Chapter 3 Exercises: Pre-Modern Surveillance


Level 1: Recall and Comprehension

Exercise 3.1 — Historical Timeline (20 minutes)

Create a timeline of the surveillance systems discussed in Chapter 3. For each entry, note: - Approximate date or period - Geographic location - The agent of surveillance (who was watching?) - The subject population (who was watched?) - The primary stated purpose - At least one unstated purpose or secondary effect

Your timeline should include at minimum: Egyptian census, Roman census, Chinese baojia system, Fourth Lateran Council confession requirement, Domesday Book, Venetian bocche di leone, Walsingham's network, colonial cartography, colonial census, slave pass system, and the popular press as synoptic technology.


Exercise 3.2 — System Identification (10 minutes)

For each of the following brief descriptions, identify which specific surveillance system from Chapter 3 is being described and explain the identifying features:

  1. A system of neighborhood collective responsibility in which families were organized into groups of ten, with each group accountable for the others' behavior
  2. An annual religious obligation that required detailed disclosure of private thoughts and sins to an authority sworn to secrecy
  3. A comprehensive English property and population survey conducted in a single year for fiscal purposes
  4. Anonymous wooden receptacles placed throughout a city where citizens could deposit written accusations against their neighbors
  5. A requirement that enslaved people carry written documentary proof of their status and permission when traveling beyond their home property

Exercise 3.3 — Vocabulary in Historical Context (15 minutes)

Apply the following terms from Chapter 1 and Chapter 2 to specific historical examples from Chapter 3. For each term, identify the best example from the chapter and explain how it applies:

  1. Visibility asymmetry
  2. Social sorting
  3. Function creep
  4. Consent as fiction
  5. Lateral surveillance
  6. The normalizing gaze (apply to the confession)
  7. Synopticism (apply to the press)

Level 2: Application

Exercise 3.4 — The Confession Analyzed (30 minutes)

Foucault argues that the Catholic confessional was a surveillance technology in which subjects were required to produce detailed verbal accounts of their interior lives for institutional authority.

Apply Lyon's five-element definition of surveillance to the confessional: - Focused: What specifically was the confession focused on? How was its scope defined? - Systematic: What made the confessional systematic rather than occasional or optional? - Routine: How did the Fourth Lateran Council's annual requirement create routineness? - Personal details: What category of personal details was the confession specifically designed to extract? - Purposes of influence, management, protection, or direction: Which of these purposes did the confession serve? Were they all present?

Then: What distinguishes the confessional from a modern therapy session? Are therapy sessions surveillance? Use Lyon's definition to work through this carefully.


Exercise 3.5 — Colonial Classification (35 minutes)

The chapter describes how colonial censuses imposed racial and caste categories on colonized populations, hardening and institutionalizing identities that had been more fluid.

  1. Identify a contemporary algorithmic classification system (a credit score, a hiring algorithm, a social media content moderation system, a recidivism prediction tool) that may similarly impose categories on populations that do not fit neatly into those categories.

  2. For your chosen system, analyze: What categories does it use? Who defined those categories? What populations are most poorly served by the categories (i.e., whose reality does not fit the categorization system)? What are the consequences of misclassification?

  3. Write a 350-word analysis connecting the colonial census problematic (categories that produce what they claim to describe) to your chosen contemporary system.


Exercise 3.6 — Lateral Surveillance Through History (20 minutes)

The chapter identifies the Chinese baojia system as an example of lateral surveillance — mutual monitoring among peers, with institutional incentives for reporting.

Identify three contemporary examples of lateral surveillance. For each: 1. Describe the mechanism 2. Identify the incentives that encourage monitoring and reporting 3. Assess whether the lateral surveillance serves the interests of the monitored community or primarily serves institutional actors who benefit from the intelligence generated

Examples you might consider: neighborhood watch apps, social media content reporting systems, corporate anonymous tip lines, grade appeals requiring peer assessment, mutual accountability partnerships in wellness apps.


Level 3: Analysis

Exercise 3.7 — The Black Chamber and Modern Communications Surveillance (30 minutes)

The chapter notes that European states' letter-opening "black chambers" and the NSA's PRISM program share structural logic: interception of communications in transit, extraction of information, and maintenance of the channel to avoid detection.

Write a 400-word comparative analysis that: 1. Identifies the key structural similarities between the black chamber and NSA communications surveillance 2. Identifies the key differences (technology, scale, legal framework, democratic accountability) 3. Assesses whether the continuity argument is strong enough to say these are the "same" phenomenon, or whether the differences are significant enough to require different analytical frameworks 4. Considers: does the historical precedent of authorized letter-opening by European states strengthen or weaken the civil liberties case against modern electronic surveillance?


Exercise 3.8 — The Domesday Book as Database (25 minutes)

Dr. Osei's question in section 3.10 — "What is the difference between the Domesday Book and a database?" — is the organizing question for this exercise.

Write a structured comparison using the following dimensions:

Dimension Domesday Book Modern Database
Who commissioned it?
What did it contain?
Who had access to it?
How was it used?
How long did it persist?
Could subjects see it?
Could it be corrected?
What was the purpose of errors?

After completing the table, write a paragraph arguing for the position that the differences are more significant than the similarities, and a second paragraph arguing for the opposite position. Then state your own view.


