Further Reading — Chapter 38: The Future of Surveillance
1. Zuboff, Shoshana. The Age of Surveillance Capitalism. PublicAffairs, 2019.
The foundational text for understanding the economic logic that drives commercial surveillance expansion. Zuboff's argument that surveillance capitalism's ultimate goal is behavioral modification — predicting and influencing human behavior in ways that guarantee commercial outcomes — provides the economic theory behind every commercial surveillance trajectory examined in this chapter, from ambient advertising to neural monitoring. Parts IV and V, on the "instrumentation power" of surveillance capitalism and its implications for democratic society, are especially relevant to the three 2050 scenarios.
2. Pasquale, Frank. The Black Box Society: The Secret Algorithms That Control Money and Information. Harvard University Press, 2015.
Pasquale examines the algorithmic systems that increasingly determine access to employment, credit, healthcare, and information — the commercial-society version of social credit scoring. His analysis of the opacity of these systems (the "black box") and the accountability void this creates is the foundational text for understanding why algorithmic transparency is a prerequisite for democratic oversight of AI surveillance. The chapter on financial algorithms and the chapter on reputation systems are directly relevant to the social credit analysis in Chapter 38.
3. O'Neil, Cathy. Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy. Crown, 2016.
O'Neil examines what she calls "weapons of math destruction" — mathematical models that cause harm because they are opaque, untested, and applied at scale in consequential decisions. Her case studies — predictive sentencing, teacher evaluation algorithms, credit scoring — are the empirical grounding for the abstract argument that AI systems amplify rather than merely inherit bias. More accessible than Pasquale's legal analysis; excellent for students who want concrete examples of algorithmic harms before engaging with the theoretical literature.
4. Solove, Daniel J. The Future of Reputation: Gossip, Rumor, and Privacy on the Internet. Yale University Press, 2007.
An early but still relevant examination of how the internet's permanent, searchable record of information changes the social function of reputation, privacy, and forgetting. Solove's analysis anticipates the Clearview AI problem: what happens when the contextual information shared in social settings becomes permanently searchable for any purpose? The concept of contextual integrity is implicitly present throughout, and Solove's normative framework is a useful complement to the technical analysis of biometric databases.
5. Dick, Philip K. "The Minority Report." Science Fiction Stories, 1956. (In numerous anthology editions.)
The original source, not the film adaptation. Dick's short story — which departs significantly from Spielberg's film — engages more directly with the epistemological problem of predictive justice: what is the moral status of an action that would have occurred but didn't? Reading the original text, rather than treating it as a cinematic reference, is valuable for anyone who wants to engage seriously with the pre-crime ethics question. Available in The Philip K. Dick Reader (Citadel, 1997) and other collections.
6. Feldstein, Steven. The Rise of Digital Repression: How Technology Is Reshaping Power, Politics, and Resistance. Oxford University Press, 2021.
Feldstein's empirical study of the global spread of surveillance technology — tracking which governments have adopted AI surveillance systems, from whom they purchased, and the political consequences of deployment — provides the most comprehensive data available on the international surveillance technology market. His Carnegie Endowment research documented the extent of Chinese surveillance technology export; this book synthesizes that research with analysis of local political effects. Essential for understanding the international dimensions of the surveillance trajectories examined in Chapter 38.
7. Hartzog, Woodrow. Privacy's Blueprint: The Battle to Control the Design of New Technologies. Harvard University Press, 2018.
Hartzog examines how the design of technology — the architectural choices made by engineers and product managers — determines privacy outcomes more decisively than legal frameworks or individual choices. His argument that privacy protection must be engineered into technology design, not layered on as a compliance afterthought, is the theoretical foundation for Chapter 39's privacy by design analysis. The chapters on trust, obscurity, and the limits of notice-and-consent are directly relevant to the ambient surveillance and neural monitoring problems in Chapter 38.
8. Sweeney, Latanya. "Simple Demographics Often Identify People Uniquely." Carnegie Mellon University Data Privacy Laboratory Working Paper, 2000.
This brief but crucial paper demonstrated that three pieces of information — zip code, birth date, and sex — are sufficient to uniquely identify 87% of the U.S. population. Sweeney's finding is the empirical foundation for understanding why "anonymized" data is often not actually anonymous, and why the combination of multiple data streams creates identification risks that individual streams do not. The finding directly informs the analysis of multi-modal biometric surveillance and ambient surveillance in Chapter 38.
9. Levy, Karen. Data Driven: Truckers, Technology, and the New Workplace Surveillance. Princeton University Press, 2023.
Levy's study of surveillance in the trucking industry — electronic logging devices, GPS tracking, telematics — provides a vivid empirical account of what workplace ambient surveillance looks like from the perspective of those surveilled. Her analysis of how monitoring technology reshapes the power relationship between employers and workers, changes the experience of labor, and interacts with existing regulatory frameworks has direct implications for the ambient surveillance trajectory examined in Chapter 38. An example of the best kind of empirical surveillance research: deeply specific and broadly revealing.
10. Naughton, John. The Internet: A Very Short Introduction. Oxford University Press, 2012 (updated editions available).
For students who want to understand the technical infrastructure underlying the surveillance trajectories in Chapter 38, Naughton's accessible introduction to internet architecture explains how the internet was designed, what design choices were made, and what surveillance capacities those choices enabled or precluded. Understanding why the internet has the privacy properties it does — rather than different ones — requires understanding the architectural decisions that produced it. This short, accessible text provides that grounding.
Students interested in the neural surveillance dimension should supplement this list with academic work on BCI ethics, available in the journals Neuroethics and AJOB Neuroscience. The International Brain Initiative's working group publications on neural data governance are the most current policy-oriented treatment of the topic.