Learning Behavioral Patterns, From the View of Private I

Impressions and Being You
Each person has their own individual identity. We have all learned how to respond to situations, and despite different upbringings, there is a general consensus by the population of what is considered acceptable behavior. Knowing how to respond using proper etiquette in any setting helps create a good impression of yourself, shows maturity of age, and knowledge of human respectfulness.

The impression you leave may be compromised if others are intent on damaging your reputation. With advances in technology, the ability to view anyone remotely is accessible to almost anyone. Remote applications which are easily available, provide the ability to view and speak overhead to someone anywhere, despite any privacy laws. As this becomes more popular, a person’s good image is nearly impossible to preserve. While it may be natural to present yourself at your best while in public, there are many situations where a person does not wish to be viewed or have their life publicized. Several examples of this might include using the restroom, bathing, romance or other interactions with others. Everyone deserves privacy in their own life. Without question there are moments of privacy that no one would want watched or analyzed.

No Kidding, Children Too
Children likewise should be immune to remote viewing. While it may seem to be the ideal way to monitor a child by having a virtual babysitter spying overhead, it teaches the child that this is the norm. A child who is raised with stalkers overhead, learns to communicate with them, and generally learns to welcome them into their environment. It would seem that this would be on radar for Child Protective Services and fall into the exploitation of children category, even if parents give access. There truly is no way to control what is being viewed by the remote viewer. Psychologically it is similar to a child having imaginary friends, except they do not make them up, the remote viewer really exists. The spies overhead have the ability to order the child, view the child live, zoom, and even x-ray them. The child learns a different approach as an alternative to healthy interactions and real friendships. The child learns that every area of their life is subjected to being watched, even if no one is there, without boundaries, as way of life. They do not question that it is an acceptable way to communicate and interact.

Spying Risks All Around
For the Victim: Along with viewing, spies who use these remote applications on a regular basis, are able to notate behavioral patterns and unique styles of the victim they are watching. This detracts from the value each person has. Just as a company might be spied on to gather trade secrets, a person who is watched has their attributes stolen from them making them unmarketable. The victim feels their soul stripped as those things which compose their person are publicly viewed and shared. Much like automated artificial intelligence programs, spies are able to gather information on the way the individual lives their life as well as their schedule to predict next behaviors. Learning behaviors and patterns of a person can result in identity theft, stealing the personality and information about the victim and putting them at risk.

Further security concerns include not being able to escape remote viewers. People who use remote viewing methods can access anyone, any place, even outside, at any time of the day or night. Environments such as a car, an office, or a house offer no place to escape. Even outside, the victim can be watched real-time on trails in parks, in tents, in parking lots, and even in swimming pools underwater. For unwilling parties who do not want to be viewed, there is no escape. Having real-time audio access, the remote viewers also have the ability to speak live. There is no escape from their abuse constantly overhead, other than to block their comments by wearing headphones, which is unreasonable to wear all day and night.

For the Viewer: Beyond the affects that remote viewing has on the victim, it also affects the viewer who loses perception of the difference between watching a movie on screen and watching a personal life. Remote viewing quickly deteriorates the potential any human relationship might have by eroding trust. Besides creating a psychologically abusive environment that they cannot escape from, there are several other problems which arise from remote viewing that devalue human life and can potentially lead to addiction.

Threats Remote Viewing Causes:

1. Detracts from Human Worth. The first reason remote viewing is detrimental is it detracts from human worth. The appreciation of fully enjoying the personality and all the traits of another person is lost. Viewing becomes merely a form of entertainment. The problem is this entertainment quickly manifests to mockery, shunning, and comparison to others. It easily becomes a way to filter out any positives about a person, who has become nothing more than a detached, animated object on a screen. The spy begins to accentuate what they see and perceive as negatives.

2. Steals and Duplicates Personal Attributes. A second reason remote spying is a negative, is that there is a tendency to notice attributes or talents which the person excels at, to steal and duplicate. Any positive features are added to the spy’s personal portfolio or used to share with others to improve theirs. No longer are these attributes the selling points of the victim, but public knowledge. Instead of generating new talents or processes, they rely on duplicating what another does, to improve upon themselves. It would be better for the parties involved to freely share their own trade secrets from their own personal portfolios. Ripping off another’s personality, interests, way of speaking or behaving is not admirable. If these features were shared by the individual to another person it would be acceptable. If it was a celebrity who was admired for a trait, and it became a fad, this would be acceptable as well. However, those who spy on people to steal information rob another of what they may excel in. This is not to say that behaviors or traits are exclusive to each person. It is the way these attributes are shared which determines whether it is an offense. The maliciousness of those who spy often do this for their own self-improvement, to gather information to ‘help others’, for popularity, or to earn money. Regardless, it is for the downfall of the one they are spying upon.

3. Security Issue and Identity Theft. The third reason remote viewing should be resisted, is that monitoring and learning someone’s behaviors causes a security issue and identity theft. If a spy notates over time the intricacies of a person’s day or schedule, this can put the victim at risk. Noticing details such as how often a person does something, how they go about it, when, and why they make decisions, will give those who spy the ability to forecast next behaviors. They will predict in advance what they will do, where they will go, how they will interact, how they will react, as well as their bodily functions and reactions. While this type of micro-monitoring is suitable perhaps for a baby, this is not acceptable at all from adult-to-adult without permission. In fact it reflects the immaturity of these adults who consume their time monitoring the life of another, rather than improve upon their own life. There is no reason for the victim being viewed to even exist as all is known and any uniqueness duplicated.

4. Quelches Zeal for Life. Finally, remote viewing quelches the victim’s zeal for life. With all being stolen, and no privacy given, the victim feels violated by the second, unable to generate new energy and frozen with exploring and creating new material, because every second is known, seen and critiqued. The spy uses remote viewing to gain control and power over the victim in a world they cannot escape from. The spy pierces the victim’s creative and loving human soul to mold a generic spirit of nothingness. The victim becomes no more than an object, like an experimental rat, a thing to manipulate being subjected to conditions. Joy and zeal found in life is dampered if not made void entirely. The motivated spirit to take on new efforts and enthusiasm for new adventures is lacking because all is seen, and surprises or things prepared for are already revealed.

