29 min read

After the seminar on the industrial panopticon, Jordan catches Dr. Osei in the hallway.

Learning Objectives

  • Explain Foucault's power/knowledge nexus and how it applies to surveillance systems
  • Describe Anthony Giddens' analysis of surveillance as a central feature of the modern nation-state
  • Articulate David Lyon's surveillance society thesis and its key claims
  • Explain Zuboff's concept of surveillance capitalism as an economic logic
  • Describe the feminist surveillance studies critique of the gendered gaze
  • Explain Simone Browne's concept of 'racializing surveillance' and dark matters
  • Identify empirical research on the chilling effect and explain its significance
  • Construct a unified analytical framework drawing on multiple theoretical traditions

Chapter 5: Power, Knowledge, and the Gaze — Theoretical Frameworks for Surveillance


Opening: A Conversation After Class

After the seminar on the industrial panopticon, Jordan catches Dr. Osei in the hallway.

"I've been thinking about the warehouse," Jordan says. "I can name what's happening to me now. But naming it doesn't stop it. So what's the point of the theory?"

Dr. Osei stops walking. She has been asked this question many times, in many forms. She considers for a moment.

"When you look at a building," she says, "you see a building. But an architect looks at the same building and sees load-bearing walls, stress points, the decisions someone made about where to put the windows. They see the same thing you see, and also the structure underneath it."

Jordan thinks about this.

"Theory," Dr. Osei says, "is the training to see the structure. Once you see the structure, you can't unsee it. You can decide what to do with it — challenge it, work within it, work around it. But at least the decision is yours."

This chapter gives you the theoretical architecture for everything that follows in this book. We have encountered Foucault's panopticism, Lyon's surveillance definition, the historical continuity argument, and the industrial surveillance genealogy. Now we put them together — and add the feminist, critical race, and economic frameworks that make the picture complete.

Theory is not comfort. But it is, Dr. Osei is suggesting, a form of power.


5.1 Foucault's Power/Knowledge Nexus

We encountered Michel Foucault in Chapter 2 through the lens of the panopticon. Here we engage his broader theoretical framework, which underlies not just the panopticon but the entire surveillance studies tradition he helped found.

5.1.1 Power Is Not a Thing

The first thing to understand about Foucault's theory of power is what it rejects. The conventional understanding of power treats it as a possession — something that some people have and others lack. Governments have power; citizens lack it. Bosses have power; workers lack it. Men have power; women lack it. This understanding is not entirely wrong — differential capacity to coerce and compel is real. But it is insufficient.

Foucault argued that power is better understood as a relation than a possession — and as a relation that is diffuse, productive, and constitutive rather than concentrated, repressive, and merely destructive.

Diffuse: Power does not only flow from the top of hierarchies downward. It circulates through social networks, institutions, relationships, and practices. The teacher has power over students, but students also have power over teachers (through their engagement or disengagement, their evaluations, their behavior). The doctor has power over patients, but patients' ability to withhold cooperation, seek second opinions, or simply refuse treatment limits the doctor's power.

Productive: The conventional understanding treats power as primarily negative — it forbids, represses, excludes. Foucault insisted that modern power is primarily productive: it creates subjects, produces knowledge, generates desires, shapes identities. The educational system does not merely prevent ignorance; it produces a certain kind of knowing subject. The medical system does not merely prevent disease; it produces a certain kind of patient who understands their body through medical categories.

Constitutive: Power helps constitute the social reality it purports merely to respond to. The criminal justice system does not simply respond to pre-existing criminals; its definitions, practices, and classifications help produce the category of the criminal and the population of persons who occupy it.

5.1.2 Knowledge Produces Power, Power Produces Knowledge

The nexus between power and knowledge is the most important element of Foucault's framework for surveillance studies.

Foucault's claim is not merely that knowledge gives people power (though it does). It is that power and knowledge are co-constitutive: they produce each other. Power requires knowledge to operate; the exercise of power generates knowledge; that knowledge enables further exercises of power.

