Chapter 33 Quiz: Art and Activism Against Surveillance
1. Trevor Paglen's "Limit Telephotography" series photographs classified military bases from the maximum legal distance. What is the primary critical argument his photographs make?
a) That classified military operations are illegal and should be exposed b) That the infrastructure of state surveillance is physically real and can be documented — making the abstract apparatus of surveillance concrete and visible c) That photography is superior to legal action as a counter-surveillance strategy d) That military facilities violate zoning laws by being located near civilian areas
Answer: b — Paglen's photographs make visible the material infrastructure of surveillance — buildings, facilities, satellites — that most people know only abstractly. The political argument is about accountability: democratic publics should be able to see, at least representationally, what is built and operated in their name.
2. Hito Steyerl's "How Not to Be Seen" includes methods of becoming invisible such as "be a woman over 50." What is the political point of this method?
a) Older women have more privacy rights than other demographic groups b) The invisibility of marginalization — being unrepresented, uncounted, unvalued — is a form of "not being seen" that parallels surveillance evasion c) Facial recognition algorithms are specifically calibrated to ignore older women d) Older women were statistically underrepresented in early surveillance datasets
Answer: b — Steyerl's piece works through irony and juxtaposition. The "method" of being a woman over 50 makes the point that social invisibility (being ignored, underrepresented, dismissed) is a form of escaping surveillance that is available to marginalized groups — but at the cost of social power and recognition. The piece explores the intersection of visibility, power, and surveillance.
3. Adam Harvey's CV Dazzle project uses patterns derived from:
a) Traditional war paint patterns from indigenous cultures b) Military dazzle camouflage applied to naval vessels in WWI, repurposed for defeating facial recognition algorithms c) Abstract expressionist painting, chosen for its disruptive visual qualities d) Machine learning-generated patterns that algorithms are trained to avoid
Answer: b — Harvey explicitly references World War I "dazzle" camouflage — the disruptive stripe patterns applied to ships not to make them invisible but to make their speed and direction difficult to assess through submarine periscopes. The application of a military concept to the civilian face makes a political point about the militarization of facial surveillance.
4. The Surveillance Camera Players addressed their performances to:
a) Passers-by on the street, who were the real audience for their political message b) The surveillance cameras themselves — and whoever might be watching through them — by performing directly in front of specific cameras c) Police officers they expected to confront them during performances d) Media journalists who covered their performances as news events
Answer: b — The SCP's defining characteristic was that performances were addressed to the camera. This acknowledgment of the camera's presence as audience turned the observation relationship around — from camera watching people to people performing for camera — and made the surveillance apparatus visible and strange.
5. What does sousveillance mean, and which artist or activist practice best exemplifies it?
a) Surveillance by government of private individuals; best exemplified by NSA mass surveillance programs b) Watching from below — turning the surveillance gaze upward toward power; exemplified by legal observers documenting police, or Steve Mann's practice of recording interactions with surveillance personnel c) Counter-surveillance through underground networks; exemplified by Tor and the dark web d) Visual surveillance of public officials; exemplified by Banksy's CCTV commentary
Answer: b — "Sousveillance" was coined by Steve Mann to describe the practice of reciprocal observation — subjects watching those who watch them. Legal observers documenting police behavior, activists photographing surveillance cameras, and the "Nothing to Hide" art project (compiling public data on surveillance advocates) all exemplify sousveillance.
6. Citizen Lab's research methodology is best described as:
a) Legal advocacy challenging surveillance programs through courts b) Technical forensic investigation — analyzing malware, tracing infrastructure, identifying operators — to document commercial spyware use against civil society c) Public opinion research assessing public attitudes toward government surveillance d) Policy analysis comparing surveillance regulations across countries
Answer: b — Citizen Lab conducts technical investigations: examining malware samples, analyzing their code, identifying command-and-control servers, tracing infrastructure, and drawing conclusions about likely operators based on technical evidence and target profiles. This is counter-surveillance through technical research and disclosure.
7. The Electronic Frontier Foundation's "Who Has Your Back" report evaluates tech companies on what basis?
a) The strength of the encryption they use to protect user data b) Their policies for protecting user data from government access — whether they require warrants, notify users, publish transparency reports, etc. c) The comprehensiveness of their data collection practices and privacy policies d) Their track record on paying GDPR fines and complying with data protection regulations
Answer: b — "Who Has Your Back" specifically evaluates company behavior toward government data requests: Do they require warrants? Do they notify users when their data is sought? Do they publish transparency reports? Do they fight overbroad requests? This gives users and advocates a way to assess which companies treat user privacy as something to defend rather than surrender.
8. The Stop LAPD Spying Coalition's primary strategy was:
a) Legal litigation challenging the LAPD's surveillance programs in federal court b) Online campaigns generating constituent pressure on the Los Angeles City Council c) Community-based data analysis of LAPD surveillance data obtained through public records requests, combined with policy advocacy and public education d) Technical counter-surveillance training for community members to protect themselves from LAPD surveillance
Answer: c — The coalition's signature approach was using the LAPD's own data — obtained through public records requests — to document racial and political disparities in surveillance programs. This community-based data analysis was combined with policy advocacy and public education, grounding abstract surveillance concerns in specific, documented evidence about who was targeted.
