Confused about proper responses to difficult situations?
Thank you for your inspired and thoughtful replies. I am curious to know how I might recognize when I am being "surveilled upon"?- Curious to Know
How to know when you are being "surveilled upon"? It is with great chagrin that I write this list. Dignified living for the individual, free from observation, is disintegrating. Our right to privacy is under attack, and we must understand what that means.
- When you own/use/carry a cell phone it tracks your location and metadata for every call, as well as content for many of them, and stores that data. The phone companies then sell that data as part of their business. The US government is storing this data on everyone.
- When you use Facebook you place your personal data into the hands of people who have a responsibility to their shareholders to profit from it. They do not have a responsibility to you or other users to protect your data. In this arena, the most respectful thing you can do for your friends and family is to not use FB. Cancel your account, tell them why, and write a letter, call them, or drop by for a visit.
- When you go through the airport security checkpoints that take digital images of your body, you give up your privacy. Require a hand inspection, and make friends with your awkward TSA compatriot.
In each of these common, everyday cases of surveillance, we are encouraged to give up our privacy for the sake of convenience. S.S.
What the fuck is this site?- Seriously
Thank you for your enthusiastic curiousity! This column is a resource for maintaining dignity and social graces, like Ann Landers or Emily Post. The current level of daily surveillance of everyday citizens has become astoundingly invasive and there is much general confusion about how to appropriately respond. Our site seeks to rectify that confusion to the best of our ability, while providing a genteel and calm perspective. When you next experience discomfort at a border crossing, cell phone location disclosure, or under the watchful gaze of a store camera please feel free to write in, and I will do my best to guide you to an acceptable resolution of the issue. These are real occurences that are highly disturbing, so we provide analysis and perspective to keep people from just falling apart.
While personal expression is highly valued by our editors, this column is also a resource for growing children who are learning how to live conscious lives under surveillance, so I would ask you to consider tempering your profanity next time.
Bye for now. S.S.
How do I hack gibsons for the greater good?- Anonymous
Hacking gibbons is in itself no easy feat, moreover for a greater good. Thank you for your interest and concern. Your brief question brings up the large discussion topics of both sousveillance - observation from below - and the popular phrase "ethical hacking".
In our current time of increasingly imposing corporate and government resources devoted to gathering information on users and citizens, sousveillance is acceptable, even commendable, modern civic behavior. When visibility into the systems that organize and manage our lives is impaired, power rests with those who know what is actually happening, and who know what is actually possible. Your desire to help understand the world around us is greatly appreciated.
The phrase "ethical hacking" is problematic and demonstrates a deep disrespect and distrust of hackers. With the addition of the adjective "ethical" we are told that the activity of simple plain "hacking" is inherently unethical. Artists don't have to call themselves "ethical artists" in order for their work to be understood as a benefit to society. Engineers don't have to call themselves "ethical engineers" in order for their work to be seen as legitimate. As a society, each action fits into the spectrum of ethics - we have artists who use environmentally unsafe chemicals in their processes, and engineers who design systems for killing other people. As with most activities, hacking is a process that is neither inherently ethical nor unethical.
Now, let us address the first part of your question - as a responsible modern netizen, please, learn some 1337 h4x0rz sk1lz. For example, try to orient your 0day towards the core shields and you will likely be able to take down its main firewall. Once you are in, then you could focus on obtaining the garbage files, as they often contain quite interesting information. Now, for the second part - the concerned netizen, once having obtained access to such information, will leak it securely and anonymously.
Knowledge is power. S.S.
Is my IP address being recorded right now?- Anonymous
Your IP address is indeed being recored now, the question is by whom. If the question is if I Sylvia am personally recording your IP address then the question is no, but I am sad to tell you that far scarier people are. When reaching this site your connection is being routed through all of these US based addresses:
if-20-2.tcore2.nyy-newyork.as6453.net (220.127.116.11) 18.104.22.168 (22.214.171.124) vlan578.icore1.nto-newyork.as6453.net (126.96.36.199) vlan570.icore1.nto-newyork.as6453.net (188.8.131.52) if-11-2.tcore1.nyy-newyork.as6453.net (184.108.40.206) vlan25.icore1.nto-newyork.as6453.net (220.127.116.11) pos-1-15-0-0-cr01.newyork.ny.ibone.comcast.net (18.104.22.168) vlan25.icore1.nto-newyork.as6453.net (22.214.171.124) vlan570.icore1.nto-newyork.as6453.net (126.96.36.199) pos-0-10-0-0-cr01.ashburn.va.ibone.comcast.net (188.8.131.52) pos-1-15-0-0-cr01.newyork.ny.ibone.comcast.net (184.108.40.206) pos-4-12-0-0-cr01.atlanta.ga.ibone.comcast.net (220.127.116.11) pos-1-10-0-0-cr01.dallas.tx.ibone.comcast.net (18.104.22.168) pos-4-12-0-0-cr01.atlanta.ga.ibone.comcast.net (22.214.171.124) pos-1-10-0-0-cr01.dallas.tx.ibone.comcast.net (126.96.36.199) as26347.losangeles.ca.ibone.comcast.net (188.8.131.52) ip-66-33-201-114.dreamhost.com (184.108.40.206) as26347.losangeles.ca.ibone.comcast.net (220.127.116.11)It is known that curious people are listening at certain strategic places in the US and are monitoring what you are reading and writing. It is perfectly reasonable to protect your privacy on the internet; you should use use tools such as Tor to protect your identity while online. S.S.
