annotation: This is the crucial passage — Foucault's key claim about how disciplinary power works. Notice four claims: 1. The effect is permanent even when the exercise is discontinuous: the subject behaves as if watched regardless of whether they are actually being watched. 2. The perfection of power renders its exercise unnecessary: the most efficient surveillance is the one that doesn't need to operate because subjects have internalized the possibility of observation. 3. The apparatus creates power independent of the person who exercises it: this is the "architectural" quality — the power doesn't reside in an individual watcher but in the structure itself. 4. The inmates are the bearers of their own subjection: subjects become their own surveyors, which is simultaneously more efficient and more disturbing than external coercion.

Application: How do platform community standards work? How does a user "internalize" content moderation norms? How does a worker in an algorithmically managed warehouse internalize productivity benchmarks? Foucault's mechanism describes these phenomena precisely.

Discussion Questions for Foucault

  1. Foucault says the panoptic mechanism "automatizes and disindividualizes power." What does it mean for power to be "disindividualized"? Is this characteristic of contemporary digital surveillance?
  2. Foucault analyzes the examination as the combination of hierarchical observation and normalizing judgment. How does the academic examination fit his analysis? How does a social media reputation score?
  3. Foucault does not offer a prescription for resistance to disciplinary power. Does his framework suggest any resources for resistance? How have subsequent scholars extended his analysis to account for resistance?
  4. Foucault's analysis emphasizes the productive dimension of power — it makes subjects, not just controls them. What is produced by being surveilled in a commercial platform context?

Source 3: Samuel D. Warren and Louis D. Brandeis, "The Right to Privacy" (1890)

Context

Samuel Warren (1852–1910) and Louis Brandeis (1856–1941) published "The Right to Privacy" in the Harvard Law Review in 1890. The article is widely cited as the origin of the modern legal right to privacy in the United States. Its immediate occasion was reportedly Warren's anger at gossip columns reporting on his wife's social activities; more broadly, it responded to the development of instantaneous photography and the "yellow press" journalism of the late nineteenth century.

Brandeis went on to become one of the most influential Supreme Court Justices in US history; his Olmstead dissent (1928) — arguing that the right to be let alone is "the most comprehensive of rights and the right most valued by civilized men" — drew directly on this article.

What to Look For

The philosophical foundation: Warren and Brandeis argue that the right to privacy derives from a more general principle of "the right to be let alone" — a right to inviolate personality. They trace this principle from earlier case law governing intellectual property in unpublished works and find that the principle has never been adequately articulated. Their argument is that the law already implicitly protects something that lawyers have not yet named.

The technological occasion: The article's opening paragraph explicitly identifies new technology — "instantaneous photographs" and "mechanical devices" of the newspaper enterprise — as the occasion requiring legal protection. This 1890 argument has been replicated in every era of surveillance technology development. Warren and Brandeis are the first in a long series of scholars arguing that new communication technologies require updating privacy law.

The limits they acknowledge: Warren and Brandeis carefully limit the right they propose: it does not protect information about public figures in their public roles; it does not prevent publication of information in the public interest; it does not survive the subject's own consent to publication. These limits anticipate current tensions between privacy and press freedom.

The relationship to property: Warren and Brandeis argue by analogy to property rights, drawing on protections for unpublished literary works to argue that personality itself (one's thoughts, sentiments, emotions) is a form of property deserving legal protection. This "proprietary" conception of privacy has been criticized by later scholars (including Solove) who argue that privacy is better understood as a relational or social value than as property.

Key Passages

The opening paragraph on new technology: "Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that 'what is whispered in the closet shall be proclaimed from the house-tops.'" Compare this framing to contemporary privacy arguments about smartphones and social media.

The articulation of the right: "The principle which protects personal writings and all other personal productions, not against theft and physical appropriation, but against publication in any form, is in reality not the principle of private property, but that of an inviolate personality."

The limitation on public figures: Warren and Brandeis acknowledge that persons who have voluntarily entered public life accept reduced privacy protections — but only with respect to their public roles, not their private lives.