9. When Banksy painted "One Nation Under CCTV" in London (2008), what made the placement of the mural politically significant?
a) It was installed without permission on government property b) The mural was painted adjacent to a real CCTV camera, making the surveillance commentary literal by situating it within the actual surveillance environment c) Westminster Council's removal of the piece gave Banksy the media attention he sought d) The mural was placed in a neighborhood with no CCTV, illustrating the uneven geography of surveillance
Answer: b — The political significance of Banksy's CCTV pieces comes from installation in surveilled spaces — the mural about surveillance was watched by a surveillance camera. This site-specificity transforms a commentary about surveillance into an element of the surveillance environment itself.
10. Paolo Cirio's "Nothing to Hide" project compiled profiles of surveillance advocates using public data about them. The project made its argument through:
a) Abstract philosophical argument in an exhibition catalog about surveillance advocates' inconsistency b) Consistent application of the principle being advocated — if surveillance is harmless, surveillance advocates should have no objection to being surveilled themselves c) Showing that surveillance advocates had personal secrets that made them hypocritical d) Legal challenge to the public figure status of surveillance advocates
Answer: b — The project's argument is through action, not argument: it applies the "nothing to hide" principle consistently to the people who articulate it. If you genuinely believe that people who have nothing to hide have nothing to fear, then your objection to having your own data compiled and published reveals that the principle is not one you actually hold.
11. Legal observers at protests function as counter-surveillance through:
a) Providing encrypted communication channels for protest organizers b) Documenting police behavior — presence and observation functioning as deterrent and as evidentiary record c) Offering legal advice to participants during the demonstration d) Identifying undercover police officers embedded in demonstrations
Answer: b — Legal observers observe and document without intervening. Their presence functions as a deterrent (police behavior often changes when it is visibly documented) and creates an evidentiary record useful in later legal proceedings. They do not offer legal advice during events; they are witnesses, not advocates.
12. Hito Steyerl's concept of the "poor image" refers to:
a) Surveillance imagery of poor communities, which tends to be lower quality due to cheaper camera systems b) Low-resolution, degraded images that circulate widely through digital reproduction — a contrast to the high-resolution surveillance imagery available to powerful actors c) Images of poverty used by surveillance systems to identify economic risk d) Historical photographs of surveillance that lack the resolution to be useful as evidence
Answer: b — Steyerl's "poor images" are images that have been degraded through digital reproduction — JPEG artifacts, low resolution, pixelation. She contrasts these with the high-resolution surveillance imagery available to military and intelligence agencies. The gap in image quality reflects a gap in power: high-resolution surveillance is the privilege of those who control it; degraded images characterize what ordinary people can access and circulate.
13. The HyperFace counter-measure developed by Adam Harvey differs from CV Dazzle in what way?
a) HyperFace works against newer algorithms while CV Dazzle only defeated older systems b) HyperFace generates false positives by creating patterns that look like many faces to algorithms, rather than patterns that prevent face detection c) HyperFace is designed for clothing rather than face makeup, covering a larger area d) HyperFace works through infrared disruption while CV Dazzle works through visible light patterns
Answer: b — CV Dazzle aims to prevent face detection — making the face invisible to the algorithm. HyperFace takes an obfuscation approach: patterns that look like many faces at once flood the system with false positives, making it impossible to identify the real face among the noise. These correspond to different counter-surveillance strategies (avoidance vs. obfuscation).
14. Which of the following best describes what Access Now's Digital Security Helpline does?
a) It provides legal representation for people whose privacy rights have been violated b) It provides direct technical assistance to journalists, activists, and human rights defenders facing targeted surveillance c) It conducts public opinion research on attitudes toward digital surveillance d) It advises governments on best practices for lawful surveillance
Answer: b — Access Now's Helpline is an operational service: when journalists, activists, or human rights defenders believe they are being targeted with surveillance, the Helpline provides direct technical help — forensic analysis of devices, advice on secure communication, and connection to specialist resources. This is counter-surveillance as a direct service, not just research or advocacy.
15. The ACLU's litigation in ACLU v. Clapper challenged:
a) The FBI's use of facial recognition in criminal investigations b) The NSA's bulk collection of telephone metadata after the Snowden revelations c) The use of CCTV cameras in public housing developments d) CBP's warrantless searches of travelers' electronic devices at the border
Answer: b — ACLU v. Clapper challenged the NSA bulk telephone metadata collection program revealed by Snowden. The Second Circuit Court of Appeals found in 2015 that the program exceeded what FISA authorized — a significant legal victory that contributed to the passage of the USA FREEDOM Act, which curtailed but did not eliminate bulk collection.
16. Jordan's decision to pursue legal observer training represents which transition in their arc?
a) From concern to resignation — understanding surveillance well enough to know resistance is futile b) From passive awareness to active agency — choosing to participate in a form of counter-surveillance practice c) From individual action to collective theory — moving from personal privacy tools to structural analysis d) From student to teacher — preparing to lead Dr. Osei's class in a future semester
Answer: b — Jordan's legal observer interest marks the turn from understanding surveillance to acting against it — the movement from student to participant. Legal observing is specifically appropriate for Jordan's position: it doesn't require the technical expertise of encryption advocacy or the legal expertise of litigation, but it provides meaningful counter-surveillance practice and connects Jordan to a community of people who take surveillance seriously as a political problem.
Score interpretation: 14-16 correct — Excellent mastery of art, activism, and organizational landscape | 11-13 — Good understanding with some gaps | 8-10 — Review sections 33.2–33.9 | Below 8 — Revisit the full chapter