💡 Intuition: Consider the medical examination. The doctor's power to diagnose, prescribe, and treat rests on medical knowledge — anatomy, physiology, pharmacology. But the practice of medical examination — examining patients, recording findings, comparing cases, publishing research — produces medical knowledge. The power to examine produced the knowledge that legitimated and expanded that power. Now expand this to surveillance: the state's power to monitor citizens' communications rests on the technical knowledge of how to intercept and analyze data. Exercising that power generates knowledge about citizens' associations, movements, and beliefs. That knowledge expands the state's power further — enabling more refined targeting, more effective intervention, more efficient administration. Power and knowledge produce each other in a continuously expanding spiral.

For surveillance specifically, the power/knowledge nexus means:

  1. Knowledge about persons (their movements, communications, behaviors, associations) is a form of power over them — it enables prediction, influence, and control.

  2. The exercise of surveillance power generates knowledge — profiles, patterns, predictions — that extends and elaborates that power.

  3. This spiral is not neutral — it tends, in Foucault's analysis, to expand: surveillance systems that work generate demand for more surveillance.

  4. The knowledge produced by surveillance is not simply a reflection of social reality; it shapes that reality by classifying, categorizing, and managing persons through the categories it creates.

5.1.3 Technologies of the Self

In his later work, Foucault turned to what he called "technologies of the self" — the practices through which individuals constitute themselves as subjects, working on their own bodies, thoughts, and desires in accordance with social norms.

Technologies of the self are practices of self-surveillance: confession, spiritual self-examination, journaling, therapeutic self-disclosure, the tracking of bodily metrics. These practices are not purely self-directed; they are shaped by the social norms of the institutional contexts in which they occur (the church, the clinic, the gym, the platform).

This concept is directly relevant to the "self-surveillance" category introduced in Chapter 1. When Jordan logs their meals in a fitness app, they are engaging in a technology of the self — but the norms governing what constitutes a "good" diet, how to evaluate health metrics, and what counts as adequate self-care are not generated by Jordan. They are produced by medical authority, fitness culture, and the platform's design choices. The self that Jordan monitors is partly produced by the norms of the surveillance apparatus itself.


5.2 Giddens and Surveillance as Feature of the Nation-State

Anthony Giddens (1938–present) is a British sociologist whose work on modernity provides an important complement to Foucault's analysis. Where Foucault's framework centers on disciplinary power and the subject's constitution through surveillance, Giddens places surveillance in the broader context of the nation-state's administrative requirements.

5.2.1 Surveillance as One of Four Institutional Dimensions of Modernity

In The Nation-State and Violence (1985) and The Consequences of Modernity (1990), Giddens identifies four institutional dimensions of modernity:

  • Capitalism: The accumulation of capital through commodity markets
  • Industrialism: The transformation of nature through developed technology
  • Military power: The control of the means of violence
  • Surveillance: The supervision of subject populations and the control of information

Giddens' placement of surveillance as one of four defining features of modern society — alongside capitalism, industrialism, and military power — is a strong claim: surveillance is not a byproduct of modernity but a constitutive feature of it. You cannot have the modern nation-state without surveillance.

5.2.2 Why the Nation-State Requires Surveillance

Giddens argues that pre-modern political orders — empires, city-states, feudal territories — governed primarily through local intermediaries. The central authority's power was real but limited in its reach; most people lived their entire lives largely unaffected by distant sovereigns.

The modern nation-state claims sovereignty over a bounded territory and its entire population. To exercise this claim, the state must know its population: who they are, where they are, what they own, what they do. The administrative requirements of the modern state — taxation, conscription, welfare provision, public health, legal enforcement — all presuppose the capacity to see and manage an entire population.

This is what Chapter 3 demonstrated historically: the census, the passport, the public register, the tax roll are all state surveillance technologies required by the state's claims over its subjects. Giddens provides the theoretical framework for why this must be so: sovereignty without surveillance is sovereignty without teeth.

5.2.3 The Double-Edged Quality of State Surveillance

Giddens is notable among surveillance theorists for his consistent emphasis on the ambivalence of surveillance. The same administrative capacity that enables the state to monitor and control its population also enables it to provide services — healthcare, education, welfare, infrastructure — at a scale that pre-modern states could not approach.

