Quiz — Chapter 40: Living Under the Gaze — Synthesis and Student Manifesto

This quiz differs from chapter quizzes in previous chapters. Because Chapter 40 is a synthesis, many questions ask you to integrate material from across the book rather than recall specific facts from this chapter alone. Total: 100 points.


Part A: Multiple Choice (3 points each)

1. The book's central metaphor — "surveillance as a built environment" — is designed to convey that:

a) Surveillance systems are physical structures that occupy real space b) Surveillance infrastructure shapes behavior before conscious thought, was designed by specific people with specific interests, and can be redesigned c) The most significant surveillance occurs in built environments like schools and workplaces rather than digital environments d) Physical architecture determines where surveillance systems can be located


2. The book argues that the "nothing to hide, nothing to fear" position is:

a) A logically valid position that requires only minor technical correction b) Factually accurate for people who are not engaged in criminal activity c) An ideological position that locates the problem and solution of surveillance in individual behavior, misunderstanding the structural nature of surveillance harms d) A position unique to contemporary digital surveillance that would not have applied to historical surveillance contexts


3. Dr. Osei's statement — "The question isn't how to escape the gaze. It's how to refuse to be only what the gaze makes you" — means:

a) The most effective response to surveillance is radical non-participation in digital systems b) Surveillance systems are legitimate and should be accepted; the individual challenge is maintaining dignity within them c) Because surveillance cannot be escaped, maintaining autonomy, interiority, and capacity for change is the central practical challenge of living in a surveilled world d) The gaze of surveillance is primarily concerned with determining who a person is, not what they do


4. The chapter argues that "visibility asymmetry" is best understood as:

a) A technical problem that can be solved by deploying better surveillance across all populations b) A structural and racial feature of every surveillance system examined in the book, not an incidental or correctable flaw c) An asymmetry that exists primarily between individuals and state actors, not between individuals and corporations d) A temporary condition that will diminish as surveillance technology becomes more affordable and widely distributed


5. Jordan's manifesto reflects which of the following movements in their arc across the book?

a) Naïve acceptance → technical expertise → individual optimization b) Naïve acceptance → critical awareness → structural analysis → considered action → manifesto c) Initial resistance to surveillance → gradual acceptance of its necessity → reform advocacy d) Theoretical analysis → disillusionment → retreat into private sphere


6. The chapter presents four levels of response to surveillance (individual, collective, policy, design). Which of the following best characterizes their relationship?

a) They are alternative responses; choosing one means not needing the others b) They operate at different scales of leverage; individual responses are insufficient alone but remain necessary; structural change requires all four working together c) They are ranked in order of effectiveness, with structural design change being the only response that matters d) They are ranked in order of accessibility, with individual responses being the only realistic option for most people


7. "Consent as fiction" in the book's usage refers to all of the following EXCEPT:

a) Consent obtained through take-it-or-leave-it terms for essential services with no real alternatives b) Consent to data uses that the consenting party cannot realistically understand c) Consent that was fraudulently obtained through explicit deception d) Categorical surveillance that targets group membership rather than individual action, making individual consent structurally impossible


8. The book's argument for "historical continuity" in surveillance does NOT claim that:

a) The logic of making certain bodies legible to authority persists across technological generations b) Contemporary surveillance is merely a more efficient version of historical surveillance with no qualitatively new features c) The slave pass system and facial recognition checkpoints share a structural logic of requiring certain people to prove they belong d) Understanding surveillance history is necessary for understanding contemporary surveillance


9. The chapter's "What's Next" section points to:

a) Chapter 41, the book's postscript on the future of privacy law b) Specific advocacy organizations students should join c) The world — the moments in daily life, professional decisions, and civic participation where the knowledge of this course becomes practically relevant d) A recommended reading list for continued surveillance education


Part B: Cross-Chapter Synthesis Questions (4 points each)

10. Identify one surveillance system from any chapter in Parts 1–7 of the book and demonstrate how all five of the book's recurring themes are present in that single system. (Answer in 150–200 words.)


11. Jordan's observation in Chapter 40 — "I did not choose this architecture. Neither did you" — echoes a design argument from Chapter 39. Explain the connection between these two statements. What does it mean for surveillance to be understood as "architecture" in terms of individual responsibility, collective governance, and design choices? (Answer in 150–200 words.)


12. The chapter argues that normalization is "the most powerful surveillance mechanism because it operates without anyone needing to enforce it." Using two examples from different parts of the book, explain how normalization works in each and why external enforcement was unnecessary in those contexts. (Answer in 150–200 words.)


Part C: Short Answer (8 points each)

13. What is the difference between "structural" and "individual" explanations for surveillance harms? Identify one surveillance system from the book where the structural explanation is clearly superior to the individual explanation, and explain why. (150–200 words)


14. The chapter's synthesis of visibility asymmetry identifies five "registers" in which asymmetry is distributed (physical, digital, racial, generational, temporal). For any two of these registers, explain how the asymmetry operates and identify a specific surveillance system that exemplifies it. (150–200 words)


Part D: Extended Response (choose one, 14 points)

15. Dr. Osei's closing statement identifies the "danger" of surveillance as not only what it does to people externally, but what people might come to believe about themselves in response to being surveilled — that the surveillance apparatus's reduction of persons to observable, manageable outputs might be internalized. Write a 300–400 word response that: (a) explains what Dr. Osei means by this danger; (b) connects it to at least two specific surveillance systems or phenomena from the book; and (c) evaluates whether Jordan's manifesto addresses this danger, and how.

OR

16. Jordan's manifesto ends: "Understanding is not power, but it is the prerequisite for power." The book ends: "The architecture of surveillance is real and powerful. But architecture can be redesigned. That is the work." Write a 300–400 word response that: (a) interprets each of these statements in full; (b) explains how they relate to each other; and (c) evaluates whether the book's conclusion earns these statements — whether the preceding 40 chapters make them credible rather than merely aspirational.


Answer Key and Rubric available in Instructor Resources. Extended response questions for Chapter 40 are evaluated with particular attention to integration of material from across the book, not merely Chapter 40.