5. Addiction. Similar to temptations which have the ability to form into addictions, it is evident, there are several phases to the use of the remote application. The first phase is usually human inquisitiveness. A person is easily convinced of the idea of how enticing it would be to view another person’s life, hiding behind the screen of a remote device. The second phase of remote viewing is scrutiny. The spy begins to seek out oddities, errors, and flaws in the other person. The third phase of remote viewing is mockery. From these perceived discrepancies, the spy becomes disenchanted with the person and may even share negative attributes with others. Somewhere between phase 1 and 3 there is guilt associated with their actions. If the spy comes across the victim in public, there is usually a feeling of anger toward the victim or avoidance because of their spying. The fourth phase of remote viewing, which can happen at any stage, is addiction and dedication to the device. The pretend relationship psychologically becomes an actual relationship to the viewer. The fifth phase of remote viewing is fulfilling sexual needs fostered by the viewing the victim’s life. They may go to the extent of finding them in person and raping them, molesting them, or zooming in on sexual parts. Monetarily, it opens the door for a business of selling views to others for the same reason of inquisitiveness and entertainment. The human worth is dissolved to nothing but an object of entertainment.

The Psychosocial Impact
This poses the question, why people wouldn’t want to enjoy others but choose to spy on them instead. As a form of psychological abuse, those using remote viewing seem to possess social dysfunctional developmental issues. Many who currently are using remote viewing are between the ages of 35-70, well past the age range for when social maturity would be expected. An influential American psychologist, Erik Erikson, studied the development of humans in a social context. Taking a look at Erikson’s study with relation to remote spying proves psychosocial development is lacking in these users of remote viewing applications. While as adults they most likely have knowledge of how to interact with others in a healthy manner, their approach is contorted and damaging to good psychosocial skills interacting with others and in their own maturity.

Is this behavior evident of social immaturity for these adults or is this a contorted response to already learned psychosocial skills which they are using knowingly as a form of abuse? When a distortion to natural processes exists, there usually is crime, addiction, or disability. With full knowledge of what they are doing, this behavior is both immaturity, criminal, and can easily lead to addiction. These criminal-addicts are confused with their identity and lack confidence of interacting in a healthy manner with other people. They are confused and insecure about themselves much as pre-teens might be in their developmental stage of learning about themselves and how to interact within the world they live within. While this is not acceptable at any age, by the time a person is middle age or older, their psychosocial developmental stage should already be at an advanced stage of maturity.

Erikson’s Psychosocial Developmental Study
Erikson in his study of psychosocial development determined there are 8 stages which exist during the lifespan of a human from the time of birth through old age. The stages include Trust vs. Mistrust, Autonomy vs. Shame and Doubt, Initiative vs.Guilt, Industry vs. Inferiority, Identity vs. Role Confusion, Intimacy vs. Isolation, Generativity vs. Stagnation, and Integrity vs. Despair. These stages describe the process a person goes through to reach adulthood, by learning how to interact with others and develop their personal identity, over the course of their life. Taking a closer look at the stages of this study can help understand developmental issues in the individuals who are addicted to using remote viewing and analyze where in these stages their maturity is lacking.

Trust vs. Mistrust – Infancy stage. Erikson sets this as the first stage of a person’s individual stage of development which occurs from birth through 18 months. Within this time, a person learns to trust others and learns that the world is a safe place. Rather than adding to a person’s safe environment, the spy creates mistrust in an individual’s life. Invading upon an individual’s personal boundaries, the spy uses remote viewing develops mistrust in a person who already understands trust and healthy interactions between people. They use this mistrust as a foundation to prevent relationships from forming and to crumble existing relationships. Friends, family, significant others, employers or anyone else who uses remote viewing to watch another person, immediately begins to cause mistrust to the relationship or potential relationship. Viewing another remotely watching their personal life without permission is a form of dishonesty, stealing, violation, and deception. In this first stage, the relationship is already disintegrating once the remote device is first used. If permission is granted by the party being watched, trust would still exist because boundaries would be respected. Since the spy is not given permission by the individual, it is a violation and creates distrust.

Autonomy vs. Shame and Doubt – Early Childhood stage. In this stage, Erikson explains children who are 2-3 years old are developing a greater sense of self-control. As it relates to remote viewing, the spy does the exact opposite striving to destroy the self-control of the victim. Their ultimate desire is to obtain control and power over the person they are watching. They monitor all actions throughout the day to the very minute detail. Details are shared as concerns with others. They discuss any observation with others as if it were a group of parents watching a child needing to make decisions for them even in the smallest matter. Everyday decisions and actions by the victim are observed and are even verbally ordered by the person spying. Examples of this may be telling the victim what clothes to wear, what to eat, instructing personal routines and habits, critiquing weight, finding anything to nit-pick at and cutdown. In their desire to acquire all knowledge, they seek any opportunity to create shame and shame the person to others. It may not even be shameful activity which they shame. The spy understands shame as a means of power over the person they watch. There is no realization or importance of independence and responsibility of the adult. The spy seeks to try to destroy trust, confidence, the independence in the adult victim to gain a sense of power over the person.

Initiative vs. Guilt – Ages 3-5. The third stage in Erikson’s stages of development is where children learn the difference between good and bad, how to interact socially with others, the ability to make decisions, and how to lead others. Using remote viewing, the spy seeks to destroy initiative in the person they spy upon. The try to cause a sense of guilt in the victim by chiding any actions they disagree with. They break down self-motivation and confidence. They create a significant amount of limitations for what the victim can do discouraging any initiatives and effort. Doors are closed on any attempts to find a way out of a seemingly blocked situation telling the victim they are worthless.

Industry vs. Inferiority – Ages 6-11. In this stage, children learn the value of work, realize their successes and achievements, and their failures. They develop a sense of self-confidence. Using a remote means to view, the spy communicates to the victim all the many flaws they see, that they are an outcast, and that they do not belong in society. Whatever they look like, who they are as a person, their work, and whatever they do is seen as inferior. The spy then communicates the person’s perceived personal failures and inadequate work ability to sway the views of the community, which results in blocking the individually socially and professionally. The victim is painted as an outcast possessing no capabilities to contribute to society in any way whether personally, through relationships with others, volunteer work, paid work, or any initiatives. They are without a doubt categorized as an outcast and treated as such.