Discussion Questions for Warren and Brandeis

  1. Warren and Brandeis wrote in 1890 about the threat of "instantaneous photographs." How would they analyze the threat of smartphone cameras, social media, and facial recognition systems? What elements of their analysis transfer; what requires updating?
  2. They argue that privacy protects "the right to determine to what extent his thoughts, sentiments, and emotions shall be communicated to others." How does this understanding of privacy apply to behavioral data collection that monitors behavior rather than communications?
  3. Warren and Brandeis ground the right to privacy in "inviolate personality." Is this grounding adequate for addressing surveillance of communities (as opposed to individuals)?

Source 4: Shoshana Zuboff, The Age of Surveillance Capitalism (2019)

Context

Shoshana Zuboff is an emerita professor at Harvard Business School whose earlier work (In the Age of the Smart Machine, 1988) examined the impact of computerization on work. The Age of Surveillance Capitalism (2019), published after more than a decade of research, is an 800-page analysis of how digital capitalism has mutated into a form she calls "surveillance capitalism."

The book is ambitious and lengthy. It is organized around three major claims: (1) surveillance capitalism is a new economic logic distinct from prior forms of capitalism; (2) this logic has specific mechanisms (behavioral surplus, prediction markets, behavioral modification) that can be analytically described; and (3) surveillance capitalism poses a fundamental threat to human autonomy and democratic society.

The Book's Structure

Part I ("The Foundations of Surveillance Capitalism"): The historical origin story — how Google discovered and institutionalized behavioral surplus. This section is the most empirically grounded and is a good entry point.

Part II ("The Advance of Surveillance Capitalism"): Extension of the surveillance capitalism logic from Google to other domains, including the "home" (IoT, smart speakers) and the body (wearables, health data). Introduces the concept of "economies of action" — the transition from predicting behavior to modifying it.

Part III ("Surveillance Capitalism's Third Modernity"): The most philosophically ambitious section — analyzes surveillance capitalism as a form of power Zuboff calls "instrumentarianism," which she contrasts with totalitarianism. This section engages most directly with political philosophy.

Key Concepts to Grasp

Behavioral surplus: The portion of behavioral data that exceeds what is needed to improve services and is instead used to train prediction models and sold. Understanding this concept requires understanding the distinction between what data is necessary (improving the map app) and what data is extracted beyond necessity (selling predictions about your future behavior to advertisers).

The rendition cycle: The process by which human experience is translated into behavioral data. Zuboff uses "rendition" deliberately — the word carries connotations of both translation and surrender. We are "rendered" as data subjects.

Prediction products: The commercial output of surveillance capitalism — predictions about what individuals will do, want, and respond to. These predictions are sold to businesses in "behavioral futures markets."

Behavioral modification: The extension beyond prediction to active intervention — nudging and shaping behavior to produce desired outcomes. Zuboff argues this is the logical endpoint of surveillance capitalism.

Instrumentarianism: Zuboff's term for the form of power that surveillance capitalism exercises. Unlike totalitarianism (which achieves compliance through terror and ideology), instrumentarianism achieves compliance through behavioral modification that bypasses will and consciousness.

Critical Reading Guidance

Zuboff makes strong claims that deserve critical engagement. Several questions to hold while reading:

What exactly is "voluntary" versus "involuntary" in surveillance capitalism's data extraction? Zuboff argues extraction is involuntary; defenders of platforms argue users consent. Who has the better argument, and does it matter?

Zuboff locates surveillance capitalism's origins in Silicon Valley. Is this adequate? Does she give sufficient attention to surveillance capitalism's predecessors (direct marketing, credit bureaus) or to state surveillance?

Zuboff distinguishes surveillance capitalism from industrial capitalism sharply. Critics argue the distinction overstates the novelty of behavioral monitoring for commercial purposes. Who is right?

Is "instrumentarianism" analytically useful, or does it create a false equivalence between surveillance capitalism and totalitarianism? What does the comparison illuminate? What does it obscure?