The Social Security system that tracks American workers' earnings is also the system that pays retirement benefits. The national health records system that monitors patients' medical histories also enables coordinated care across providers. The immigration records that enable enforcement also enable the processing of legitimate travel and work authorization.

Giddens' point is not that surveillance is therefore acceptable — it is that the moral evaluation of surveillance cannot be divorced from the question of what the surveillance enables. The same infrastructure serves both goals; the distinction between legitimate and illegitimate surveillance is a political question, not a technical one.

🎓 Advanced: Giddens' analysis of the ambivalence of modern institutions is part of a broader theoretical framework about "reflexive modernity" — the idea that modern societies are increasingly aware of and responsive to information about themselves. Surveillance, in this framework, is not only a mechanism of control; it is a mechanism through which societies learn about themselves and adjust. Environmental monitoring, public health surveillance, and economic data collection all serve this reflexive function. The pathology of surveillance is not that information is collected about populations but that the information is used asymmetrically — by institutions against individuals rather than by communities about themselves.


5.3 David Lyon's Surveillance Society

David Lyon's "surveillance society" thesis is the most systematic and comprehensive conceptual framework in the field. Over four decades of work, Lyon has developed and refined a framework that synthesizes Foucault, Giddens, and a wide range of empirical evidence into a coherent theory of contemporary surveillance.

5.3.1 The Surveillance Society Thesis

Lyon's core claim is that surveillance has become a pervasive and constitutive feature of modern societies — not a marginal or exceptional practice but a routine dimension of social life that organizes everyday experience in fundamental ways.

The surveillance society thesis has several components:

Pervasiveness: Surveillance is not concentrated in a few institutional locations (prisons, police stations) but distributed across all major social domains — commerce, employment, healthcare, education, transportation, entertainment, communication.

Mundanity: Because surveillance is pervasive, it has been normalized — absorbed into everyday routines as background noise. The surveillance society is one in which surveillance has ceased to register as surveillance for most people most of the time.

Bidirectionality: Lyon insists, following Mathiesen, that surveillance is not only top-down (institutions watching individuals) but also lateral (individuals watching each other) and bottom-up (citizens watching institutions). The surveillance society is one of multiple, overlapping surveillance flows.

Sorting function: The primary purpose of surveillance in the surveillance society is social sorting — the classification and differential treatment of populations. Surveillance is not primarily about catching wrongdoers; it is about managing risk, allocating resources, targeting marketing, and differentiating service levels across classified population segments.

5.3.2 Social Sorting as Central

Lyon's emphasis on social sorting — rather than, say, privacy violation or behavioral control — is analytically important. It shifts the surveillance studies' focus from individual harm (my privacy was violated) to structural harm (categories of people are treated differently based on surveillance-generated classifications).

The surveillance society's primary mechanism of harm is not the watching itself but the classification that watching enables, and the differential treatment that classification produces. This is why the equity arguments in Chapter 1 are so important: surveillance harms are not equally distributed. They fall on those who are classified as risky, marginal, or suspicious — classifications that consistently track existing social inequalities.

📊 Real-World Application: Consider the algorithmic system that determines whether a loan application is approved. The system uses hundreds of variables — purchase patterns, location data, employment records, social media connections — to predict credit risk. The algorithm may not use race explicitly; but if the variables it uses are correlated with race through historical discrimination (zip code correlates with race through residential segregation; purchase patterns correlate with income which correlates with race through labor market discrimination), then the algorithm will sort applicants by race in its outputs even without race as an input. This is social sorting producing racial disparities through surveillance. The surveillance is mundane (routine commercial data collection), the sorting is automated, and the harm is structural — no single discriminatory decision, but a pattern of differential treatment across thousands of applications.


5.4 Zuboff's Surveillance Capitalism

Shoshana Zuboff's concept of "surveillance capitalism" — developed primarily in her 2019 book The Age of Surveillance Capitalism — provides the economic framework that Lyon's surveillance society thesis lacks. Where Lyon describes the phenomenon sociologically, Zuboff explains the economic logic that drives it.