Identity vs. Role Confusion – Ages 12-18. In the 5th stage of ego development according to Erikson, a person establishes their personal identity and how they fit into society. The spy redefines the identity of the association of adult-to adult to superior-over-dysfunctional. It might be better understood as adult-over-child, although the person being watched is fully mature, responsible, able to function and is not a child. The spy seeks control and power and does not recognize the victim as fully independent or capable as a human. The victim, in the spy’s opinion, does not fit into society.

Intimacy vs. Isolation – Age 19-40. In this stage, the person learns how to have intimate relationships with others and establish their life together with others away from absolute loneliness and isolation. In this stage, humans grow in closeness, honesty, and trust with another. Using the remote device, the spy redefines relationships and intimacy by what they see on screen, much like being engrossed in a movie. They see the device as a true social interaction. The relationship to them exists while the person being viewed may not have even met the person spying or have any interaction with those who spy. What the spy views without permission, they use for the fulfillment of a need for a human relationship and personal sexual gratification. For most, this becomes an addiction, devoid of the human person’s presence.  A fake relationship develops in their mind, and so advances in realness, that the person is inclined to not think twice of progressing further with crimes of rape and molestation, fulfilling their desires, still not knowing the person nor having permission. They keep the victim in isolation, unable to meet other people. They discourage verbally overhead any other solicitations of acquaintances to the victim. If not swayed from association, new acquaintances are given remote viewing access to ensure discouraging further association. The remote viewing is the only relationship that exists as the victim is unwillingly watched by many people.

Generativity vs. Stagnation – Age 40-65. In this middle adulthood stage, there is a desire to contribute to the world and be involved with the community and society. Using the remote device, live views are sold out to create a community of more spies to watch the person’s personal life. Recorded views, and real-time view spots, are sold for additional money to feed curiosity, addictions, and mockery. While generating more video footage to sell to others, the spy thrives on building their own personal popularity to the community with what they sell. At the same time, they stagnate the life of the victim socially by turning their life and any nudity into an exploited show to watch and monetize. Work is also stagnated for the victim with any contribution to society whether paid, volunteer, initiative to the good of others terminated. The victim’s work and efforts are discouraged, blocked, and anti-promoted. Propaganda spread to the community leads to further isolation and stagnation for the victim deeming them indefinitely unwanted by society and unwelcome. Any effort for them to succeed or be incorporated into society is truncated.

Integrity vs. Despair – Age 65 to death. In this final stage, an individual reflects on whether their life was meaningful or if they have regrets over the life they’ve lived. They have a sense of fulfillment or despair. Those who use the remote device cause years to be lost, a sense of disparity, lack of dignity and worth, and detachment of the individual from society. The individual’s life only exists for the purpose of being exploited. The person they spy on is to them nothing but a waste of human life, and not just to them, but to all they speak of the person to. There is no future where one is watched 24/7 in a psychologically abusive environment, nor in one that extends to the community at large. Work and personal growth are controlled. This ability extends insomuch as to control life entirely with complete restrictions other than existence. Although the victim attempts many ways to achieve successes and progress despite a restrictive and monitored environment, the efforts are for naught, and as a result despair is likely to occur.

Moral Implications of Remote Viewing
Remote viewing affects the normal and healthy, psychosocial existence of an individual transforming their environment into one of abuse. Using the remote viewing affects human relationships while also affecting the life of an individual to make the private life of the individual public, disregarding their human dignity, and ultimately wasting the individuals worth and life. Rather than build up human worth in others and foster healthy human relationships, they seek to destroy morale and worth. They are satisfied only by the image on a screen, using it to the ruin of the victim as well as themselves. Beyond Erikson’s findings or any other behavioral model by other renowned psychologists, these spies do not follow the moral model of the universal teachings of religions which believe in the value of human dignity and worth, and goodwill for others. These people seek to destroy others and the joy they should experience in everyday life interacting with others. They tear at an individual’s unique worth of existence, ability to create, ability to contribute to society, and their reserved private space needed to nourish their spirit and person. In all essence the people using the remote device pretend to be God and destroy the God in other people by mutilating human dignity. 

Any religion would agree that a human should not seek to attain equality to God. It would also be agreed upon that human dignity and worth should be given to all people. Furthermore, robbing and stealing is not part of following any moral law either. We are not meant to be watched. Only God has absolute knowledge of every detail of our life. Any human who strives to do this is morally breaking the commandment of being in competition with God, attracted to the desire of having all knowledge, all control, and all power over a human. God gives humans freedom, whereas the spy who in many ways acts as God with God-like access, restricts freedom. God gives worth and human value, whereas the spy tears down an individual. As people we are called to be in community with each other, working together, loving each other, and building up each other. The spy strives to pull a person out of the community, subject them to isolation, and breeds hate and contempt from the population. God gives each person unique gifts and attributes to share with others, whereas the spy steals attributes and tries to create a society where all have the same attributes, or one where the more affluent can have all attributes of any person, while the victim is stripped of all attributes they have. Besides being highly offensive and destructive to the individual, the spy is morally being offensive and destructive to God and His Creation.

Remote viewing undermines human relationships and the human dignity of life. If permission is not granted, a person should not be watched. Behavioral patterns, personal attributes and abilities are unique to each individual which should be appreciated and treasured, rather than stripped behind a device that redefines the person as an object of entertainment to be scorned and annihilated. Humans need personal space to be able to function naturally and interact with others. Privacy is necessary for creativity, for motivation, to put forth our ability, to have a healthy degree of self-confidence and independency as an adult, to grow as individuals, to heal, to be intimate with others, to be genuine, to be loving people, to have joy in life, and ultimately to survive.


Read more…Shop these products on Amazon!

The Stages of Psychosocial Development According to Erik H. Erikson
by Stephanie Scheck 

Patterns of Behavior:
Konrad Lorenz, Niko Tinbergen, and the Founding of Ethology

by Richard W. Burkhardt Jr.

Learning Cognitive-behavior Therapy: An Illustrated Guide
(Core Competencies in Psychotherapy)

by Dr Jesse H Wright MD PhD (Author), Gregory K Brown (Author),
Michael E Thase M D (Author), Monica Ramirez Basco PH D (Author), 
Glen O Gabbard (Editor)

Handbook of Surveillance Technologies: History & Applications
by J.K. Petersen (Author)

1984
by George Orwell


Return to article postings

Sex Trafficking and the Perils of Privacy Invasion

Technology has helped position the sex trafficking industry as a lucrative market since the first sex website launched online in 1994. Since then, the online sex trafficking industry has grown, offering more options for buying and selling people into sex slavery and a smorgasbord of illicit, sexual services to clients all over the globe. The process is simple and streamlined with its transactions, leaving those involved virtually untraceable. Sex traffickers can easily generate revenue by posting services and enticing clients with a variety of digital content to meet specific requests—all at the expense and damage of those involuntarily expected to perform.

