{"id":1470,"date":"2013-08-27T09:30:09","date_gmt":"2013-08-27T13:30:09","guid":{"rendered":"https:\/\/www.mysecuritysign.com\/blog\/?p=1470"},"modified":"2023-10-19T07:28:31","modified_gmt":"2023-10-19T11:28:31","slug":"why-we-never-evade-surveillance","status":"publish","type":"post","link":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/","title":{"rendered":"Why we can never really evade surveillance"},"content":{"rendered":"<p>One July day in San Francisco, writer Kevin Roose tried to escape everyday surveillance for a 24 full hours. He wanted to do it while living his regular, daily life: checking the internet, posting to Twitter from his cell phone, riding public transportation and the like. He did not resort to wilderness hermitage.<\/p>\n<p>The experiment, which he published in a three-part series in <i>New York <\/i>magazine (<a href=\"https:\/\/nymag.com\/intelligencer\/2013\/07\/surveillance-free-day-part-i.html\" target=\"_blank\" rel=\"noopener noreferrer\">I<\/a>, <a href=\"https:\/\/nymag.com\/intelligencer\/2013\/07\/surveillance-free-day-part-ii.html\" target=\"_blank\" rel=\"noopener noreferrer\">II<\/a>, <a href=\"https:\/\/nymag.com\/intelligencer\/2013\/08\/surveillance-free-day-part-iii.html\" target=\"_blank\" rel=\"noopener noreferrer\">III<\/a>), chronicled all the usual suspects. He puts his cell phones into aluminum foil packets, fashions himself a surveillance deflecting hat, and changes his route to the coffee shop to avoid ubiquitous on-street surveillance cameras.<\/p>\n<div id=\"attachment_1471\" style=\"width: 522px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/512px-Webcam000c1.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1471\" class=\"size-full wp-image-1471 \" src=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/512px-Webcam000c1.jpg\" alt=\"A web cam\" width=\"512\" height=\"403\" srcset=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/512px-Webcam000c1.jpg 512w, https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/512px-Webcam000c1-300x236.jpg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><p id=\"caption-attachment-1471\" class=\"wp-caption-text\">Our personal gadgets are the hardest-working surveillance units. From&nbsp;<a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Webcam000c1.jpg\" target=\"_blank\" rel=\"noopener noreferrer\">Simon.zfn<\/a><\/p><\/div>\n<p>He turned off his Xbox and any device that tracked his whereabouts and movements, like his step-counter. Then he had to cover all the tiny cameras everywhere in his house \u2013 the ones in his laptop and phone chief among them. Deeply curious and very savvy hackers could gain access to the electric cameras remotely and just sit there, watching him. Can\u2019t have that.<\/p>\n<p>Laptops and cellphones, as we are now all painfully aware in the post-Snowden world, are the massive gaping holes in our personal privacy.<\/p>\n<p>To make these all seeing eyes a little less sharp, Roose enlisted the help of professionals: the men behind SnoopWall and <a href=\"https:\/\/www.silentcircle.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Silent Circle<\/a>, both of whom specialize in shrinking a person\u2019s surveillance footprint (and telling the deluded that there is, literally, no way of completely eliminating it). Roose then downloads a shockingly large number of apps to help scrub his ample (but largely average) cyber trail.<\/p>\n<div id=\"attachment_1472\" style=\"width: 522px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/360566570_c32a5722bd_z.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1472\" class=\"wp-image-1472 \" src=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/360566570_c32a5722bd_z.jpg\" alt=\"A close-up of crumpled tin foil. \" width=\"512\" height=\"342\" srcset=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/360566570_c32a5722bd_z.jpg 640w, https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/360566570_c32a5722bd_z-300x200.jpg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><p id=\"caption-attachment-1472\" class=\"wp-caption-text\">Wrapping cellphones in tin foil will prevent outside entities from gleaning information from it without your knowledge. From&nbsp;<a href=\"https:\/\/www.flickr.com\/photos\/clevergrrl\/360566570\/\" target=\"_blank\" rel=\"noopener noreferrer\">Heather Hopkins<\/a>.<\/p><\/div>\n<p>There are apps that encrypt text messages and emails, there\u2019s Bitcoin currency, and another app that bounces his VPN to make it look like he\u2019s using the internet from Bangladesh or Uganda or Brazil, even as he\u2019s crouched over his laptop in a mid-sized American city.<\/p>\n<p>Armed with all these apps and complicated software, however, Roose suddenly had something in common with online child pornographers and other people who truly have something to hide. He comes to this conclusion: \u201cThis is the catch-22 of the modern surveillance state \u2014 try to leave it and you just end up closer to its center.