5.4.1 The Logic of Behavioral Surplus

Zuboff argues that surveillance capitalism constitutes a new form of capitalism in which human behavioral data — what people do, search for, say, feel, and experience — is the raw material from which predictions are manufactured and sold as products.

The mechanism works as follows:

  1. Digital platforms offer services (search, social networking, navigation, e-commerce) that generate useful behavioral data as a byproduct of users' activity.

  2. Platforms discovered — beginning with Google's advertising auctions in the early 2000s — that behavioral data about users' activities and interests could be used to predict what those users would do, want, and buy in the future.

  3. These predictions — formulated as "behavioral futures" — can be sold to advertisers, political campaigns, insurance companies, employers, and other buyers who want to influence human behavior.

  4. The economic incentive is therefore to maximize the collection of behavioral data, which requires maximizing the scope of surveillance. Platforms expand their data collection to cover as many dimensions of human life as possible.

  5. This expansion is the economic driver of surveillance capitalism: not malice, but the logic of behavioral data as a commodity.

5.4.2 The Prediction Imperative

What distinguishes surveillance capitalism from previous forms of commercial data collection, Zuboff argues, is the prediction imperative — the drive to collect data that is not merely descriptive (what users did) but predictive (what users will do), and increasingly prescriptive (what users can be made to do).

The most economically valuable behavioral data is data that enables accurate prediction of behavior. Accurate prediction requires not just data about past behavior but data that enables inferential models of future behavior — increasingly, this means data about affect, attention, and social relationships, not just purchasing and browsing.

This is why platforms are invested in capturing data about users' emotional states (reaction emojis, voice intonation in messaging, the time of day when users engage), social networks (who you're connected to, who you communicate with, who influences your behavior), and physical environment (location, movement, ambient conditions).

5.4.3 Instrumentarian Power

Zuboff coins the term "instrumentarian power" to describe the form of power exercised by surveillance capitalism: not the sovereign's coercive power nor the panopticon's disciplinary normalization, but power exercised through the modification of the behavioral environment.

Instrumentarian power does not tell you what to do; it arranges your informational environment so that you are more likely to do what the platform wants you to do. The news feed that shows you outrage-inducing content because outrage drives engagement is not ordering you to be outraged — it is engineering the conditions under which outrage is the most likely response.

This is a qualitatively new form of power that neither Foucault nor Giddens fully anticipates. It is not the coercion of sovereignty; it is not the normalization of discipline; it is behavioral modification through the design of informational environments. Its subjects are not imprisoned or disciplined; they are nudged, triggered, and influenced at scale.

📝 Note: We will return to Zuboff's framework in depth in Part 3, particularly Chapter 34, which examines surveillance capitalism as an economic system. Here we introduce the concept as a component of the theoretical synthesis.


5.5 Feminist Surveillance Studies: The Gendered Gaze

Surveillance studies has historically been male-dominated in its theoretical frameworks, often treating surveillance's subjects as implicitly gender-neutral while the structural experience of surveillance is deeply gendered. Feminist surveillance studies — developed by scholars including Rachel Dubrofsky, Shoshana Amielle Magnet, Lisa Parks, and others — corrects this gap.

5.5.1 The Gendered Experience of Surveillance

Women experience surveillance differently from men in systematic, structural ways:

Street surveillance: The experience of being watched, assessed, and responded to in public space — catcalling, unsolicited attention, the management of appearance for safety — is a form of constant, ambient surveillance that most women navigate as a background condition of public life. This is surveillance as harassment, structural and normalized.

Domestic surveillance: Intimate partner surveillance — tracking a partner's location, reading their messages, monitoring their activities — is a major dimension of domestic abuse. Stalkerware, disguised as family safety or child monitoring apps, is used by abusers to maintain comprehensive surveillance of victims. The same commercial tools that parents use for legitimate child monitoring are used by domestic abusers for coercive control.