The Online Market for Traffickers
Conducting business online is a quick way to manage trafficking with less of a chance of being caught. It’s the ideal marketing playground for sex; sellers can reach specific target audiences with online advertising, and buyers can search for sexual services as a match for their needs. For sellers, posting online sex trafficking ads is an inexpensive way to find women and children to be bought and sold for sex services. For buyers, it is impossible to distinguish between online ads offering services they seek and those which involve unwilling trafficked women and children as participants. Exploding with an exploitation of minors, 100,000 websites exist that are dedicated to child pornography. In addition to advertising minors for sex, Backpage.com, which has since been shut down, was netting $150 million in revenue per year from adult service ads and was the source of 73% of child trafficking cases (Equality Now, 2020). Craigslist also ranks high as a way for online sex traffickers to remain anonymous while soliciting business. Fortunately, as sites use more advanced methods of artificial intelligence and laws are enforced, online advertisements have a greater chance of being detected and removed.

Footage and Footprints of Live-Streamed Sessions
Responding to ads posted online, buyers find sellers online who offer live-streamed sessions. Chat sessions using webcams are used to build a virtual relationship between the performer and client. An online relationship is established, enticing continual business with promises of eventually meeting the person. Victims who are exploited are forced to be on camera to put on a “show,” which brings in $20–$150 on average to the seller. Even children are offered a small amount of money to be part of nightly “shows” (International Observatory Human Rights, 2019). Buyers search online for children within a certain age range or who have a certain appearance. The seller provides live footage for them to view based on what they are looking for. Sex trafficking is a global issue, but in the United States alone, 21% of those who are victim to sex exploitation are children, with 63% of videos containing children under the age of 8 years old (Nuix, 2019). The ease of digital platforms has opened up ways for online advertising, marketing and communication to help bring in more sales and deliver content to buyers.

The Dangers of Other Online Sexual Content
Feeding addictions, curiosity and loneliness, cybersex trafficking provides sexual content and views to buyers for their visual pleasure, satiating their sexual perversions. Women and children who are used as slaves for the business are exploited, forced to engage in cybersex activities out of fear of abuse or other threats by sex traffickers. Online content and interactions include chat sessions, photos, recorded videos, live-streamed webcam videos and sex camming, where the buyer watches in real time and can request performances (Fight the New Drug, 2019). Selling sexual content can be highly profitable for sellers. It is not unusual for a live sex video to bring in $400 in 45 minutes. The victims, while of high value to the sellers, are treated as worthless. Young women who have been coerced into this sex business seldom receive money for sexual services but are used for traffickers to make money received by clients. Many are beaten if they do not cooperate and some are forced to have sex 20–48 times per day (Trafficked No More). Sex trafficking is a global concern as the Internet is used to transfer sexual content worldwide.

A Focus on Sex Camming and Trafficking Using Remote Drones
Another method for traffickers is using unmanned aerial vehicles, or drones, to record live video of involuntary victims (Brookings, 2014). Thanks to aerial surveillance and remote applications, the target is able to be accessed live from anywhere. Even indoors within their own home, victims’ privacy is compromised while showering, undressing, using the toilet, having sex or just existing and the feed is streamed in full color with the ability for buyers to hear and speak to the victim. There is a limitless range to the accessibility of victims because they can be reached in any building and even outdoors in tents or at parks—anywhere electricity can be conducted, even through poles or trees outdoors. Friends or family members select the victim as the target without the victim’s permission. Additional recorded views are available online for purchase. Likewise, technology offers buyers the ability to X-ray the victim remotely to see through clothing and view inside the body to watch organs function and even interact with laser radiation to buzz them or pinpoint intimate body parts with a laser as they sleep. This form of sexual abuse and exploitation is nearly impossible to trace, and anyone can be made victim to this pervasive surveillance—anywhere and at any time—all for the benefit of those who have a device to invade others’ privacy for income and views. Although legislation is passed regulating the use of drones by the government, the general public being able to use drones as a means for trafficking is a concern that is overlooked.

Aperture With Legislation and Restrictions
In 2017, the government began to place a greater emphasis on online sex trafficking by passing the Fight Online Sex Trafficking Act (FOSTA). This marked significant progress in establishing legislation for social networks, causing them to have a greater responsibility to censor content posted and sex trafficking advertisements. Victims can find hope for justice as social network providers face tighter restrictions and heightened accountability.

 

References

Brookings. McNeal, G. (2014, November). Drones and aerial surveillance: Considerations for legislatures. Retrieved from https://www.brookings.edu/research/drones-and-aerial-surveillance-considerations-for-legislatures/amp

Equality Now. (2020). Human Trafficking & Online Prostitution Advertising. Retrieved from https://www.equalitynow.org/interrupting_the_vicious_cycle_of_online_sex_trafficking

Equality Now. (2020). Interrupting the Vicious Cycle of Online Sex Trafficking. Retrieved from https://www.equalitynow.org/interrupting_the_vicious_cycle_of_online_sex_trafficking

Fight the New Drug. (2019, April 11). Uncovering the Dark World of Trafficking in the Webcamming Industry. Retrieved from https://fightthenewdrug.org/uncovering-secret-world-trafficking-camming-industry

International Observatory Human Rights. Allen, C. (2019, March 7). The Role of the Internet on Sex Trafficking. Retrieved from https://observatoryihr.org/blog/the-role-of-the-internet-on-sex-trafficking

Nuix. (2019, July 16). Pogue, C. Continuing the Fight Against Cybersex Trafficking. Retrieved from https://www.nuix.com/blog/continuing-fight-against-cybersex-trafficking

Trafficked No More. Sex Trafficking States. Retrieved from http://traffickednomore.org//warning-signs/sex-trafficking-stats

Written for One Bread Foundation, Inc., June 2020


Learn more — Shop Amazon!

