Chapter 10 Exercises: Authoritarianism and Total Surveillance
Bloom's Level 1 — Remember
Exercise 1.1 — Social Credit System Components
Without consulting the chapter, list the four main components of what is called China's "Social Credit System" as described in the chapter. After completing from memory, check your answers and write a brief correction for any component you misidentified.
Exercise 1.2 — Definitional Inventory
Define each of the following terms in 2–3 sentences using only the chapter's definitions:
- Authoritarian surveillance
- IJOP (Integrated Joint Operations Platform)
- Skynet (surveillance context)
- Sharp Eyes
- Surveillance silk road
- Democratic backsliding
- Infrastructure problem
Exercise 1.3 — Country Matching
Match each authoritarian state to the surveillance feature most associated with it in the chapter:
| Country | Distinctive Feature |
|---|---|
| China (Xinjiang) | A. SORM system requiring ISPs to provide FSB real-time access; targeted political assassination as demonstration effect |
| Russia | B. Inminban neighborhood informant system; surveillance without advanced technology |
| Iran | C. IJOP platform; QR-code app mandated for ethnic minority; biometric checkpoints |
| North Korea | D. Religious compliance surveillance; morality police; facial recognition identification of protesters |
Bloom's Level 2 — Understand
Exercise 2.1 — Correcting the Narrative
The chapter describes common media misrepresentations of China's Social Credit System. In your own words, explain: (a) what the common media narrative says, (b) how the actual system differs from this narrative, and (c) why accurate characterization matters for understanding both Chinese surveillance and surveillance in democratic countries. Write 300–350 words.
Exercise 2.2 — Xinjiang Architecture
Explain how the following components of the Xinjiang surveillance system work together to create what the chapter calls "total management of a specific population":
- Biometric data collection
- IJOP
- Physical checkpoints
- The mandatory phone application (Jingjia)
- The "convenient police stations"
Your explanation should address how each component contributes to the system's overall function and how the components feed into each other.
Exercise 2.3 — Comparative Authoritarianism
Compare Russia and China's approaches to authoritarian surveillance along the following dimensions: (a) the role of human networks vs. technical systems, (b) the emphasis on mass coverage vs. targeted individuals, (c) the relationship between surveillance and visible demonstration of power. Write 250 words.
Bloom's Level 3 — Apply
Exercise 3.1 — Applying the Spectrum
The chapter argues that democratic and authoritarian surveillance describe poles of a spectrum, not binary categories. Apply this concept to the following scenario:
A democratic country, following a series of terrorist attacks, passes emergency legislation that: (a) authorizes bulk collection of all domestic internet metadata; (b) creates a government database of all mosque attendance based on surveillance of mosque parking lots; (c) requires phone companies to report "suspicious" communications patterns to intelligence agencies using an algorithm the government has certified but not publicly disclosed; (d) suspends judicial oversight of surveillance authorizations for the first year of the emergency.
Analyze this scenario: 1. Where on the democratic-authoritarian surveillance spectrum does each specific measure fall? 2. Which of the chapter's four defining features of authoritarian surveillance does each measure exhibit? 3. What makes this scenario "democratic backsliding" rather than simply "democratic surveillance"? 4. What would need to change for this scenario to clearly cross from democratic to authoritarian?
Exercise 3.2 — The Infrastructure Problem
The chapter describes the "infrastructure problem": surveillance infrastructure built under democratic constraints can be repurposed by future less-democratic governments. Apply this concept to a specific current U.S. surveillance system:
Choose one: the NSA's Section 702 collection authority, the CPD's city-wide camera network, or DHS's IDENT biometric database.
For your chosen system, describe: 1. The current democratic constraints governing its use 2. What specific changes in political governance (elections, executive appointments, legislative changes) could remove or weaken those constraints 3. What the system could be used for without the current constraints 4. Whether those potential uses approach the authoritarian end of the spectrum
Write 400 words.
Bloom's Level 4 — Analyze
Exercise 4.1 — Deconstructing the Media Narrative
The chapter argues that inaccurate Western media characterizations of China's Social Credit System harm understanding in two ways: (1) they mischaracterize Chinese surveillance, and (2) they prevent recognition of analogous systems in democratic countries. Analyze the second harm in depth:
Identify three specific systems or practices in the United States that function similarly to the mythologized Chinese Social Credit System — that is, systems that aggregate behavioral data and create consequential scores or classifications that affect people's access to employment, housing, credit, or services.
For each, describe: (a) what the system does, (b) what population it primarily affects, (c) what consequences result from a bad score or classification, and (d) what democratic oversight exists.
Write a 500-word comparative analysis.
Exercise 4.2 — Feldstein's Data
Review the chapter's summary of Steven Feldstein's Carnegie Endowment study. Then analyze:
-
Feldstein found that 75% of advanced democracies are actively using AI surveillance tools. What does this finding tell us about the relationship between democratic governance and AI surveillance adoption?