Exercise 3.9 — The Continuity Argument (30 minutes)

The chapter makes a "historical continuity argument": that surveillance is as old as power, and that modern digital surveillance shares a fundamental social logic with ancient and pre-modern surveillance.

Identify the two strongest objections to the continuity argument — cases where a modern surveillance phenomenon is so different from historical precedents that the continuity claim seems strained. Then identify the two strongest points of continuity — cases where historical and modern surveillance are deeply analogous despite the technological difference.

Write a 350-word assessment: Is the continuity argument ultimately persuasive? Does it illuminate more than it obscures?


Level 4: Synthesis

Exercise 3.10 — A Genealogy of One Surveillance Technology (45 minutes)

Choose one contemporary surveillance technology and construct its historical genealogy — tracing its functional and conceptual predecessors through at least three historical periods, ending with its contemporary form.

Suggested technologies: - Biometric identification (fingerprinting → facial recognition) - Criminal database (criminal record → predictive policing database) - Credit assessment (merchant ledgers → credit scores → alternative data) - Border monitoring (passport → biometric border control) - Workplace time tracking (factory clock → time card → keystroke logger)

Your genealogy should: - Identify at least three historical predecessors, with dates and contexts - Explain what is continuous across each transition (the social function being served) - Explain what changed at each transition (the technical substrate, the scale, the institutional context) - Assess whether the modern form serves the same purposes as its historical predecessors — or whether function creep has introduced new purposes

Produce a timeline plus a 400-word analytical commentary.


Exercise 3.11 — A Pre-Modern Surveillance Case Study (50 minutes)

This chapter introduced several surveillance systems only briefly. Choose one of the following and conduct more in-depth research, then write a 600-word case study analysis:

  1. The Stasi (East German secret police, 1950–1990) — a massive informant network that combined pre-modern lateral surveillance with modern bureaucratic record-keeping
  2. The French lettres de cachet system — royal letters authorizing imprisonment without trial, used as a tool of social surveillance and control
  3. The British Poor Law surveillance system — the nineteenth-century workhouse and its mechanisms for monitoring and managing the poor
  4. The Ottoman millet system — a system of ethnoreligious classification that assigned legal status and monitored populations by religious community

Your case study should apply Lyon's definition, identify the relevant categories from the five-part taxonomy (where applicable), analyze the visibility asymmetry, and explain how this historical case illuminates contemporary surveillance practices.


Level 5: Evaluation

Exercise 3.12 — Evaluating Foucault on Confession (35 minutes)

Foucault's analysis of the confessional as a surveillance technology is one of his most provocative claims. It has been criticized on several grounds:

  • The religious defense: The confessional's purpose was spiritual healing and the relationship with God, not institutional control; reducing it to a surveillance mechanism misses its essential nature
  • The asymmetry objection: The confessor was bound by the seal of confession — they could not use the information for any external purpose, including reporting to civil authorities. This limits the "surveillance" reading
  • The consent objection: Catholics who confessed chose to do so as an expression of their faith; this is not comparable to coerced surveillance

Write a 500-word evaluative essay that: 1. Presents each critique in its strongest form 2. Responds to each critique from Foucault's perspective 3. Reaches your own considered judgment: Is the confessional usefully analyzed as a surveillance technology? What does applying Lyon's definition reveal, and what does it obscure?


Exercise 3.13 — Evaluating the Colonial Surveillance Legacy (40 minutes)

The chapter argues that colonial census and cartographic practices created surveillance infrastructures that had lasting consequences — in some cases, directly enabling postcolonial discrimination.

Evaluate the following claim: "Modern database systems and algorithmic classification tools are not neutral technologies applied to a neutral social world — they are built on and perpetuate surveillance infrastructures whose colonial and racial origins shape their current operation."

Your evaluation should: 1. Identify the strongest evidence supporting this claim (draw on the chapter and on Case Study 1.1 or 1.2 if relevant) 2. Identify the strongest counterarguments 3. Consider: does the presence of colonial roots in a contemporary technology commit that technology to perpetuating colonial purposes, or can the same tools serve different ends with different governance? 4. State and defend your own position


Discussion Questions

  1. The chapter argues that medieval Catholics experienced the compulsory annual confession as a spiritual obligation, not primarily as surveillance. Does the subjective experience of the surveilled — whether they feel watched or whether they experience the monitoring as legitimate — affect our analytical assessment of whether it is surveillance? Why or why not?

  2. Walsingham's surveillance of Catholics in Elizabethan England and post-9/11 surveillance of Muslim communities in the United States both involved monitoring a religious community as a category of security risk. What are the most significant similarities? What are the most significant differences? Does the historical analogy suggest any lessons for contemporary policy?

  3. The chapter notes that the slave pass system is "one of the most direct ancestors of modern identification documents." How comfortable are you with this genealogy? Does identifying a historical ancestor of a contemporary technology change how you evaluate that technology? Should it?

  4. The baojia system made neighbors into mutual surveillance agents. Contemporary lateral surveillance technologies — neighborhood apps, social media reporting systems, corporate tip lines — do something similar. Is lateral surveillance more or less concerning than institutional surveillance? What criteria would you use to evaluate this?

  5. Jordan's insight at the end of the chapter — that the database does "more of the same thing" — is a version of the historical continuity argument. Do you find this insight reassuring (surveillance is nothing new) or alarming (surveillance has been central to power throughout all of human history)? What follows from your response?


Chapter 3 | Part 1: Foundations | The Architecture of Surveillance