\u201d Through the Snowden leaks, we know that the NSA has a program to monitor people who actively use and search for encryption and counter-surveillance tools. The very technologies made to hide you, are the ones that make you suspicious.<\/p>\n<div id=\"attachment_1473\" style=\"width: 522px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/3744953433_e3b523e24d_z.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1473\" class=\"wp-image-1473 \" src=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/3744953433_e3b523e24d_z.jpg\" alt=\"Surveillance cameras mounted on the side of building. \" width=\"512\" height=\"342\" srcset=\"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/3744953433_e3b523e24d_z.jpg 640w, https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/3744953433_e3b523e24d_z-300x200.jpg 300w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><p id=\"caption-attachment-1473\" class=\"wp-caption-text\">The all-watching eye of surveillance cameras. From&nbsp;<a href=\"https:\/\/www.flickr.com\/photos\/jonathanmcintosh\/3744953433\/\" target=\"_blank\" rel=\"noopener noreferrer\">Jonathan McIntosh<\/a>.<\/p><\/div>\n<p>Roose finds some comfort in the fact that within the giant tidal wave of information that the government gets, he\u2019s simply not that interesting. Muslims, investigative journalists and the assassination-minded may have to worry, but boring law-abiding citizens can take comfort in the idea that they aren&#8217;t worth spying on. For now.<\/p>\n<p>But, anonymity by way of living a boring life is a flimsy protection of privacy, and smacks of the sort of gilded rationalization that paves the road to the erosion of basic civil rights.<\/p>\n<div class=\"related-products\">\n<h3>Like this topic? Check out our related products:<\/h3>\n<ul>\n<li>\n<div class=\"wraptocenter\"><a href=\"\/sur\/24-hour-surveillance-signs\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/images.mysecuritysign.com\/img\/sm\/S\/CCTV-Surveillance-Camera-Sign-S-5256.gif\" alt=\"\"><\/a><\/div>\n<p>24 Hour Surveillance signs<\/li>\n<li>\n<div class=\"wraptocenter\"><a href=\"\/eyes-on-signs\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/images.mysecuritysign.com\/img\/sm\/K\/you-are-under-surveillance-sign-k-9829.gif\" alt=\"\"><\/a><\/div>\n<p>Eyes on signs<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>One July day in San Francisco, writer Kevin Roose tried to escape everyday surveillance for a 24 full hours. He wanted to do it while living his regular, daily life: checking the internet, posting to Twitter from his cell phone, riding public transportation and the like. He did not resort to wilderness hermitage. The experiment, [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":1471,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,11],"tags":[90,92,91],"class_list":["post-1470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-surveillance","category-trespassing","tag-kevin-roose","tag-silent-circle","tag-snoop-wall"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why we can never really evade surveillance -<\/title>\n<meta name=\"description\" content=\"When a New York Magazine writer tried to live surveillance-free he found it was a lot more difficult than you might think.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why we can never really evade surveillance -\" \/>\n<meta property=\"og:description\" content=\"When a New York Magazine writer tried to live surveillance-free he found it was a lot more difficult than you might think.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trespassingsignscctvsigns\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-27T13:30:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-19T11:28:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/211288.p3cdn1.secureserver.net\/wp-content\/uploads\/2013\/08\/512px-Webcam000c1.jpg?time=1722559791\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"403\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aurora\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mysecuritysign\" \/>\n<meta name=\"twitter:site\" content=\"@mysecuritysign\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aurora\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/why-we-never-evade-surveillance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/why-we-never-evade-surveillance\\\/\"},\"author\":{\"name\":\"Aurora\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/6d51df47d53b37640cc277c19a5407b1\"},\"headline\":\"Why we can never really evade surveillance\",\"datePublished\":\"2013-08-27T13:30:09+00:00\",\"dateModified\":\"2023-10-19T11:28:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/why-we-never-evade-surveillance\\\/\"},\"wordCount\":571,\"image\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/why-we-never-evade-surveillance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/08\\\/512px-Webcam000c1.jpg\",\"keywords\":[\"kevin roose\",\"silent circle\",\"snoop wall\"],\"articleSection\":[\"Surveillance\",\"Trespassing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/why-we-never-evade-surveillance\\\/\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/why-we-never-evade-surveillance\\\/\",\"name\":\"Why we can never really evade surveillance -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/why-we-never-evade-surveillance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/why-we-never-evade-surveillance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/08\\\/512px-Webcam000c1.jpg\",\"datePublished\":\"2013-08-27T13:30:09+00:00\",\"dateModified\":\"2023-10-19T11:28:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/6d51df47d53b37640cc277c19a5407b1\"},\"description\":\"When a New York Magazine writer tried to live surveillance-free he found it was a lot more difficult than you might think.