Institutional surveillance of reproductive bodies: Surveillance of women's reproductive choices — by the state, by employers, by healthcare institutions — has intensified following legislative restrictions on abortion access. Apps tracking menstrual cycles and fertility data have come under scrutiny for the uses to which this data might be put in legal enforcement contexts.

Online harassment and doxing: Women and gender-nonconforming people are disproportionately targeted by coordinated online harassment campaigns that weaponize personal information — addresses, employers, family members' details — as tools of intimidation. This is lateral surveillance converted into harassment infrastructure.

5.5.2 The Male Gaze and Surveillance

Laura Mulvey's "male gaze" (introduced in Chapter 2) is relevant to surveillance not only through its direct application to visual culture but through its analysis of the asymmetric structure of looking: the position of the watcher is structurally gendered masculine, and the position of the watched is structurally gendered feminine.

This is not merely a metaphor. Surveillance in public space — the camera, the checkpoint, the assessment — disproportionately scrutinizes women's bodies for compliance with norms of appearance, respectability, and appropriateness. Fashion CCTV systems that track body shape; border control systems that assess whether a woman's appearance is consistent with her claimed identity; street harassment that assesses women's bodies in real time — all participate in the male gaze's structure of objectifying assessment.

🌍 Global Perspective: The gendered experience of surveillance is dramatically different across political contexts. In some countries, surveillance technologies are deployed specifically to enforce gender-normative dress and behavior — facial recognition used to identify women not wearing required head coverings; camera systems used to monitor gender-segregated spaces. In other contexts, surveillance has been deployed to protect women from harassment — body cameras on transit systems aimed at documenting and deterring sexual harassment. The same technological capacity is available; the political and cultural context determines the direction and purpose of its deployment.

5.5.3 The Feminist Epistemology Critique

Feminist surveillance scholars have also raised epistemological critiques of the field's dominant frameworks: that the canonical surveillance studies texts (Bentham, Foucault, Lyon) assume a generic subject whose relationship to surveillance is not gendered, raced, or classed — a universalizing move that reflects the demographics of academia rather than the diversity of surveillance's subjects.

This critique calls for frameworks attentive to the intersectionality of surveillance experiences: the way that race, gender, class, sexuality, disability, and citizenship status interact to produce specific forms of surveillance that cannot be understood by analyzing any single dimension alone.


5.6 Critical Race Theory and Surveillance: Browne's Dark Matters

Simone Browne's Dark Matters: On the Surveillance of Blackness (2015) is the foundational work of critical race theory applied to surveillance studies. It is impossible to understand contemporary surveillance without it.

5.6.1 Racializing Surveillance

Browne introduces the concept of "racializing surveillance" to describe surveillance technologies and practices that serve to produce and reproduce racial categories and racial hierarchy:

"I use racializing surveillance to talk about a critical practice that, when it negates or negatively impacts those who are surveilled based on race, has the aim of rendering... subjects outside of the norm — criminal, dangerous, deviant, undesirable."

Racializing surveillance is not surveillance that uses race as an explicit variable (though it sometimes does). It is surveillance that operates through racial categories — whose definitions of normal, suspicious, threatening, or undesirable are shaped by racial assumptions — and whose effects fall disproportionately on racialized populations.

5.6.2 The History of Black Surveillance

Browne traces the surveillance of Black people from the antebellum American South through the digital era. Key historical moments include:

The slave lantern law (New York, 1712): A law requiring enslaved people to carry lanterns when traveling at night — a form of illumination-as-surveillance that made Black bodies visible in public space while the enslavers remained in darkness. The literal light of the lantern enforced racial visibility asymmetry.

The slave pass system: Documentary identification tying a bodily subject to a paper that proved legal status and permitted movement — a form of biometric surveillance that Browne traces as a direct ancestor of modern ID and biometric systems.

The branding of enslaved people: Permanent bodily marking as a surveillance and ownership technology — identification of persons as property, inscribed on the body itself.