Sex Trafficking in the United States: Theory, Research, Policy, and Practice
by Andrea Nichols

Social Work Practice with Survivors of Sex Trafficking and
Commercial Sexual Exploitation

by Andrea Nichols, Tonya Edmond Ph.D., Erin Heil Ph.D. (Editors)


Camming

by Angela Jones


Return to article postings

 

Rape Part II: Stealing Someone’s Life

We think of rape as a sexual and physical act of non-consent. Can this word also be used to describe the non-physical violation of stealing someone’s life by spying, eavesdropping, sending dreams to inquire answers to probing questions, learning behaviors to master them, and having the goal of gaining absolute knowledge of every aspect of an individual without their consent? If a person is a criminal, and is under investigation by the FBI, there might be some leeway for this type of intrusive activity—with the goal to stop crime for the safety of others. For the average person however, doing this, is a way to rape a person’s life devaluing their human existence and worth.

Seeing Each Life as a Gift with Consent to Share
Each person is given the gift of life. We all have our individual paths and stories. Not all of this is to be shared as public knowledge. A movie called The Circle, is a very good example of what technology has the ability to do, to access anyone’s life at any time. There are benefits to the convenience and power of being able to know anything about anyone at anytime, but doing this desensitizes the value of human existence stripping us down to objects rather than a person. Some rather know all facts and intricate details about a person and then publicize these, rather than experience the beauty of the human spirit which is to be found in knowing an individual and the gift of revealing ourselves to others and sharing our uniqueness with others personally.

“To be part of someone’s life is a beautiful gift. To take the liberty of overstepping boundaries to partake in someone’s life without permission is another form of rape.”

There is a gift in the joy of sharing our stories and experiences to others ourselves. Part of being human is to also have the right to privacy and discretion in what we share. We allow people to have access to certain areas of our lives and withhold other areas to remain private. Our need for privacy stems from wanting to preserve our dignity. Another reason is that trust must be earned before certain people earn the right to know information. Other areas, which may be guarded the most, may be reserved only for self with our personal thoughts, relationship with God, intentions, and dreams. We set boundaries for our privacy when it comes to those areas which require more confidentiality. These areas are not for public knowledge. They may be with about financial information, information about our relationships, our deepest thoughts, desires, or creative ideas we have. There is an inner area of ourselves that should have the right to be withheld from other people who may want to pry. It is in this area where we develop ourselves. In fact, there probably is an entire psychology around this very topic. When what we value as private information is viewed without our permission, we are violated. When our behaviors and unique qualities are learned and duplicated by others, or our ideas and creativity are accessed before we share them, it no longer is our individually which is enjoyed and we are stripped. Instead of admiring what we contribute, the intent is to clone and cheapen what value we bring to the world. It is devaluing to what we contribute to the world. It can be devastating because it is what we are made of, our personality, our talents, our stories, our mannerisms, or anything else of our existence.

The Human Relationship is What Is Seen
The human relationship must be put first. Individuals who turn to remote devices to access other people’s lives remotely to spy and eavesdrop without permission are building habits of destruction. Using this application, they seek to learn everything about another person by watching them, accessing them without permission. Unconsciously they place themselves as more important than the other person, taking the liberty to view them, meanwhile trampling over dignity and human respect, and accessing what is not their right to access. In all essence, it is the infinite quest for knowledge they seek to acquire, which has been tantalizing to humans since the Garden of Eden. To have god-like access, almost equal to God himself, is magical. It is a way to “enter” into the life of another. Some people even become so addicted to this that it becomes the relationship. Just like a new-found porn, or entertainment TV show, the viewer can see into someone else’s life to be with them, silently viewing, or speaking real-time in a one-way conversation to the victim. To the victim, it is highway robbery of their life, and even their soul. Everything that composites the human life from eating, to dressing, going to the bathroom, what is written, created, experimented, and anything that nourishes individuality, and interactions with other humans is all accessible. All secrets are revealed, even if they aren’t secrets. All methods are learned. Learning and sharing these with others, the victim feels their soul as it is ripped and shredded. Not a second is private. It destroys new creativity to be watched. New creativity, which has always been protected by inventors or artists with trademarks for fear of being stolen, is all void. The rapists see new ideas and creativity the moment it is developed, even before it is close to being publicized and they publish it to others with this knowledge they obtain, even before it is fully-created, as if it is their right. Their right, as they see it, is to be all-knowing and all-deserving to be god-like. They use this information to build their popularity for the destruction of the victim. All experiments, new experiences, or anything which develops the person, are also violated. It stunts these creative moments—and who wants to try things as much when someone else is right overhead to view and steal the moment of inception. Joy and inspiration are severely quelched to a dull moment of pain, and withheld instead. The same happens with human relationships as they are overheard, viewed, and participated in as if it were an interactive sitcom. These relationships, no matter what kind, cannot stand a chance with 3rd parties witnessing them and intruding upon them. The addiction to trespassing on the life of another is one which devalues the human existence and multiplies with a plethora of consequences.

In all essence, being viewed, your life is no longer your own to experience and live. A person has to wonder why these intruders do not value their own life, spending time living it to its potential with all the experiences life has to offer, rather than spending their life viewing the life of another person. Secondly, you have to wonder why these offenders do not value the dignity and respect of human existence, instead overstepping these obvious boundaries, to invade upon another person’s life to destruct it. Stealing someone’s life is a form of rape. While it may not be sexual, the holistic experience is violated and damaged.

“When you touch someone’s life it is a privilege. When you touch someone’s heart it is a blessing. When you touch someone’s mind it is an honor. When you touch someone’s soul it is a triumph. When you touch someone’s spirit it is a miracle.”

