Chapter 10 Quiz: Authoritarianism and Total Surveillance

15 questions — Multiple Choice and Short Answer Estimated time: 25–35 minutes


Part A — Multiple Choice (10 questions)

Question 1

The chapter identifies four defining features of authoritarian surveillance. Which of the following is NOT one of those four features?

A) Absence of meaningful legal constraint on surveillance B) Use of surveillance for political control rather than only crime control C) More technically advanced surveillance technology than democratic states D) Monopolization of the surveillance gaze, including suppression of counter-surveillance

Correct answer: C Rationale: The chapter explicitly argues that the distinction between democratic and authoritarian surveillance is not primarily technological — the tools are often similar or identical. The four defining features are: absence of meaningful legal constraint, absence of political accountability, use of surveillance for political control, and monopolization of the gaze.


Question 2

China's Social Credit System, as accurately described in the chapter, is best characterized as:

A) A single unified government scoring system assigning all citizens a numerical score from 0–1000 B) A collection of distinct programs including business credit, financial credit, judicial blacklists, and local pilot programs C) A system that has been fully operational nationwide since 2020 as originally planned D) A system that primarily monitors online behavior through social media analysis

Correct answer: B Rationale: The chapter explicitly corrects the common media narrative. The Social Credit System is an umbrella term for distinct, fragmented programs with different purposes and scopes — not a single unified scoring system. The planned unified national system described in policy documents was not fully implemented as of the mid-2020s.


Question 3

The IJOP (Integrated Joint Operations Platform) in Xinjiang primarily functions as:

A) A public-facing app that residents use to report suspicious behavior to authorities B) A central data management system aggregating multiple surveillance streams and using algorithmic analysis to flag individuals C) An international database sharing Xinjiang biometric data with allied intelligence agencies D) A social media monitoring platform analyzing online discussions for political dissent

Correct answer: B Rationale: IJOP is the central data aggregation and analysis system for Xinjiang surveillance, integrating camera feeds, checkpoint reports, phone data, financial records, and informant reports, and using algorithms to identify individuals for police attention.


Question 4

Steven Feldstein's 2019 Carnegie Endowment study on AI surveillance export found that:

A) Only authoritarian states are deploying AI surveillance technology B) Chinese companies are the sole global suppliers of facial recognition surveillance systems C) 75% of advanced democracies are actively using AI surveillance tools, and Chinese companies supply more countries than any other national-origin supplier D) AI surveillance technology deployment is concentrated in wealthy countries with sufficient technical infrastructure

Correct answer: C Rationale: Feldstein's data showed widespread AI surveillance adoption across regime types — including 75% of advanced democracies — and Chinese companies as the most globally active supplier (63 countries). The study challenged both "authoritarian-only" and "Chinese-only" narratives.


Question 5

North Korea is used as an illustration in this chapter primarily to demonstrate that:

A) Authoritarian surveillance requires sophisticated AI and camera technology to be effective B) Surveillance capacity is a uniquely modern development unavailable to twentieth-century states C) Authoritarian surveillance does not require advanced technology — human informant networks can achieve high surveillance intensity D) Democratic backsliding in developed countries will inevitably produce North Korean-style surveillance

Correct answer: C Rationale: North Korea achieves high surveillance intensity through human networks — the Inminban neighborhood informant system and mandatory political participation — with minimal advanced technology. This demonstrates that surveillance capacity is fundamentally about organizational and institutional architecture, not just technology.


Question 6

The "infrastructure problem" of democratic surveillance refers to:

A) The technical challenge of maintaining surveillance infrastructure across large geographic areas B) The concern that surveillance infrastructure built under democratic constraints can be repurposed by future less-democratic governments C) The inadequate financial infrastructure for funding surveillance at the scale required for effectiveness D) The technical incompatibility between democratic countries' surveillance systems and authoritarian countries'

Correct answer: B Rationale: The "infrastructure problem" describes the risk that surveillance systems built with democratic governance constraints — which could be removed through democratic backsliding — leave behind technical capability that future authoritarian governments could use without those constraints.