Some nights I am watched through the window of my bedroom. When I am being observed, but incorrectly dressed to receive guests, what is the proper way to fulfill my duties as a hostess in my home?- Hostess in Distress
Oh my yes! Those covert surveillance teams offer a challenging set of social courtesies for the modern-day hostess. One should usually extend hospitality to persons conducting their business in or near your home, and yet these operations often take place when we are not prepared with refreshments.
The correct course of action in such situations is to assume that these visitors have brought their own snacks. You are under no obligation to provide food or beverages or inquire about their needs if they presume that you have not detected their presence.
If it becomes obvious that you know these persons are on site, it is perfectly correct to deploy your own surveillance equipment and engage them in a polite chat about the ethics of personal privacy.
The modern hostess is not required to invite eavesdroppers into her home. S.S.
I recently discovered that the government has been illegally wiretapping my phone and the phones of millions of other people. How do I correctly greet the surveillance officers at the beginning of a phone call?- Party Line
Widespread illegal wiretapping is so tedious and yet, sadly, so common. It is an affront to common courtesy and the rules of civilized behavior to listen to private conversations uninvited.
If you have reason to believe that this type of unpleasantness is taking place on your phone, it is perfectly correct to acknowledge the surveilling party at the start of the phone call. You might say, for example, "Hello surveillance officer, I think it is quite rude of you to listen in on my conversations. Your actions are in all likelihood illegal and violate all protocols of good taste."
Ta ta! S.S.
A threatening looking person entered my workplace last week, and my wife says I ought to have reported them. How do I correctly identify and document potentially dangerous people to prevent unpleasantness?- Concerned By Office Mannerisms
What an excellent question! Bravo to your wife and to you.
Appearances are not always what they seem, and the well-bred host does not make assumptions based merely on habits of dress or mannerisms. Yet, one is compelled to alert others if you have any suspicion of miscreants. Observe from a safe distance and discreetly make records of their appearance and behavior. This information should be quietly and swiftly sent to the appropriate parties with a minimum of fuss. If a co-worker attempts to share confidences with such people, privately warn your colleague.
People who present a danger to a calm, ordered society are indeed alarming. It is important to note that such disruptive people often do not look dangerous. They can appear in the form of security personnel, lawyers, government employees and elected officials.
Stay aware. S.S.
When in custody, how may one maintain correct table manners when denied proper silverware?- Hungry And Restrained
You're rightly concerned, as performing everyday actions while being recorded by surveillance cameras now occurs so often, declining manners anywhere can be duly noted. It sounds like you are aware that while in custody, the chances of your behavior being closely observed increase significantly.
If you have not been provided the needed silverware to dine with grace, do not attempt to borrow utensils from your fellow inmates. While it may be tempting to wave the substandard utensils at the camera or add an insulting gesture, this too is not polite. You must make do with the items that you have received. Eat with your hands if you must, but always retain your dignity. Use a napkin if provided, or your sleeve if you are permitted clothing. When you have completed the meal, you should quietly inform your hosts that they have failed in their duty to uphold the norms of polite society.
Bon apetite. S.S.
Recently, my traveling companion was stopped at a security checkpoint, but I made it through and continued. I think I may have made a gaff, as they are now upset with me. Was I in the wrong? How long should I have waited while they were interrogated?- On The Road Again
Your confusion is understandable. Checkpoints have become such a common part of our daily lives, and yet interrogations and detentions do present awkward moments. When your companion is drawn aside, it is correct to wait patiently for the duration of the security interview, and your friend is appropriately aggrieved by your hasty departure.
Of course, it is considered a breach of courtesy to volunteer personal information about the person being detained. While authorities will often conduct searches without permission, people of good breeding never consent to a search of their person or vehicle. If it is possible to assist in your companion’s departure from the unwanted conversation, offer an appropriate distraction. If your companion is taken into custody, you are free to proceed with your scheduled plans. But good taste requires that you make a courtesy call to one of your companion’s friends, family members or their attorney alerting them that your companion has been detained.