—Clean Up Dallas with Culture and Kindness


Information Privacy Law (Aspen Casebook) 6th Edition
by Daniel J. Solove (Author), Paul M. Schwartz (Author)

Protection of Information and the Right to Privacy – A New Equilibrium? (Law, Governance and Technology Series (17)) 2014th Edition
by Luciano Floridi

Movie
The Circle
Starring: Emma Watson, Tom Hanks, John Boyega

Try Amazon Prime 30-Day Free Trial Offer. Sign Up Now!
The membership program offers special benefits including:
* Instantly watch thousands of movies and TV episodes
* Borrow Kindle books
* Get unlimited FREE two-day shipping (no minimum order size)


Return to article postings

 

 

Eyes Seeing You: Camera Invasion

The trend today is to use applications to view people remotely. In fact, as the latest enigma in viewing pleasure, its rankings are escalating higher than that of everyday TV shows. Why invest time watching sitcoms when you can watch those you love and care about live, spying on all the intricacies of their everyday life. Spying real-time, these applications have the ability to invade the privacy of anyone simply by entering in data. Accessing them anywhere, the viewer is able to view them as if a security camera were pointed directly on them in full zoom, showing all details, in full-color, and real-time. Not only can the person view live, but they are able to speak overhead, all from off-site. Most of these violators use it as entertainment or a type of porn, except it is worse than porn. With porn, women at least give have given permission to be seen either in magazines, online, or through video. Using their device to view remotely, users are easily fooled as repeated use becomes a way to join someone entering into their life, as a form of an imaginary dating or marriage relationship, accessing more details than if that were truly the case. The one-way relationship only exists in their mind however as they access another person’s life and drive an addiction of a need-to lust for knowledge. With the remote app, the victim’s entire life is invaded upon and stolen. Each second is able to be viewed from anywhere, and live—and by anyone for that matter who is given access. It gives a new meaning to rape of the human soul.

There are some things which should remain private and do not need to be known by others, such as how we go to the bathroom, nudity, personal conversations, and x-raying through clothes to view details to mock, shun, or compare. Those viewing redefine their understanding of humanity, with their preferred, new interpretation of what it means to interact with another human. As a complete insult to human dignity and human life, these have learned to see humans as less than humans, but rather as a remote TV show or a walking human object to know all the intricacies about. They label it as a division of anthropology, the art of studying of humans—and without permission, division it is. These prefer to strip down the human existence to a breathing corpse of a body, an object as something to disrespect and observe. The human soul is being beaten upon as the person assumes access to another’s life striving have equality to God. Who gives them this right? God as all knowing, has this top security-clearance. He knows and sees everything, and loves all He has created. Humans who take this liberty do not need all of this knowledge and violate human dignity. The victim is viewed and the shattering effects are qualified for ICU.

By diving into another’s world without permission, they are breaking up whatever relationship could have been or was. Abounding in excuses with reasons to justify it such as security, experience to be nude, or any other reason is just an excuse for their destruction. Without permission, none of these “reasons” can hold worth. Respecting boundaries are important especially when it comes to human dignity. Beyond being disrespectful, viewing someone without permission is the epitome of selfishness and unphysical rape. Looking into their own world to take a look at themselves, might do them a world of good, and be a better place to invest their time.  

What happened to asking “May I…?” What was more important was the selfishness of “I”.  The result is definitely: “can this” —by letting go of that one, and all of them who choose that approach, and walk away to wait upon what a higher standard sees—in person, with “May I?”.

—Clean Up Dallas with Culture and Kindness


Interested in reading more?…See related topics!

The Pertinence of Privacy and Permission

Boundaries we set for ourselves set a line between areas which we are comfortable allowing others to access and areas of no-entry where our self-worth and dignity are tread upon. Without boundaries, people can easily take advantage of us and cross into areas which would harm us or cause offense. It is healthy to have boundaries set. It defines the person and helps others find it easier to be more respectful.

Without realizing it, boundaries exist with expectations we have. Unless these are clearly stated, it is likely these boundaries will be breached because each individual’s definition of what is permissible is completely different. Usually, it is when these are crossed, and we are offended, that we finally state what our expectations are. It may take having these boundaries crossed by others before we even know how to define them. Likewise, it may take having boundaries crossed to learn to redefine our limits we have and adjust them.

For those who already have a good idea of their own personal boundaries, vocalizing these helps clarify them to others. The most common areas we have boundaries for are:

  • Affection/Sexual (unwanted touches, sexual molestation, rape, sexual boundaries, boundaries of relationships with those outside of relationships, acceptability within relationships)
  • Dignity/Self-respect/Worth (verbal statements, actions of disrespect, public humiliation, disowning, belittling, slander, stripping of clothes, comparing to shun, insulting mental, physical, or intellectual ability, insulting physical features, degrading, stating incapability or unworthiness)
  • Financial (discussing financial information, addressing wealth or poverty, discussing paycheck or salary information, worth of property)
  • Beliefs (religious beliefs, political beliefs, sexual beliefs, ceremonies, or opinions especially which one feels strongly about, respecting the practices of religions and ceremonies)
  • Sensitive subjects (anything which might not be openly discussed or the party is hesitant to talk about, personal matters, family matters, etc)
  • Property (cars, electronics, houses, assets, or what a person does not have)
  • Knowledge of personal information (relationship, medical, personal, social, private information, hygiene, showering, bathroom and toileting, weight, anything sexual related, habits, addictions, struggles)
  • Respect to elders or leaders (parents, senior level family members, managers, political or religious office)
  • Respect to party and minors (adjusting the nature of conversation for the parties intended of any age level, determining what is appropriate for minors, and children of certain age levels)
  • Spying and Eavesdropping (eavesdropping and snooping on someone’s life, spying, using a remote application to view another person’s life, reading other’s correspondence or accounts written or electronic, gathering information of any kind without permission by witnessing, reading, or listening)
  • Failures and successes (losses, relationship breakups or divorce, miscarriages, addictions, bankruptcy, foreclosures, job loss, successful gains especially which put a person at an advantage over others)
  • Associations (associations of any kind for the sake of gossip, wealthy associations, less fortunate, mixed racial, or those which may be controversial)
  • What we share being shared to others (sharing information you were given to others)
  • Generosity (charitable givers may want to remain anonymous)
  • How we are spoken to by others (speaking respectfully to others)
  • Intangibles we value (beliefs, values, ethics, love for God, love for others, family bonds, friendships, reasons for why, rapport, business acumen, attitude, your process, reason for thoughtfulness, ability to lead, separating business and personal)

Boundaries are limits. It is a stopping point which must be observed or else an offense is committed as the person trespassing crosses into an area which is off limits without permission to access.

The more prominent the individual, the easier it is to acknowledge their boundaries, because of their position and for an individual’s own benefit or recognition. For the rest of those in society, we consciously make a decision to respect other people’s boundaries because we value them and find them important simply because of their human existence. Respecting boundaries is a way to give dignity and self-worth to the person. If these are crossed by accident, then an apology is due, as the offender makes haste to return back to what is acceptable either acknowledging that the boundary was crossed, or to ask for permission for an exception to be made. This is good etiquette.