Question 7

The "Xinjiang Papers" (China Cables) are significant because they:

A) Provided the first evidence that China was operating surveillance cameras in Xinjiang B) Revealed through leaked internal documents that the Xinjiang "vocational training centers" operate as detention facilities with security protocols inconsistent with voluntary education C) Documented Chinese intelligence sharing Xinjiang biometric data with foreign governments D) Showed that the IJOP system was designed with assistance from Western technology companies

Correct answer: B Rationale: The leaked operational manuals described security protocols including "prevention of escapes" — language inconsistent with the Chinese government's characterization of facilities as voluntary educational centers, providing documentary evidence that the facilities function as detention centers.


Question 8

Russia's SORM system is described in the chapter as:

A) A Chinese-designed surveillance technology adopted by Russia as part of a bilateral intelligence agreement B) A Russian law requiring telecommunications companies to install FSB-accessible interception equipment — broader than democratic equivalents and implemented without meaningful judicial oversight C) A social credit system modeled on China's but focused on political loyalty rather than financial trustworthiness D) A targeted surveillance program specifically for monitoring foreign diplomatic communications

Correct answer: B Rationale: SORM (System for Operative Investigative Activities) requires Russian ISPs to install equipment enabling FSB real-time access to all communications traffic, going beyond what most democracies require and implemented without the judicial oversight that democratic equivalents typically require.


Question 9

The chapter's six-stage trajectory from democratic to authoritarian surveillance is introduced primarily to illustrate:

A) That all democratic surveillance will inevitably become authoritarian over time B) That there is no meaningful difference between democratic and authoritarian surveillance C) That the transition from democratic to authoritarian surveillance is gradual and lacks a single clear bright line D) That authoritarian surveillance requires a single decisive political event to establish

Correct answer: C Rationale: The thought experiment is designed to show that the transition from democratic to authoritarian surveillance is a spectrum — that stages beyond current democratic practice are conceivable extensions of existing trends, and that identifying the precise crossing point is genuinely difficult.


Question 10

China's SkyNet and Sharp Eyes camera programs are distinguished primarily by:

A) SkyNet focusing on political dissidents and Sharp Eyes on ordinary criminal surveillance B) SkyNet covering urban areas and Sharp Eyes extending surveillance to rural areas C) SkyNet using Chinese-manufactured cameras and Sharp Eyes using cameras from Belt and Road partners D) SkyNet being a classified program and Sharp Eyes being a publicly acknowledged system

Correct answer: B Rationale: Skynet covers urban public spaces in major Chinese cities; Sharp Eyes extends the camera network into rural areas and smaller towns. Together, they provide near-comprehensive camera coverage nationally.


Part B — Short Answer (5 questions)

Each response should be 150–250 words.

Question 11

Explain why the chapter argues that the common western media narrative about China's Social Credit System is inaccurate in ways that are harmful — not just factually wrong but actively damaging to understanding. What specifically does the inaccurate narrative prevent people from recognizing?

Model response elements: - Inaccuracy: the narrative of a unified, comprehensive score governing all aspects of life does not describe the actual fragmented, varied system - Harm 1: prevents understanding of actual Chinese surveillance, which has genuine concerns (Xinjiang, camera network, judicial blacklist) that don't need exaggeration - Harm 2: the mythologized system closely resembles U.S. systems (credit scoring, tenant screening, employment background checks, predictive policing) that Americans accept as normal; if people think the Chinese system is uniquely dystopian, they miss the structural similarities in domestic systems - Harm 3: exaggerated narratives make calibrated policy responses harder — if the Chinese system is as described, any surveillance that doesn't match the narrative seems acceptable by comparison - The chapter's point: accurate understanding serves both critique of Chinese surveillance and recognition of analogous domestic dynamics


Question 12

Describe how the Xinjiang surveillance architecture differs from "ordinary" authoritarian surveillance. What makes it an extreme case, even within the framework of authoritarian surveillance?