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/why-we-never-evade-surveillance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/why-we-never-evade-surveillance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/08\\\/512px-Webcam000c1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/08\\\/512px-Webcam000c1.jpg\",\"width\":512,\"height\":403,\"caption\":\"Our personal gadgets are the hardest-working surveillance units. Image by Simon.zfn\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/6d51df47d53b37640cc277c19a5407b1\",\"name\":\"Aurora\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why we can never really evade surveillance -","description":"When a New York Magazine writer tried to live surveillance-free he found it was a lot more difficult than you might think.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/","og_locale":"en_US","og_type":"article","og_title":"Why we can never really evade surveillance -","og_description":"When a New York Magazine writer tried to live surveillance-free he found it was a lot more difficult than you might think.","og_url":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/","article_publisher":"https:\/\/www.facebook.com\/trespassingsignscctvsigns","article_published_time":"2013-08-27T13:30:09+00:00","article_modified_time":"2023-10-19T11:28:31+00:00","og_image":[{"width":512,"height":403,"url":"https:\/\/211288.p3cdn1.secureserver.net\/wp-content\/uploads\/2013\/08\/512px-Webcam000c1.jpg?time=1722559791","type":"image\/jpeg"}],"author":"Aurora","twitter_card":"summary_large_image","twitter_creator":"@mysecuritysign","twitter_site":"@mysecuritysign","twitter_misc":{"Written by":"Aurora","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/#article","isPartOf":{"@id":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/"},"author":{"name":"Aurora","@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/6d51df47d53b37640cc277c19a5407b1"},"headline":"Why we can never really evade surveillance","datePublished":"2013-08-27T13:30:09+00:00","dateModified":"2023-10-19T11:28:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/"},"wordCount":571,"image":{"@id":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/512px-Webcam000c1.jpg","keywords":["kevin roose","silent circle","snoop wall"],"articleSection":["Surveillance","Trespassing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/","url":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/","name":"Why we can never really evade surveillance -","isPartOf":{"@id":"https:\/\/www.mysecuritysign.com/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/#primaryimage"},"image":{"@id":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/512px-Webcam000c1.jpg","datePublished":"2013-08-27T13:30:09+00:00","dateModified":"2023-10-19T11:28:31+00:00","author":{"@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/6d51df47d53b37640cc277c19a5407b1"},"description":"When a New York Magazine writer tried to live surveillance-free he found it was a lot more difficult than you might think.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mysecuritysign.com/blog\/why-we-never-evade-surveillance\/#primaryimage","url":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/512px-Webcam000c1.jpg","contentUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/08\/512px-Webcam000c1.jpg","width":512,"height":403,"caption":"Our personal gadgets are the hardest-working surveillance units. Image by Simon.zfn"},{"@type":"WebSite","@id":"https:\/\/www.mysecuritysign.com/blog\/#website","url":"https:\/\/www.mysecuritysign.com/blog\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mysecuritysign.com/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/6d51df47d53b37640cc277c19a5407b1","name":"Aurora"}]}},"_links":{"self":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/1470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/comments?post=1470"}],"version-history":[{"count":8,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/1470\/revisions"}],"predecessor-version":[{"id":4637,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/1470\/revisions\/4637"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/media\/1471"}],"wp:attachment":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/media?parent=1470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/categories?post=1470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/tags?post=1470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}