Part 4: Domestic and Personal Surveillance
The Castle Has No Walls
There is a legal maxim, nearly four centuries old, that a man's home is his castle. The metaphor has done significant work in Western legal tradition — encoding the principle that the domestic sphere is categorically distinct from public space, that what happens inside the home is presumptively private, and that the state must clear an extraordinary threshold before it may intrude.
The metaphor has never been fully true. Homes have always been penetrated by surveillance — by neighbors who could hear through thin walls, by landlords with keys, by religious institutions that claimed moral jurisdiction over domestic life, by employers and creditors whose power extended into private space. Women confined to the domestic sphere knew that "home as castle" was a description of power for those who held it, not freedom for everyone who lived there.
But something has changed. The change is not in the intent to surveil the domestic sphere — that has been present throughout history — but in the ease and comprehensiveness with which it can now be done. The walls of the castle have become porous in ways that have no historical precedent.
Part 4 of this textbook examines surveillance where it is most intimate: in the home, in relationships, in pockets, and in bodies. It argues that the "private" sphere is no longer usefully described as private — not because privacy has been abolished, but because the architecture of surveillance has been rebuilt around the most personal dimensions of human life.
What This Part Covers
Chapter 16 opens at the threshold of the home — the front door, the driveway, the street in front of the house — with Ring doorbells and the neighborhood surveillance networks they enable. Ring represents a new form of surveillance infrastructure: not built by government decree or corporate mandate but assembled from millions of individual consumer choices, each made with benign intent, each contributing to a collective watching apparatus denser than most municipal CCTV systems. The Neighbors app turns neighborhood watches into crowdsourced racial profiling platforms. Ring's law enforcement partnerships blur the boundary between private devices and public enforcement. The chapter examines who watches, who gets watched, and what the answers reveal about surveillance power in the contemporary United States.
Chapter 17 moves inside, examining the home's interior as a newly surveilled space. Baby monitors — the devices parents trust most — carry security vulnerabilities that expose sleeping infants to surveillance by strangers. Nanny cams operate without workers' knowledge in a legal patchwork that leaves domestic workers deeply unprotected. Smart home hubs aggregate comprehensive behavioral intelligence about household life and transmit it to corporate and, potentially, governmental infrastructure. Landlords use smart building systems to monitor tenant movements in ways that lease agreements rarely disclose. The chapter's central argument is that the costs of domestic surveillance fall disproportionately on those who are already most vulnerable: renters, domestic workers, survivors of intimate partner violence.
Chapter 18 delivers on a promise made in Chapter 1. "One Tuesday in Jordan's Life" maps, in granular detail, every surveillance system that logged Jordan's movements, communications, and behaviors over a single ordinary day — 340 location pings, biometric timeclocks, transit card records, employer security cameras, Ring footage, Google search history, Uber ride data. The exercise demonstrates what location data, metadata, digital exhaust, and app permissions reveal collectively about a single person's life. Location data brokers, geofence warrants, cell tower dumps, and the accelerometer's gait fingerprinting complete the picture. Jordan downloads their Google Takeout archive and confronts, concretely, what seven years of location history and a million searches actually look like.
Chapter 19 examines the most intimate dimension of digital surveillance: when the watcher is not a corporation or government but a partner, a parent, or an ex. Stalkerware — commercial software installed without consent to monitor intimate partners — is prevalent, deliberately invisible, and connected to patterns of coercive control that affect millions of people. The Coalition Against Stalkerware has built the most effective current response, but technical detection cannot substitute for safety planning and survivor support. Parental monitoring apps range from minimally invasive to comprehensively surveillance-oriented; the Life360 investigation reveals how family safety products connect to commercial data extraction. The chapter provides a framework for evaluating where relationship surveillance falls on the spectrum from safety to control.
Chapter 20 concludes Part 4 by turning the surveillance gaze inward — examining the Quantified Self movement and what happens when monitoring is something we do to ourselves. The therapeutic appeal of self-tracking is real, and the chapter acknowledges it. But the Foucauldian analysis of technologies of the self, the data labor critique of "free" health apps, the structure of employer wellness programs that make "voluntary" data sharing economically coercive, and the Strava heat map's demonstration that individual self-tracking data aggregates into collective surveillance infrastructure — all complicate the empowerment narrative. Jordan, at the chapter's end, reads a 4,200-word wellness program privacy policy and understands that comprehension and compliance are not the same thing.
The Part's Argument
Part 4 makes a single overarching argument: the "private" sphere has never been more porous, and the porousness is not accidental. It is produced by commercial incentive structures that make surveillance profitable, by legal frameworks that have not kept pace with surveillance technology, by power asymmetries that concentrate surveillance costs on those with the least power to contest them, and by the normalization of monitoring as a feature of consumer culture and responsible adult behavior.
None of the surveillance examined in this part is invisible. Jordan can see the Ring camera across the street. They can feel the Fitbit on their wrist. They can read the lease that mentions "electronic access systems." What has been invisible — and what Part 4 is designed to make visible — is the architecture that connects these individual technologies into something much larger than the sum of its parts.
The personal is, in the end, not less political for being personal. It is perhaps more so.
Chapters in This Part
- Chapter 16: Ring Doorbells and the Privatization of Public Watching
- Chapter 17: Baby Monitors, Nanny Cams, and the Surveilled Home
- Chapter 18: Smartphone Surveillance: Location Data and Digital Exhaust
- Chapter 19: Relationship Surveillance: Stalkerware, Parental Controls, and Trust
- Chapter 20: Self-Surveillance: The Quantified Self and Voluntary Monitoring