Chapter 10 Further Reading: Authoritarianism and Total Surveillance
1. Darren Byler. In the Camps: China's High-Tech Penal Colony. Columbia Global Reports, 2022.
The most accessible and rigorous scholarly account of the Xinjiang detention system, written by an anthropologist who spent years researching Uyghur society and has extensively interviewed former detainees and their family members. Byler situates the surveillance-to-detention pipeline within broader questions of colonial governance and ethnic minority policy in China. He draws on extensive first-hand testimony to describe the daily experience of the surveillance architecture from within — the checkpoint encounters, the mandatory app installations, the detention experiences. Essential for understanding the human reality of the technical systems described in the chapter.
2. Darren Byler. Terror Capitalism: Uyghur Dispossession and Masculinity in a Chinese City. Duke University Press, 2022.
Byler's longer academic work examines the political economy of Xinjiang surveillance — how the "security" industry built around Uyghur surveillance has become an economic sector with its own dynamics, how the construction of Uyghurs as threats produces material interests in maintaining that construction, and how the surveillance apparatus intersects with other forms of state intervention in Uyghur social life. More theoretical and historically situated than In the Camps; essential for graduate-level engagement with the structural analysis of authoritarian surveillance.
3. Steven Feldstein. The Rise of Digital Repression: How Technology Is Reshaping Power, Politics, and Resistance. Oxford University Press, 2021.
The expanded book-length version of Feldstein's Carnegie Endowment report on AI surveillance export. Feldstein examines how digital surveillance technology is reshaping the relationship between states and citizens across regime types, with particular attention to the ways in which commercial surveillance technology enables governments that lack the capacity to build indigenous surveillance systems to acquire sophisticated surveillance capability. Chapters on the surveillance silk road, the specific country cases (Ethiopia, Philippines, Tanzania, etc.), and the implications for democratic accountability are directly relevant to Chapter 10's content.
4. Human Rights Watch. "Eradicating Ideological Viruses": China's Campaign of Repression Against Xinjiang's Muslims. 2018.
A comprehensive documentation report based on interviews with former Xinjiang residents and analysis of government documents, providing one of the most detailed public accounts of the Xinjiang surveillance system before the China Cables leaks provided documentary confirmation. Human Rights Watch has continued to produce Xinjiang-related reporting; all reports are available on the organization's website. Essential for the evidentiary foundation of the Xinjiang case study.
5. International Consortium of Investigative Journalists. "The China Cables." November 2019.
The publication of classified Chinese government documents describing the operational management of Xinjiang detention facilities, including the operations manual excerpted in the chapter. The full document set and accompanying analysis are available on the ICIJ website. Essential primary source documentation for any serious engagement with the Xinjiang case. Read the operations manual alongside ICIJ's analytical summaries for context about how the documents were obtained and verified.
6. Forbidden Stories and Amnesty International. "The Pegasus Project." 2021.
The investigative journalism project that revealed global use of NSO Group's Pegasus spyware, including its use in Hungary against journalists and political figures. Forbidden Stories has published extensive documentation of individual cases, methodology, and implications. Amnesty's Security Lab has published technical documentation of how Pegasus infections were forensically detected. The full body of Pegasus Project reporting — available across participating news organizations including Le Monde, The Guardian, Die Zeit, and others — provides the most comprehensive public account of how commercial spyware is used for political surveillance.
7. Anna Grzymala-Busse. "Democratic Backsliding and the Rule of Law." Governance 32, no. 4 (2019): 657–669.
A political science analysis of how democratic backsliding occurs through legal means — the use of formal democratic institutions and processes to progressively weaken the institutional capacity for democratic governance. Grzymala-Busse's analysis provides the theoretical framework for understanding Hungary's trajectory and the "infrastructure problem" described in Chapter 10. Essential reading for anyone who wants to understand the mechanism of democratic backsliding rather than simply observing its symptoms.
8. Maya Wang. "China's Techno-Authoritarianism Has Gone Global." Foreign Affairs, April 8, 2021.
A policy-oriented analysis of China's export of surveillance technology and the governance challenges this creates. Wang, a researcher at Human Rights Watch, provides an accessible analysis of what the "surveillance silk road" means for recipient countries, what the evidence shows about whether Chinese technology enables authoritarian surveillance in those contexts, and what democratic governments can and should do in response. A useful counterpart to Feldstein's more academically oriented treatment.
9. Shoshana Zuboff. The Age of Surveillance Capitalism. PublicAffairs, 2019. (Specifically Chapter 19: "The Totalitarian Threat.")
Zuboff's treatment of what she calls the "totalitarian threat" — the convergence of behavioral modification technologies developed by commercial surveillance capitalism with state surveillance capacity — provides a theoretical framework for understanding the relationship between commercial and state authoritarian surveillance. While the bulk of the book is about commercial surveillance (relevant to Part 3), Chapter 19's analysis of how surveillance capitalism's "instrumentation power" relates to political authoritarianism is directly relevant to Chapter 10's content.
10. The Economist Intelligence Unit. Democracy Index (Annual publication).
The EIU's annual Democracy Index classifies countries across five dimensions (electoral process and pluralism, government functioning, political participation, political culture, and civil liberties) and tracks trends in democratic quality over time. For Chapter 10's material, the index provides a regularly updated framework for assessing where countries fall on the spectrum from full democracy to authoritarian regime — including Hungary (classified as a "flawed democracy" in recent years) and the trajectory of countries experiencing democratic backsliding. Available on The Economist's website; the methodology section is valuable for understanding how democratic quality is measured.
11. Australian Strategic Policy Institute. "Uyghurs for Sale." (Various ASPI reports, 2020–2023.)
ASPI has produced a series of reports on different dimensions of Xinjiang surveillance and suppression, including satellite imagery analysis of facility construction, supply chain analysis connecting Western companies to Xinjiang surveillance technology, and documentation of forced labor systems connected to the broader Xinjiang security apparatus. ASPI's China Defence Universities Tracker and Xinjiang Data Project provide ongoing data resources. Available on ASPI's website.
12. Freedom House. Freedom on the Net (Annual publication).
Freedom House's annual assessment of internet freedom across approximately 70 countries, with detailed country reports assessing obstacles to access, limits on content, and violations of user rights (including surveillance-related violations). The Freedom on the Net reports provide systematic cross-country data on how surveillance practices — including China's, Russia's, and those of other countries — affect internet freedom. Particularly valuable for tracking trends over time and for comparing surveillance environments across regime types. Available free on Freedom House's website.
Chapter 10 Further Reading | Part 2: State Surveillance | The Architecture of Surveillance