See you on the other side. S.S.
Today inside of the earth of social gathering and fun the Hookahs comprise grow to be unbelievably famed. Everywhere by yourself transfer you can watch a parlor of Bongs. But they are not simply used for ingesting pleasurable within just some spots Smoking cigarettes Pipes are in addition utilized to produce a person healthy and extensively in shape back. pipe Ã fumer http://lindnerpipes.com- pipe Ã fumer
Hmm is anyone else encountering problems with the images on this blog loading? I'm trying to determine if its a problem on my end or if it's the blog. Any feedback would be greatly appreciated. cardy ugg boots sale http://unionmco.com/flash/ugg-00/@27@70yicardy-ugg-boots-sale@firstname.lastname@example.org- cardy ugg boots sale
<a href=http://www.ashmanaccountancy.co.uk/temps/louis-vuitton-epi-alma-black-p-6663.php><b>louis vuitton epi alma black</b></a> <a href=http://www.itotzke.com/temps/fake-louis-vuitton-belt-free-shipping-p-4985.php><b>fake louis vuitton belt free shipping</b></a> <a href=http://www.karlsdiecut.com/temps/cheap-fake-louis-vuitton-garment-bag-p-4808.php><b>cheap fake louis vuitton garment bag</b></a> <a href=http://www.cribbassociates.co.uk/temps/louis-vuitton-Solar-PM-replica-p-11392.php><b>louis vuitton Solar PM replica</b></a> <a href=http://www.easttexaslinks.org/cached/louis-vuitton-designer-outlet-zweibrucken-p-2171.php><b>louis vuitton designer outlet zweibrucken</b></a> <a href=http://www.hkcoperations.com/cached/louis-vuitton-coin-purse-price-p-4762.php><b>louis vuitton coin purse price</b></a> <a href=http://www.auburncap.org/cached/louis-vuitton-belt-m9604q-p-2549.php><b>louis vuitton belt m9604q</b></a> <a href=http://www.3dlookinglass.com/cached/louis-vuitton-alma-or-speedy-p-4183.php><b>louis vuitton alma or speedy</b></a> <a href=http://www.jeffsteorts.com/cached/lv-vans-kids-shoes-boys-p-2692.php><b>lv vans kids shoes boys</b></a> <a href=http://www.edurobokit.com/temps/authentic-Louis-Vuitton-M40843-p-4820.php><b>authentic Louis Vuitton M40843</b></a> <a href=http://www.seycsa.com/temps/nike-air-max-1-premium-w-schoenen-p-2895.php><b>nike air max 1 premium w schoenen</b></a> <a href=http://www.southhialeah.com/file/louis-vuitton-damier-bastille-bag-p-3229.asp><b>louis vuitton damier bastille bag</b></a> <a href=http://thekronicles.com/temps/louis-vuitton-wallets-joey-denier-p-2388.php><b>louis vuitton wallets joey denier</b></a> <a href=http://littledreamerstutus.com/temps/louis-vuitton-delightful-gm-genuine-parts-p-4059.php><b>louis vuitton delightful gm genuine parts</b></a> <a href=http://www.yvettasimonyan.com/temps/louis-vuitton-speedy-bag-sale-p-3873.php><b>louis vuitton speedy bag sale</b></a> <a href=http://rumahjahithaifa.com/temps/louis-vuitton-speedy-duffel-bag-16x14x12-p-3029.php><b>louis vuitton speedy duffel bag 16x14x12</b></a> <a href=http://qpmassage.com.au/temps/louis-vuitton-scarfs-online-p-3542.php><b>louis vuitton scarfs online</b></a> <a href=http://www.formandos.com/cached/louis-vuitton-palermo-wine-orin-swift-p-4646.php><b>louis vuitton palermo wine orin swift</b></a> <a href=http://www.pinchal-co.com/cached/Louis-Vuitton-Amelia-Wallet-replica-p-5708.php><b>Louis Vuitton Amelia Wallet replica</b></a> <a href=http://www.xcyrus.com/temps/buy-louis-vuitton-zippy-wallet-illustre-p-3826.php><b>buy louis vuitton zippy wallet illustre</b></a> <a href="http://www.annaspianostudio.com/cached/Louis-Vuitton-N41413-p-5430.php" >Louis Vuitton N41413</a> [url=http://www.annaspianostudio.com/cached/Louis-Vuitton-N41413-p-5430.php]Louis Vuitton N41413[/url]- Louis Vuitton N41413
Dear Sylvia, Why so paranoid and crazy, honey? You need to take a chill pill and live ;)- the government
All images are in the public domain (US PD-1996) and sourced courtesy of wikimedia commons, staunch upholders of the norms of public decency. Sylvia is also happy to answer questions of netiquette.