Discussion Questions for Zuboff

  1. Zuboff argues that surveillance capitalism's fundamental claim is that human behavioral data is a raw material that can be extracted and commodified without consent. What would genuine consent to this process look like?
  2. Zuboff focuses primarily on US technology companies. How does her framework apply to state-operated surveillance systems in China? To European platforms operating under GDPR?
  3. Zuboff says behavioral modification is the "third act" of surveillance capitalism, following data extraction and prediction. Identify a specific example of behavioral modification in a platform you use and analyze it using her framework.

Source 5: Simone Browne, Dark Matters: On the Surveillance of Blackness (2015)

Context

Simone Browne is a professor at the University of Texas at Austin whose work combines surveillance studies with Black studies. Dark Matters (2015) is a landmark contribution to both fields. The book's central argument is that anti-Black racism has been a constitutive feature of surveillance — not merely a distortion of surveillance — from the earliest modern surveillance practices through contemporary biometrics.

The Book's Method

Browne employs a method she calls "dark sousveillance" — looking back at the history of surveillance from the position of those who have been most intensively surveilled. This reversal of perspective reveals surveillance logics and structures that dominant analyses miss. The book is neither simply historical nor simply theoretical; it reads historical practices (slave ship manifests, lantern laws) through contemporary theoretical frameworks, and vice versa.

Chapter by Chapter Guide

Introduction: "What's the Difference?" Browne introduces her central concept: "racializing surveillance" — surveillance practices that produce and enforce racial categories, not merely practices that have racially disparate effects. The distinction is important: racializing surveillance is constitutive of race, not merely biased in its application of race as a pre-existing category.

Chapter 1: "Notes on Surveillance Studies" Browne surveys the surveillance studies literature and notes its relative silence on race. She argues that taking race seriously is not "adding" something to surveillance studies but fundamentally reorienting it.

Chapter 2: "Everybody's Got a Little Light Under the Sun" The lantern laws analysis. This chapter reads the 1712 New York City Lantern Law as a proto-biometric surveillance technology — a requirement that Black bodies be distinctively marked and visible to white authority. The analysis draws on the literal technology (lanterns as visibility apparatus) and its social meaning (making Black presence in public space conditional and surveilled).

Chapter 3: "B®anding Blackness" Analysis of branding (literal brand marks burned onto enslaved people) and the contemporary surveillance use of biometric identifiers. Browne draws the historical continuity while resisting simple equation: contemporary biometrics are not the same as historical branding, but they share the logic of marking particular bodies for particular authorities.

Chapter 4: "What Did TSA Find in Solange's Fro?" Contemporary analysis of airport security surveillance and its differential effects on Black women. Browne draws on her own experience and others' to analyze how "security" screening practices encode racial and gender assumptions.

Chapter 5: "Digital Epidermalization" The application of "epidermalization" (Fanon's term for the process by which race is projected onto bodies) to digital biometric systems. Digital epidermalization describes how racial categories are inscribed into biometric recognition systems.

Key Concepts

Racializing surveillance: Surveillance practices that produce and enforce racial identities and hierarchies — not merely surveillance with racially disparate effects, but surveillance that constitutes racial meaning.

Dark sousveillance: Browne's term for the practices by which racially oppressed people look back at surveillance power — documenting it, contesting it, and creating archives of their own experience of being watched.

Epidermalization: Borrowed from Fanon, the process by which racial meanings are inscribed onto bodies by the white gaze. Digital epidermalization names the encoding of racial categories into biometric and recognition systems.

Discussion Questions for Browne

  1. Browne argues that surveillance studies has been constituted around an unmarked whiteness — that its dominant frameworks assume a default subject whose race is not mentioned because it is assumed to be white. Do you see evidence of this in the other primary sources in this appendix?
  2. How does Browne's analysis of lantern laws change your understanding of contemporary biometric surveillance? What does the historical comparison reveal that a purely contemporary analysis would miss?
  3. Browne's concept of "dark sousveillance" suggests that surveilled people are not merely passive objects of surveillance power. What are the limits of sousveillance as a form of resistance?

Source 6: Daniel J. Solove, Nothing to Hide (2011)

Context

Daniel Solove is a law professor at George Washington University Law School who specializes in information privacy law. Nothing to Hide is the most accessible of the primary sources in this appendix — written for a general educated audience rather than specialists. It is an excellent entry point for students who are new to privacy scholarship and an essential companion for students who want to engage seriously with the "nothing to hide" argument they will encounter repeatedly in surveillance debates.