Model response elements: - Scale and comprehensiveness: all residents subject to comprehensive biometric data collection, not just persons of interest; mandatory phone apps for the entire Uyghur population - Ethnic/religious specificity: the system is explicitly targeted at a specific ethnic group based on their ethnicity and religious practice, not on any individual conduct - Integration of surveillance with detention: IJOP flags feed directly into a detention system; surveillance and incarceration are integrated rather than the surveillance informing separate criminal proceedings - Pre-crime architecture: the system detects "potential" risks based on associations, patterns, and identities rather than past conduct - Scope of control: movement restrictions (green/yellow/red QR codes), checkpoint infrastructure limiting mobility, monitoring of religious practice — extending beyond ordinary criminal surveillance to managing daily life - UN and international characterization: this combination of features has led to characterizations as crimes against humanity/genocide — beyond the scope of legitimate counterterrorism


Question 13

The chapter describes Turkey as an example of the "infrastructure problem." Explain this example — what happened in Turkey, how surveillance infrastructure built under democratic conditions was repurposed, and what lesson this illustrates.

Model response elements: - Turkey's trajectory: developed surveillance infrastructure during period of EU accession negotiations and democratic reform, including legal wiretapping capability, electronic surveillance, and security databases - The 2016 coup attempt and aftermath: following the coup, Turkish government used emergency powers to dramatically expand surveillance — identifying and detaining coup suspects, surveillance of journalists, monitoring of civil society - The infrastructure problem in action: the surveillance systems built during the earlier democratic period — legal interception capability, database infrastructure, biometric systems — were available to be repurposed for what international observers characterized as politically motivated mass detention - Lesson: democratic constraints on surveillance are attached to governance institutions, not to the technical systems themselves; when governance becomes less democratic, the constraints can be removed while the technical capability remains intact - Implication: the mere existence of democratic legal frameworks does not make surveillance infrastructure safe from authoritarian repurposing


Question 14

The chapter's thought experiment traces a six-stage trajectory from standard democratic surveillance to authoritarian surveillance. Stages 1–3 have occurred in the United States (judicial warrant → FISA → Section 215 bulk collection). Explain why Stage 4 (predictive analytics for pre-emptive intervention) represents a conceptually significant step beyond Stage 3.

Model response elements: - Stages 1–3 move from targeted to mass collection but remain based on past or present conduct — even bulk metadata collection is justified by reference to identifying connections among known suspects - Stage 4 shifts the basis of action from past conduct to predicted future conduct — intervening on the basis of algorithmic assessment of future risk - This represents a reversal of the presumption of innocence: instead of requiring evidence of past wrongdoing before acting, Stage 4 acts on statistical prediction of future wrongdoing - Stage 4 also concentrates the assessment in an algorithm rather than a human or judicial judgment — reducing the ability to challenge the basis for intervention - The connection to Xinjiang: IJOP identifies "pre-crimes" based on behavioral patterns and associations — exactly the Stage 4 logic applied without any democratic constraint - The connection to Chicago: the Strategic Subject List flagged people for police attention based on predicted future risk rather than specific past conduct — Stage 4 in a democratic context


Question 15

The chapter ends by describing the "mirror problem" — examining authoritarian surveillance to see the logic that animates surveillance in democratic contexts. What is this logic? And what separates democratic from authoritarian surveillance according to the chapter's analysis?

Model response elements: - The common logic: classify the population, identify the risky, manage the threat before it manifests — this logic operates from predictive policing in democratic cities to Xinjiang's IJOP - What separates democratic from authoritarian: legal constraints (warrants, FISA, Section 215 limits, however imperfect); political accountability (elections, congressional oversight, however limited); independent judiciary (courts that have sometimes constrained surveillance, however partially); free press (journalists who have exposed programs); civil society (organizations that have litigated against programs) - The chapter's concern: these separating features are institutional and political, not technical — they can be eroded through democratic backsliding; and the technical infrastructure converges even as the political frameworks diverge - Jordan's takeaway: the distance between democratic and authoritarian surveillance is real but not infinite — it requires active maintenance through exactly the institutional features (judicial independence, press freedom, civil society) that democratic backsliding targets first


Chapter 10 Quiz | Part 2: State Surveillance | The Architecture of Surveillance