COINTELPRO (1956–1971): The FBI's Counter Intelligence Program, which conducted extensive surveillance of civil rights organizations, Black Power movements, the Black Panther Party, and individual leaders including Martin Luther King Jr. The program aimed not merely to gather intelligence but to disrupt, discredit, and destroy the organizations it targeted — using surveillance data as a weapon.

Contemporary: Predictive policing in over-surveilled Black communities, facial recognition systems with documented bias against darker-skinned faces, stop-and-frisk programs using algorithmic risk scoring, and social media monitoring of Black Lives Matter activists.

5.6.3 Dark Sousveillance

Drawing on Steve Mann's concept of "sousveillance" (watching from below), Browne develops the concept of "dark sousveillance" — resistance to surveillance by Black people and other racialized groups through counter-visibility, opacity, and the assertion of the right to be seen on one's own terms.

Dark sousveillance includes: enslaved people's use of trickery and deception to navigate the surveillance of the plantation; the practice of "passing" as a form of identity-as-opacity; the Black community's use of the rumor network as an information distribution system outside white surveillance; and contemporary practices including the use of encryption and anonymous communication, counter-photography (filming police), and the assertion of control over one's own image and story.

📜 Primary Source: Browne on Dark Matters

"I use dark matter as a metaphor for those moments when — through what I call dark sousveillance — those who are made 'racially' other through practices of surveillance resist the watchful gaze by appropriating the tools of surveillance... Dark sousveillance works to recalibrate the surveillance and to negotiate or refuse the terms of racialized visibility."

— Simone Browne, Dark Matters: On the Surveillance of Blackness (2015), p. 21

Discussion: Browne's concept of "dark sousveillance" suggests that resistance to racializing surveillance takes the form of counter-surveillance — appropriating surveillance tools to document and challenge rather than to manage and control. What are the limits of this form of resistance? Can counter-surveillance challenge the structural conditions of racializing surveillance, or does it only address individual instances?


5.7 The Chilling Effect: Empirical Evidence

Throughout this book, we have invoked the "chilling effect" — behavioral modification caused by awareness of surveillance. Chapter 5 is an appropriate place to examine the empirical research base for this concept, which is one of the best-supported claims in surveillance studies.

5.7.1 Penney (2016): Wikipedia and the NSA

We reviewed this study in Chapter 1. The key finding: visits to Wikipedia articles about terrorism-related topics fell approximately 20% following the Snowden revelations — a sustained behavioral change driven by awareness of government surveillance, not by actual targeting.

5.7.2 Stoycheff (2016): Social Media and Self-Censorship

A 2016 study by Elizabeth Stoycheff, published in Journalism and Mass Communication Quarterly, found that awareness of government surveillance made participants significantly less likely to express minority political opinions on social media — but only among participants who believed the government's surveillance was legitimate. This finding is important: the chilling effect is not merely a response to surveillance awareness but to the perceived legitimacy of the surveilling authority. When surveillance is seen as legitimate, self-censorship is more pronounced, because conformity to the perceived norm of acceptable speech is stronger.

5.7.3 Marthews and Tucker (2017): Google Searches

Alex Marthews and Catherine Tucker examined Google search volume for terrorism-related terms before and after the Snowden revelations and found significant decreases in searches for sensitive terms in countries with strong civil liberties protections — suggesting that awareness of surveillance suppresses information-seeking among populations that take their privacy expectations seriously.

5.7.4 The Aggregate Evidence

The accumulation of chilling effect studies across different contexts — Wikipedia searches, social media political expression, Google searches — points consistently in the same direction: awareness of surveillance modifies behavior, broadly, across many people who are not targets and who are doing nothing wrong.

This aggregate evidence is crucial for the political argument about surveillance's costs. The "nothing to hide" defense of surveillance implicitly assumes that surveillance only affects wrongdoers. The chilling effect evidence demonstrates that surveillance affects everyone — the curious researcher, the political dissenter, the person exploring unconventional ideas — and does so in directions that systematically constrain intellectual and political freedom.