What to Look For

The taxonomy of privacy violations: Solove offers a taxonomy of privacy harms organized around the concept of "problems" privacy law should address: information collection (surveillance, interrogation), information processing (aggregation, identification, insecurity, secondary use, exclusion), information dissemination (breach of confidentiality, disclosure, exposure, increased accessibility, blackmail, appropriation, distortion), and invasion (intrusion, decisional interference). This taxonomy is more useful than the binary "secret/not-secret" conception of privacy that the nothing-to-hide argument relies on.

The aggregation problem: One of Solove's most important contributions is demonstrating that information that is individually innocuous can be highly privacy-invasive in combination. Your name is not private; your employer is not private; your neighborhood is not private; your physical description is not private; your car is not private. But combined, these facts enable someone to find you, follow you, and do you harm. Privacy cannot be analyzed item by item; it must be analyzed at the level of information aggregates.

The procedural dimension of privacy: Solove argues that privacy is not only about the substance of information disclosed but about the procedures by which information is collected, used, and shared. Even if the government discloses no embarrassing private facts, surveillance can violate privacy by subjecting people to oppressive power dynamics — creating files, enabling targeting, fostering fear — without any specific disclosure.

The fifteen responses to "nothing to hide": Solove systematically catalogs and responds to the argument that people with nothing to hide have nothing to fear from surveillance. The responses range from the abstract ("the argument rests on a false conception of privacy") to the concrete ("surveillance creates databases that can be hacked or abused") and are essential tools for participation in public debate.

Discussion Questions for Solove

  1. Solove offers a taxonomy of privacy harms. Which categories in his taxonomy are most relevant to commercial surveillance capitalism? Which are most relevant to government surveillance?
  2. How does the "aggregation problem" apply to the data broker industry? Construct a specific example of how individually innocuous data points combine to create a privacy violation.
  3. Solove argues that privacy has procedural as well as substantive dimensions. How does this insight apply to consent mechanisms in digital services?

General Guidance for Reading Across Sources

Compare the Authors' Foundational Assumptions

Each of these authors begins from different philosophical premises. Bentham is a utilitarian; privacy and autonomy matter insofar as they contribute to aggregate happiness. Foucault is skeptical of liberal categories including privacy, which he sees as part of the same normalizing apparatus as surveillance. Warren and Brandeis are common-law lawyers reasoning from precedent toward a new principle. Zuboff is a critical theorist of capitalism drawing on Frankfurt School traditions. Browne situates herself within Black studies and critical race theory. Solove is a legal pragmatist arguing for workable law. Notice how different premises produce different analyses and different prescriptions.

Note What Each Author Cannot See

Every theoretical framework illuminates some things and obscures others. Foucault is brilliant on the mechanisms of disciplinary power but largely silent on race and gender. Warren and Brandeis are focused on individual privacy in ways that do not address collective or community surveillance. Zuboff's framework captures surveillance capitalism's economic logic but requires supplementing with racial and labor analysis. Browne's framework is powerful for analyzing racial surveillance but requires supplementing for surveillance that is not primarily racially organized. None of these authors has the full picture; the field advances by putting them in conversation.

Challenge the Sources

Primary sources are not oracles — they are arguments, and arguments can be wrong. The most important thing you can do as a surveillance studies student is to engage the arguments actively: ask what evidence supports each claim, whether the evidence is adequate, what alternative interpretations are possible, and what the argument fails to explain. Foucault's sweeping historical claims invite empirical challenge; Zuboff's economic claims invite economic counter-argument; Browne's historical claims invite historical corroboration and extension.


For further guidance on reading theoretical texts in social science, consult Booth, Colomb, and Williams, The Craft of Research (4th ed., 2016). For reading legal materials, see any introduction to legal research and reasoning available through your library. For the specific interpretive challenges of Foucault, the Stanford Encyclopedia of Philosophy entry on Foucault is a reliable starting point.