Part 2: State Surveillance — The Most Powerful Watcher


The Watcher with the Keys to Everything

Imagine that every form of surveillance you might encounter in daily life — the camera in the corner store, the ring doorbell across the street, the algorithm sorting your social media feed, the employer monitoring your keystrokes — had behind it not just a manager or a tech company, but the power to arrest you. The power to bar you from leaving the country. The power to revoke your permission to work. The power to detain you without trial, under a legal framework that your own government has constructed specifically to foreclose the usual challenges.

That is what makes state surveillance categorically different from every other form of monitoring examined in this book.

Corporations watch to sell. Employers watch to manage. Neighbors watch from curiosity or anxiety. The state watches with all of these motives and one that none of the others possess: the power to deploy organized legal violence against those it has monitored and deemed threatening. The surveillance capabilities that corporations and individuals can marshal are significant and growing. But they lack the one element that makes the state's surveillance uniquely consequential: the coercive power to act on what it sees.

This is why Part 2 — examining state surveillance — demands its own sustained attention before we move to the commercial surveillance landscape of Part 3 or the intimate surveillance of Part 4. The state sets the legal framework within which all other surveillance occurs. It defines what can be collected by private actors, what it has access to when it demands it, and what consequences flow from what is found. The state is not simply one surveillance actor among many — it is the actor that authorizes, regulates, and ultimately monopolizes the legitimate use of the surveillance gaze's most consequential expressions.


What "State Surveillance" Encompasses

State surveillance is not a single system. Part 2 traces it across five distinct but deeply interconnected domains.

Chapter 6 begins at the national security state's interior: the surveillance apparatus that a democracy builds to watch its own citizens in the name of protecting them. The FBI's COINTELPRO programs — which watched, harassed, blackmailed, and sought to destroy the civil rights movement — are not an aberration in American surveillance history. They are the clearest expression of a logic that has persisted, in modified form, through every subsequent era. The Snowden revelations of 2013 revealed a surveillance apparatus — PRISM, XKeyscore, MUSCULAR, bulk metadata collection — that exceeded even the Church Committee's most concerned projections. Jordan Ellis, whose uncle was surveilled for welfare rights organizing, understands this not as history but as family reality.

Chapter 7 moves to the border — the state's most concentrated surveillance chokepoint, where constitutional protections are diminished, biometric collection is mandatory, and predictive algorithms assess travelers before they arrive. The border is where the state's power to define who belongs, and what information can be extracted from everyone who seeks entry, is most nakedly expressed. Biometric databases — IDENT, NGI, Eurodac — give physical form to what Chapter 3's colonial census began: the comprehensive identification of populations for purposes of control.

Chapter 8 extends surveillance into the city itself — the distributed network of closed-circuit cameras, license plate readers, and increasingly integrated urban sensing systems through which the state and its private partners watch everyone who moves through public space. The United Kingdom pioneered this architecture and remains its most extreme democratic expression. American cities have built their own versions, integrating private camera networks, predictive analytics, and gunshot detection into surveillance systems no democratic process ever authorized as a whole. Jordan counts cameras on the walk to class. The count exceeds thirty before reaching the building.

Chapter 9 zooms out to the global scale — the Five Eyes intelligence alliance, the fiber-optic cable taps that capture global internet traffic, and the "collect it all" philosophy that drives mass interception programs. The GCHQ's TEMPORA program buffered approximately 21 petabytes of internet data daily from hundreds of cables. The NSA's collection programs swept in the communications of hundreds of millions of people without individualized suspicion. The Snowden revelations named these programs and made their existence undeniable. What changed afterward was less than the revelations seemed to demand.

Chapter 10 confronts the question of where democratic state surveillance ends and authoritarian surveillance begins — and whether the line is as stable as democratic citizens tend to assume. China's Social Credit System, accurately described, is considerably more complex and fragmented than Western media typically portrays — but the surveillance architecture that underlies it, including the camera networks of SkyNet and Sharp Eyes, is extraordinary in its scope. The surveillance deployed against the Uyghur population in Xinjiang is something categorically beyond the Social Credit System: a comprehensive architecture of total management of an ethnic population, combining biometric data collection, algorithmic risk scoring, physical checkpoint systems, mandatory phone applications, and mass arbitrary detention. The Hungary case demonstrates that authoritarian surveillance is not only an external threat — it can emerge within a formally democratic state through democratic backsliding that weaponizes existing surveillance infrastructure against the political opposition.


Why the State's Surveillance Is Different in Kind

Three features distinguish state surveillance from all other forms examined in this book:

Coercive power. The state can arrest, detain, deport, revoke licenses, bar employment, and ultimately imprison. No other surveillance actor has this capacity. When a corporation's surveillance reveals information that damages someone, the consequences flow through market mechanisms (denial of credit, higher prices), social mechanisms (reputational damage), or contractual mechanisms (termination of service). The state's surveillance consequences can include loss of liberty.

Legal authority over others. The state defines what other actors can surveil, what information they must retain and provide upon request, and what legal consequences attach to surveillance-revealed information. Commercial surveillance exists within a legal framework that the state creates and can reshape at will. The state's surveillance is both independent and constitutive of all other surveillance.

Democratic accountability — in principle. The surveillance of corporations, employers, and private individuals is accountable to contract and tort law, but not to democratic processes. The state's surveillance is, in principle, accountable to democratic deliberation — to the citizens in whose name and for whose protection it is conducted. Part 2's most important finding may be how consistently and systematically this accountability has failed: programs authorized in secret, justified through legal interpretations that are themselves classified, overseen by courts that approve nearly all applications, and revealed only when insiders were willing to accept criminal prosecution to make what they knew public.


Visibility Asymmetry at Its Maximum

The recurring theme of visibility asymmetry — the differential between what the watcher knows and what the watched knows — reaches its maximum expression in state surveillance. The NSA buffered global internet traffic without public knowledge. COINTELPRO surveilled civil rights leaders without their knowledge. The FISA Court authorized surveillance under legal interpretations that were themselves classified. The risk score generated by the Automated Targeting System is invisible to the traveler it scores. The IJOP flag that marks a Uyghur for police attention is invisible to the person flagged.

In state surveillance, the asymmetry is not merely informational — it is backed by coercive power. The state knows; the watched does not. The state can act; the watched cannot effectively resist. This is the structure that Part 2 seeks to make visible — to give the watched at least the knowledge of what they are watched by, if not the power to watch back.


An Invitation to the Chapters Ahead

The five chapters of Part 2 move from the intimate (the FBI's war on specific political organizers, Jordan's uncle's FOIA file) to the structural (mass interception programs buffering the global internet) to the comparative (what authoritarian surveillance reveals about the logic underlying all state surveillance). They are connected by the recurring cast of characters — Jordan's curiosity sharpened chapter by chapter, Dr. Osei's patient insistence that each system be understood in its full historical and structural context, Marcus's "nothing to hide" challenge answered and re-answered, Yara's activist's demand that understanding lead somewhere.

The state's surveillance is the most consequential surveillance there is. It deserves — and receives, in the chapters ahead — the most sustained and searching examination.


Part 2: State Surveillance | The Architecture of Surveillance

Chapters in This Part