📊 Real-World Application: The chilling effect has been cited in several major legal cases as a constitutional harm. In ACLU v. Clapper (2014), a federal appeals court found that metadata surveillance could have a chilling effect on legal communications. The Supreme Court's analysis in Carpenter v. United States (2018) explicitly referenced the chilling effect as one of the harms of warrantless cell phone location data collection. Legal recognition of the chilling effect as a genuine constitutional harm — not merely a theoretical concern — represents a significant development in the law of surveillance.


5.8 Synthesis: A Unified Theoretical Lens

Across five chapters, we have now assembled the theoretical toolkit that will serve the remainder of this book. Let us put the pieces together.

5.8.1 The Surveillance Studies Consensus

Despite significant differences in emphasis and methodology, the major theoretical frameworks in surveillance studies share several core commitments:

  1. Surveillance is structural, not episodic. It is not primarily about individual acts of watching but about institutional systems that systematically render populations visible for purposes of management and control.

  2. Visibility asymmetry is the organizing feature. The power of surveillance rests on the watcher knowing more than the watched — about who is observed, what is noticed, how it will be used.

  3. The categories matter as much as the data. Surveillance produces social categories (the criminal, the risk, the loyal worker, the creditworthy borrower) through which differential treatment is organized. The categories are not discovered; they are constructed through surveillance practice.

  4. Surveillance serves power. Across all historical periods and technological substrates, surveillance has primarily served the interests of those with institutional authority over those without it.

  5. The harm is often structural, not individual. The most significant surveillance harms are not violations of particular individuals' privacy but patterns of differential treatment that disadvantage entire categories of people.

5.8.2 What Each Framework Contributes

Framework Key Contribution
Foucault (panopticism) How visibility produces self-discipline; how power is diffuse and productive; the normalizing gaze
Foucault (power/knowledge) Why surveillance is inseparable from knowledge production; why the spiral tends to expand
Giddens Why the modern nation-state requires surveillance; the ambivalence of administrative capacity
Lyon The surveillance society as a totalizing social formation; social sorting as primary surveillance harm
Zuboff The economic logic of surveillance capitalism; instrumentarian power as behavioral modification
Feminist surveillance studies The gendered experience of surveillance; the male gaze's structural asymmetry; domestic surveillance as coercive control
Browne / critical race theory Racializing surveillance; the historical continuity of Black surveillance from slavery to biometrics; dark sousveillance

5.8.3 What the Synthesis Does Not Resolve

A theoretically honest synthesis acknowledges unresolved tensions:

Agency vs. structure: Foucault's framework sometimes implies that subjects are wholly constituted by surveillance; this underestimates agency and resistance. Critical race theory and feminist theory insist on the possibility of counter-surveillance and refusal. These emphases are in tension with each other.

Universalism vs. particularity: Lyon's surveillance society thesis speaks of surveillance in broadly universal terms; Browne and feminist scholars insist that surveillance experiences are profoundly particular — shaped by race, gender, class, and other axes of difference. Both claims are correct, and holding them simultaneously is analytically demanding.

Reform vs. abolition: Some frameworks imply that surveillance can be made acceptable through regulation and accountability; others imply that surveillance is so structurally tied to power and inequality that its institutional forms require more fundamental challenge. This is not primarily a theoretical question but a political one — and one that runs through the final chapters of this book.


5.9 Thought Experiment: Building Jordan's Profile

🧠 Thought Experiment: The Watchers' View

You have access to every data system that currently has information about Jordan Ellis. Construct Jordan's surveillance profile from the following sources:

  • University enrollment record: name, date of birth, Social Security number, major, GPA, enrollment status, financial aid status
  • Warehouse employer: badge entry/exit times, scan rates, time-off-task records, supervisor notes
  • Banking system: account balances, transaction history, paycheck deposits, ATM usage location history
  • Social media: posts, likes, follows, viewing time per post, friend network, location tags
  • Smartphone carrier: call records, text metadata (not content), location data (GPS pings every few minutes)
  • University LMS: login times, page views, assignment submission timestamps, quiz attempt patterns
  • Transit authority: card tap records showing all transit trips for the past year
  • Credit bureau: credit score, loan applications, payment history
  • Medical insurance: claims history, prescription records
  • Google: search history, YouTube viewing history, Gmail metadata

Questions:

  1. What does this profile tell you about Jordan that Jordan might not consciously know about themselves?

  2. What inferences could an algorithm draw about Jordan's future behavior, health, political views, relationship status, or financial trajectory from this data?

