Part 7: Resistance, Ethics, and Futures


The Turn

For six parts, this textbook has examined the architecture of surveillance. We have traced its roots from Bentham's Panopticon and Foucault's analysis of disciplinary power, through the mass interception programs of national security states, to the consumer data economy that monetizes every click and behavioral trace. We have examined surveillance in hospitals and schools, in smart cities and social media platforms, in the workplace and at the border, in history and in the present tense.

We have asked, repeatedly: what does it mean to watch and to be watched? Who has the power to observe, and who bears the cost of being observed? What is preserved, and what is lost, when the architecture of surveillance becomes the architecture of ordinary life?

Part 7 asks a different question: what can be done?

This is not merely a practical question, though it has practical dimensions. It is also a philosophical question — about rights, about resistance, about what values are worth defending and how. And it is a structural question — about whether the problems surveillance creates can be addressed through individual action, or whether they require collective, political, and institutional change.

The five chapters of Part 7 approach this question from five different angles.


Chapter 31: Rights and Their Limits

Privacy as a legal right has a history, and that history is not one of continuous progress. Warren and Brandeis invented the legal concept of privacy in 1890. A century later, the third-party doctrine gutted digital privacy protection. Carpenter v. United States partially reversed course in 2018, but left most of the digital surveillance architecture legally untouched. GDPR established comprehensive rights in Europe while the United States continues to lack a federal equivalent.

Chapter 31 maps this legal landscape — not to catalog failure, but to understand the gap between the rights people believe they have and the rights they can actually exercise. That gap is the starting point for every other form of resistance this part examines. Jordan Ellis, in this chapter, files a data access request and encounters the gap directly: rights exist on paper; exercising them is designed to be difficult.


Chapter 32: Tools and Their Limits

Signal, Tor, VPNs, uBlock Origin, Tails OS — these tools are real. They provide genuine protection. They are the product of remarkable technical work and sustained civil liberties advocacy.

Chapter 32 equips students to use them, and explains why using them well is not the same as solving the problem. Encryption protects message content from interception; it does not protect the social world in which the encrypted conversations take place. Tor provides network anonymity; it cannot protect the endpoint devices from compromise. The 10-step counter-surveillance checklist in this chapter is a real resource — use it. And understand that the surveillance architecture documented in this textbook is structural; individual tools address individual symptoms.

Jordan and Yara set up Signal in this chapter. "Is this enough?" Jordan asks. "It's a start," Yara replies. That exchange captures the relationship between technical counter-surveillance and structural change: necessary but not sufficient, a beginning not an ending.


Chapter 33: Art, Activism, and the Visible

Paglen photographs surveillance infrastructure from miles away. Harvey designs camouflage for faces. The Surveillance Camera Players perform theater for cameras that may not be watched. Yara trains as a legal observer. The EFF litigates against NSA programs. The Stop LAPD Spying Coalition uses community data analysis to challenge predictive policing.

Chapter 33 examines art and activism as forms of counter-surveillance — operating at the level of culture, politics, and community rather than individual technical protection. These approaches make surveillance visible, build political pressure for change, and provide direct support to people in spaces where surveillance is deployed. They work slowly, indirectly, and cumulatively. They matter.

Jordan, in this chapter, makes the decision to train as a legal observer. This is the turning point of their arc in Part 7: from understanding surveillance to acting within it.


Chapter 34: The Economy of Watching

Shoshana Zuboff's surveillance capitalism thesis — the most comprehensive critical account of the data economy's political economy — receives full treatment here, along with the critiques that complicate it: data colonialism, the limits of the novelty claim, the treatment of users as passive objects. The Cambridge Analytica scandal and Google's Project Maven illustrate the thesis in action.

Chapter 34 is the most theoretical chapter in Part 7, engaging with primary source excerpts from Zuboff and building the analytical framework for asking: Is surveillance capitalism new? Can it be reformed from within? What would meaningful reform require? Jordan reads Zuboff and then goes to work at the warehouse and realizes the analysis is both right and incomplete.


Chapter 35: The Face You Cannot Change

Facial recognition is the most urgently contested surveillance technology of the current moment: technically sophisticated, rapidly deployed, documented as racially biased, capable of eliminating public anonymity, and regulated adequately only in the EU and a handful of U.S. cities.

Chapter 35 provides the technical account of how facial recognition works, the empirical account of its accuracy disparities (Gender Shades), the legal account of documented wrongful arrests (Williams, Parks), and the regulatory landscape (EU AI Act, BIPA, city bans). Jordan faces a facial recognition false accusation in this chapter — an experience that makes abstract analysis concrete and personal.


What Part 7 Is Building Toward

Parts 8 and 9 will examine the futures of surveillance — the technologies being developed now, the governance frameworks being contested, and the choices remaining to be made. Part 7 is the turning point: the moment in the textbook, as in Jordan's arc, when understanding becomes the basis for action.

None of the tools, laws, artistic practices, or theoretical frameworks in these five chapters is sufficient alone. Each addresses part of the problem from a particular angle. The person who understands their legal rights (Chapter 31) and uses privacy tools (Chapter 32) and participates in activist communities (Chapter 33) and can analyze the political economy of surveillance (Chapter 34) and knows the specific facts about facial recognition (Chapter 35) is better equipped to act effectively than the person who knows only one piece.

Surveillance is architecture. Resistance is also architecture — built from many different materials, by many different hands, over time.


Part 7 covers Chapters 31–35. It assumes familiarity with the foundational concepts established in Parts 1–6: panopticism and discipline, national security surveillance, the data economy, social media and behavioral targeting, smart cities, and biometrics. Students who need to refresh specific concepts should consult the relevant key takeaways and chapter summaries before proceeding.

Chapters in This Part