-
Feldstein found that Chinese companies supply AI surveillance technology to more countries than any other national-origin supplier. What does this tell us, and what does it NOT tell us, about the relationship between Chinese surveillance technology and authoritarian governance in recipient countries?
-
Feldstein's database relies on announced deployments and may underrepresent covert deployments. How does this limitation affect the conclusions you can draw from the data?
Write 400 words.
Exercise 4.3 — Analyzing the Thought Experiment
Review the chapter's six-stage trajectory from democratic to authoritarian surveillance. Analyze:
-
Which stage do you believe represents the clearest crossing of a fundamental democratic line? Justify your choice with reference to the chapter's four defining features of authoritarian surveillance.
-
At what stage do you think the United States is currently located? Provide specific evidence from Chapters 6–10 supporting your assessment.
-
What institutional developments (court decisions, legislation, elections, social movements) could move the United States to a higher or lower stage? What would each require?
Write 500 words.
Bloom's Level 5 — Evaluate
Exercise 5.1 — Evaluating China's Social Credit Justifications
The Chinese government offers several justifications for the Social Credit System components:
- Business credit: "improves market trust and reduces fraud"
- Judicial blacklist: "enforces court judgments that would otherwise go unenforced"
- Xinjiang surveillance: "necessary counterterrorism given specific security threats"
- National system: "creates incentives for prosocial behavior"
Evaluate each justification on its merits. For each: 1. What is the strongest version of the argument? 2. What is the most significant problem with the argument? 3. Are there analogous justifications made in democratic countries for similar surveillance programs?
Write 600–700 words.
Exercise 5.2 — The Surveillance Silk Road: Threat or Exaggeration?
Evaluate the "surveillance silk road" concern — the worry that Chinese surveillance technology exports contribute to authoritarian governance globally.
Present and evaluate two opposing arguments:
Position A: Chinese surveillance technology exports are a genuine geopolitical and human rights concern because they transfer surveillance capability to authoritarian regimes, potentially include Chinese intelligence access through installed systems, and normalize surveillance architectures incompatible with democratic governance.
Position B: The surveillance silk road concern is overblown because all major technology-exporting countries sell surveillance technology, the technology's governance depends on the importing country's political system rather than the technology's origin, and the concern reflects Cold War-style framing that oversimplifies the geopolitics of surveillance.
After presenting both arguments, take a position and defend it. Write 700 words.
Bloom's Level 6 — Create
Exercise 6.1 — Designing Democratic Constraints for Powerful Surveillance
You are advising a government commission on how to design surveillance programs that cannot be easily repurposed by future less-democratic governments. Draft a "Democratic Resilience Framework" for surveillance governance that addresses the infrastructure problem.
Your framework should include: 1. Constitutional-level constraints on surveillance that cannot be overridden by ordinary legislation 2. Institutional design of oversight bodies that makes capture by executive appointees difficult 3. Technical constraints built into surveillance systems that prevent unauthorized use 4. Civil society and press protections that enable surveillance accountability 5. International accountability mechanisms that create external pressure even if domestic oversight fails
Write 800 words. Be honest about what your framework cannot guarantee.
Exercise 6.2 — A Letter from a Uyghur Student
You are writing a work of fiction set in Xinjiang in 2019. Draft a letter — 500 words — that a 22-year-old Uyghur student might write to a friend who has emigrated abroad, describing their daily experience of the surveillance architecture described in the chapter. The letter should be grounded in the specific systems described in the chapter (IJOP, checkpoints, the phone app, the camera network) while portraying the human experience of living within a total surveillance architecture. The letter should not be melodramatic — it should convey the bureaucratic normalcy of intensive surveillance as experienced from within.
Note: This is an imaginative exercise requiring you to enter a perspective very different from your own. Approach it with care and respect for the actual experiences of Uyghurs documented in published testimonies.
Reflection Questions
-
The chapter challenges you to identify when democratic surveillance becomes authoritarian. Where do you personally draw that line? Has reading Chapters 6–10 moved that line for you from where it was before?
-
The chapter notes that the "mythologized" Chinese Social Credit System closely resembles systems that already exist in the United States — credit scoring, background check systems, predictive policing. What does it mean that Americans find the Chinese system disturbing while accepting analogous domestic systems as normal? What explains this asymmetry in perception?
-
The chapter ends by noting that the "logic is the same" across democratic and authoritarian surveillance — classify the population, identify the risky, manage the threat. If the logic is the same, what actually protects democratic citizens from the trajectory toward Xinjiang? Are those protections adequate?
-
China's surveillance export to other countries is documented but its governance effects are disputed. If you were advising a lower-income country considering adopting Huawei's smart city surveillance package as part of Belt and Road development assistance, what questions would you tell them to ask before signing the agreement?
Chapter 10 Exercises | Part 2: State Surveillance | The Architecture of Surveillance