  3. Who, in the current legal and commercial landscape, actually has access to which parts of this profile?

  4. What would Jordan need to do to prevent this profile from being assembled? Is it practically possible?

  5. Which theoretical framework — Foucault, Lyon, Zuboff, feminist surveillance studies, Browne — is most useful for analyzing the specific harms this profile's existence creates?


5.10 Research Study Breakdown: Measuring Surveillance Anxiety

📊 Research Study Breakdown

Study: Raber, Deborah, and Tara Broeske. "Surveillance Anxiety Among Graduate Students." Reference & User Services Quarterly 58, no. 1 (2018): 24–35.

Research Question: Do graduate students modify their research behavior because of concerns about surveillance of their academic information-seeking?

Method: Survey of 285 graduate students at a large U.S. research university, examining attitudes toward library and internet privacy, awareness of surveillance, and reported behavioral modification in response to surveillance awareness.

Key Findings: - A substantial minority of students reported avoiding certain topics in their library research and internet searching due to privacy concerns - Students in certain fields (political science, Middle Eastern studies, public health) reported higher surveillance anxiety than those in other disciplines - First-generation college students and international students reported significantly higher surveillance anxiety than domestic continuing-generation students - Higher surveillance anxiety was associated with reduced use of certain research resources

Significance: This study demonstrates that surveillance anxiety — and the associated chilling effect — is not equally distributed across student populations. First-generation college students (like Jordan Ellis) and international students face greater surveillance anxiety that translates into reduced academic resource use. This equity dimension of the chilling effect is undertheorized in the standard privacy literature.

Connection to Chapter 5: The finding that surveillance anxiety is unequally distributed by social position confirms the critical race and feminist critique of frameworks that treat the chilling effect as a universal, undifferentiated phenomenon. The harm of surveillance chilling falls most heavily on those who are already most vulnerable to the consequences of being watched.


5.11 Jordan's Theoretical Toolkit

Jordan Ellis began this book with a vague discomfort they could not name. By the end of Part 1, they have a vocabulary, a history, and a theoretical framework.

They know what surveillance is (Lyon's definition). They know how it works psychologically (Foucault's panopticism). They know how old it is (Chapter 3's historical survey). They know where their warehouse job's monitoring system comes from (Chapter 4's industrial genealogy). And they know the frameworks for understanding why it's not a neutral technical fact but a social arrangement serving interests (Foucault's power/knowledge, Giddens' state, Lyon's sorting, Zuboff's capitalism, feminist theory's gendered gaze, Browne's racializing surveillance).

Jordan's discomfort was appropriate. It was an intuition of structure — the feeling that something was being done to them, systematically, by something larger than any individual watcher.

Theory doesn't make that feeling go away. But it gives Jordan something to do with it.


5.12 What's Next

Part 1 is now complete. The five chapters have established the foundations on which everything else in this book rests:

  • What surveillance is and why it matters (Chapter 1)
  • How panoptic visibility becomes self-discipline (Chapter 2)
  • How surveillance reaches back through all of human history (Chapter 3)
  • How the industrial revolution created workplace surveillance's direct ancestors (Chapter 4)
  • What theoretical frameworks explain surveillance's operation (Chapter 5)

Part 2 turns to the state — the most powerful surveillance actor, with the unique capacity to deprive persons of liberty. The next five chapters examine signals intelligence, border surveillance, biometric databases, predictive policing, and national security surveillance through the lens of democratic accountability, civil liberties, and the historical patterns Part 1 has established.

The theoretical tools you have now will be essential. But the subjects will be new — and often disturbing.


Chapter 5 of 40 | Part 1: Foundations of Surveillance | The Architecture of Surveillance