In an idealistic society there would not be any boundaries at all. For the free-spirited person, this is an enchanting idea. However, this utopia can only exist if basic respect is practiced by all, in a society of clones. As unique individuals we all approach “free-will” differently. Some are more conservative, while others will live more liberally. With different life experiences, each person has different boundaries. The common ground can only be found in respecting these boundaries to give worth to the person’s human existence as a unique creation that deserves respect.

—Clean Up Dallas with Culture and Kindness

This month’s topic “May I”, addresses the importance of boundaries and asking permission in everyday life situations, dating, when borrowing property, observing others, and the effects when boundaries are tread upon. Boundaries and privacy are important! Good etiquette asks “May I” and respects others!

Follow Clean Up Dallas with Culture and Kindness on Facebook and LinkedIn and @cultureofkind on Twitter, Pinterest, and YouTube.


Learn more… Search for these on Amazon! 

Books
Boundaries Updated and Expanded Edition:
When to Say Yes, How to Say No To Take Control of Your Life

by Henry Cloud and John Townsend

A Young Woman’s Guide to Setting Boundaries:
Six Steps to Help Teens *Make Smart Choices *Cope with Stress *
Untangle Mixed-Up Emotions

by Allison Bottke

Invasion of Privacy: How to Protect Yourself in the Digital Age
by Michael Hyatt

Privacy in the Age of Big Data:
Recognizing Threats,  Defending Your Rights, and Protecting Your Family
by Theresa Payton

Saving Face: How to Preserve Dignity and Build Trust
by Maya Hu-Chan

Video
The Circle
Starring: Emma Watson, Tom Hanks, John Boyega


Return to article postings

 

 

Leading a Restoration of Dignity

Digging into dignity of a person comes in many forms. At a minimum, it may be a few words in jest not meant to be disrespectful. At its worse, it is disowning the value of a human person and dishonoring their very existence.

An individual has dignity when they hold self-worth despite what others say or do. Fig leaves are a symbol of the first attempt of dignity after the fall of Adam and Eve from the Garden of Eden. As you can see in 1 Corinthians 12:23, for those who read the Bible, those parts which are less honorable are clothed, so that they may have greater honor. Whether it is sensitive matters of areas of our life or private areas of our bodies, choosing to keep these covered is part of maintaining our human dignity. While each person may have a different degree of what is acceptable to them, it should be respected that the other person does not have an equal degree of liberal dignity standards. For example, if a person is stripped and guided around in public without clothes on against their will, that would be an insult to that person’s human dignity. Watching a person going to the bathroom or showering without permission is an insult to human dignity. This is taken a step further would be even more insulting to share details of this with others. Each culture has boundaries in place to where dignity is maintained and where it’s tread upon, with most of these boundaries agreed upon throughout the world.

Having a good attitude when there is a loss, is a form of maintaining dignity. Perhaps, it is losing a contest and tossing away pride to shake the other’s hand. It may be knowing that you were called on a bad action and then come forward with it to own it. It is taking what might be viewed as shame and turning it over with ownership, choosing the higher road. 

Lack of dignity is found in many situations. A person who is unclothed and is viewed without permission, a women who is raped without her consent, the person who is homeless who is despised, or a person is treated less than equal to the general population even if they blend in, or where lack of ability or lack of physical or mental perfection is found in an individual and is mocked. It is the person who is spit on because of differences in belief, race, ability, or physical attributes. It is spying and eavesdropping invading the privacy of another, revealing trite acts of normal human daily functions such as toileting or other intricacies to disgrace someone, speaking crassly or of taboo topics when higher etiquette and conversational topics are expected. It is misuse of the human body of another person in its normal functions. It is comparing against what cannot be met and repeatedly told ‘not adequate’. Lack of dignity is any situation where a person is not respected when respect is due given.

As people who encounter other people every day, we can choose to be leaders or bystanders when we notice this. What makes a great leader is one who notices wrong and stands for what is right. It is refusing disparagement, the publication of false and injurious statements that are derogatory of another’s property, business, or product. It is the person who advocates change to make a difference for the good-will and safety of all. Dignity gives human worth and honor to each person and protects that which they choose to keep reserved.

–Clean Up Dallas with Culture and Kindness

 

I encourage everyone to be a source of inspiration to all you meet to change the current culture where dignity is lacking.  Every day I encounter dignity compromised in speech with segregation and discriminatory hate statements. Remote access given to view me live anywhere using cameras and cell phone apps with thousands who have had illegal access to view and comment live overhead to create psychologically abusive environments that cannot be escaped from. On average 6-10 people have access a day overhead, with over 50 a month and additional people added almost daily. Information is revealed that should not be anyone’s concern to publicly shun and humiliate to the entire DFW metroplex which I hear at every retail store and every place I go to. Known people rather speak remotely breaching the privacy overhead in the ceiling than spend time in person and curtail any new acquaintances to cause a life of isolation. Many groups of people have been involved in sexual crimes spraying me unconscious as a means for fun, such as a recent event with 20 rapists who pulled me out of my car and transported me to 3 locations for 20 rapes in one night, and previously other sexual crime parties of perversion and rape, at several places I’ve lived the last decade. The top stalkers use radiation assaults to abuse me overhead almost every night buzzing my body out of punishment or to wake me up. They hate my reproductive system and will use pinpoint lasers to touch body parts, use radiation to buzz, microwave radiation to expand organs, etc. They have used sprays, Taser guns, smelling objects, and hypnosis to knock me unconscious. They use transcendental dreams to strip my soul as I sleep. They inquire questions and set scenarios as they seek truths which may or not be the case and comment on what they observed as I wake up. These same people, with their propaganda have caused a discrimination issue in 56 jobs where I am hired to be publicly humiliated and let go within a day or less on average. Employers this year are even delaying paychecks by months after doing this. Despite constant reports it is all considered a civil matter, and with no means for defense, it has been a bombardment of hate, violation, and oppression for the last 13 years. These are my family members, former friends, priests, and other people. Every alive person I’ve every known has been involved who these organizers have recruited. All new employers or associations are given access as well. Standards of human dignity has completely escaped for these people. Thousands have been involved here in this area. How can dignity and privacy be elevated to a proper level of respect and value for each other?


Shopped Amazon for these books!

Audible Audiobook
Breaking Ranks: Dignity For All-audiobook

by Robert Fuller, Michael Toms

Book
Identity: The Demand for Dignity and the Politics of Resentment

by Francis Fukuyama, P. J. Ochlan, et al.


Audible – Audiobooks Subscription Offer
Try Audible and Get Two Free Audiobooks
Audible, an Amazon company, offers the world’s largest selection of digital audiobooks and spoken word content. With Audible, customers can listen anytime and anywhere to professionally-narrated audiobooks across a wide range of genres.


Return to article postings

 

It’s Sensitive Man

Q & A of Making Sense of the Sensitive

 

Q: I am concerned about a stranger, and want to help, but I am not sure of the best way to approach the person to find out how I can help. What do you suggest?

A: There is a difference between prying and sincerely wanting to get involved to express concern and help someone. First, start with a basic question. Listen and watch for indications of how the person is reacting as you converse. If the person is open to the way the conversation is progressing, continue with further investigation asking more specific questions. If the person becomes hostile or abrupt, then back out of the discussion and change the topic. You can try to come back to test the waters again later if the person seems more receptive. It is always a good idea to be sincere and warm in your approach. People can usually tell if you are being nosy or if you truly care. Once you are able to determine what the situation is, express compassion and ask politely how you can help. It is kind and thoughtful to follow up later if you are able to.

Q: What is the proper way to confront gossip?

A: While confrontation is typically not recommended, when it comes to gossip it is best to confront the gossiper and address it. By ignoring and not addressing it, the gossip being said results in being represented as being truth.

Q: How do you politely ask someone to stop swearing or using inappropriate references?

A: Ask the person to please stop using language around you. Tell them that the references being made are highly offensive and inappropriate.

Q: What is the best way to address emotional relationship issues?

A: Emotional relationship questions and conversations can be delicate situations. Follow the rule of 3 C’s. Current, Concise, and Continuity. Focus on what is current, not the past. Be concise. State a continuity plan of what you would like to see moving forward. Plan for a quiet place to have a private conversation and be honest, welcoming open communication. Always ask questions with kindness and respect.

Q: How do you effectively ask someone to stop gossiping or spreading rumors?

A: If a person is igniting gossip, there is usually something missing within that individual, such as a lack of self-esteem or a desire for popularity. Try to compliment the person and build them up, countering their negativity. Ask the person to stop, explaining how the gossip is damaging and not appropriate.

Q: How can a person communicate with the highest level of dignity to a person?

A: The best way to communicate to someone with the highest level of dignity and worth is speaking directly to the person with sincerity, respect, and value.

Q: Is there a checklist of questions I can routinely ask myself to make sure I am being kind to myself?

A: No matter what your state in life is, there is a responsibility to take time to care for yourself. Being kind to yourself means fulfilling your basic needs, as is necessary to human existence, and making time for yourself. Think of how you can rejuvenate your energy and spirit. Take time for yourself by treating yourself, taking a break, making time for a nap, relaxing, spending quiet time in meditation, or doing something you enjoy. Taking care of yourself on a regular basis makes being kind to others easier.

Q: How does a person state a complaint about something which is offensively affecting others?

A: The kindest and most polite way to address this is to start with a comment addressing the oblivion, stating what the offense is resulting in, followed by the request. For example, a person may be wearing a strong scent. Rather than responding with a rhetoric statement or dramatic remark, you could say, “I don’t know if you realize how strong that scent is—you might consider using it more sparingly.” or “There have been some complaints from people who are having a reaction to that—and I’d appreciate if you’d cut back.”

Q: I am not in agreement with how someone believes. I feel strongly about this and want to say something. Normally, I blurt my opinion out unsolicited. How can I state what is on my mind in a more kind manner?

A: It is considered impolite to tell people “You should do…”. No one has the right to tell someone how to live their life. The best way to state your opinion, or complaint, is to first state what does work and then follow by saying what doesn’t work. This is considered constructive criticism. Invite open discussion if you are able to. This is the most kind and considerate way to address personal and professional matters of differing opinion.

Q: What is the correct way to respond to a rude statement?

A: Treating offenses as accidents, rather than offenses, shows you believe the best in a person. It is a polite way to give the offender a way to back down. Politeness usually has a higher success rate than responding to rudely to rudeness.

Q: Is it polite to give advice to someone even if it is for improvement?

A: In most cases, no. However, if the advice is welcome from someone who you are already close to, then it should be done with humility and with tactfulness.

Q: How do you respond to let someone know that a question is not welcomed?

A: Respond to unwelcome questions by thanking the person and then stating an appreciation that they asked, without satisfying them with an answer. For example, you could say: “Thank you, I know you mean well.” or “Thank you for taking an interest.”. Another way to respond is with an irrelevant reply. A long pause before responding to indicate disapproval is also a way to responsd. These responses should suffice to indicate that the question is not welcomed. Keep in mind that there is no need to humiliate the person for being nosy. However, it is not out of line to state that they should have more consideration in the future from asking such an invasive question.

Q: I am often asked questions which I do not know how to respond to based on the circumstances. Do you have any suggestions?

A: Try non-verbal responses such as raising your eyebrows or giving a mysterious look or smile.

Q: When a conversation is beginning to turn into gossip, what is a way to stop this?

A: Two replies you can say to counter gossip are:
“Does that person know you are telling me this? Because we are good friends and I wouldn’t want to have that person think I am talking behind their back.” or “Please do not put any ideas about that person in my head. I will not carry around a conclusion about another person without sharing it with them.”

Q: What recommendations are there to responding to anger with kindness?

A: Giving a person or yourself time and space to cool down, is an effective and kind response to anger.

Q: I have noticed that people have differing views on privacy of others. How can there be more sensitivity to the kindness of privacy of human lives and relationships?

A: It is not just unkind, but extremely rude to intrude on another person’s privacy. Privacy comes in many forms. Having individual privacy or privacy within relationships is a necessary part of life. Intruding on this ruins intrinsic joys, and the very essence of the human spirit. Examples of privacy could be a new friendship, a couple kissing, buying a present for someone, having a conversation with a family member, praying, being creative, writing, expressing love for another, or other personal moments in a person’s life. Responding with sensitivity to these private moments means averting the eyes, asking permission before taking the liberty to join in, and declining to trespass given the opportunity. When noticing someone violating the privacy of another, be sensitive to this by encouraging them to kindly stop out of respect for the other person.

Be Cultured. Be Kind.
@cultureofkind

[written for @cultureofkind]


Shop these books on kindness and respect…