Free Essay

Privilege

In:

Submitted By Maxxxx213
Words 967
Pages 4
In recent years, the private educational institutions have opened up more to minorities and women, yet even though this trend has been expanding, the inequality in society has increased. Khan studies these parallel trends and struggles to determine how they could simultaneously exist. In order to do this he returns to St Paul’s where he attended high school and where he most acutely felt the affects of the inequalities within a meritocracy. Many of the students attending St. Paul’s came from families that were already wealthy, already held high positions in society and were simply hoping to pass this on to the next generation. “St. Paul’s helped transfer the birthright of each new group of students into credentials, relationships, and culture, all of which ensured their future success.” (Khan 13) St Paul’s however strives to have their student body represent the population of the world, with both the wealthiest and the poorest, female and male, and students of all races living together. Khan works to present the idea of a “‘new elite’ – a group of advantaged youths who don’t quite reflect what we typically imagine when we conjure up a vision of the well-off.” (Khan 16) These “new elite” are not all white or from rich families or live in picturesque houses in New England. Instead, this group is diverse, hard working, and believe that they can achieve upward mobility if they are determined enough to do so. Privilege is Shamus Khan’s attempt to understand and explain this new elite and to make sense of the ever-widening inequality that pervades American culture.
Looking at history, we can begin to understand the divide between title and wealth and the phenomenon of increasing inequality occurring simultaneously with increasing diversity. “…the Gilded Age elites became a distinct class, they removed themselves socially, culturally, and even spatially from their workers. Thus at the same time as the world became economically more open, other forms of social closure emerged.” (Khan 26) When Khan returns to St Paul’s as a faculty however, he is shocked to find that the sequestration he endured as a minority student no longer exists; instead, the divide is now between the students who attend the school based on birthright and those who were accepted based on hard work. They “believe that their place among the chosen few is something that has not been given to them but rather is something that they have earned.” (Khan 73) Thus the nature of the relationships between the students has changed dramatically as well.
There are clear boundaries between the students, staff and faculty. While the students often feel very connected to the custodial staff, they very rarely know anything about their lives. The staff serve as a support system to the students yet the relationship is most often quite one-sided. There is a sense of intimacy between the students and the faculty however, where the students often feel that their lives and ways of thinking were altered throughout their classes and credit their teachers with that accomplishment. These intense and influential experiences occurred for many of the students at St Paul’s and they “emerged from a set of dense, overlapping, and often contradictory relationships.” (Khan 68) The students learn the dynamics of complex interaction within these relationships and the “closeness” they feel with the faculty is often quite unique to the private boarding schools. Their authority is respected but the interactions between students and faculty strive to ignore the authority, to acknowledge the hierarchy but keep it invisible.
The students worked hard to avoid highlighting the distinctions between “them” and the rest of the world. “They instead consumed across cultural boundaries. They learned to absorb it all and to want to absorb it all.” (Khan 101) The students want to make the playing field as even as possible and to suggest that it is not the labels on the clothes you wear or the amount of money in your bank account that matter, instead it is the person behind all of this. However, we would be naïve to assume that appearances and social and class distinctions did not matter.
Separating the students he observes into social categories such as race and gender, Khan is better able to examine the performativity of privilege. Khan argues that race does in fact influence the interactions of students. He states that non-whites were seen as the experts on pop culture but that this expertise was demeaning. “In being seen as the legitimate and authentic carriers of popular culture, non-white’s were given power, but ironically such power cut against the expression of privilege.” (Khan 110) Another source of evidence of the racial divide at St Paul’s was the inability of many students to see past the differences in physical appearance of race. “While class distinctions may be able to ‘disappear’ or, better, be imagined away in interactions, race cannot.” (Khan 110) thus creating social separation as well. Social divisions also occurred due to gender, evident in that the girls must work harder than the boys on campus, and “having to work harder makes it harder for girls to display the requisite St. Paul’s ease.” (Khan 121) Privilege is a performance according to Khan, and gender, race and even the curriculum at St Paul’s drive the portrayal of this elite culture. The behavior of the elite at St Paul’s and at many private school systems is both defined and dependent upon the performance of the students in terms of reputation, wealth, culture, and above all, privilege. The only way that the elite or the poor are determined is in comparison to each other. “Elites are elites not because of who they are but because of who they are in relation to other social actors and institutions. Elites are made.” (Khan 205)

Similar Documents

Free Essay

Parliamentary Privileges

...INTRODUCTION According to Erskine May, "Parliamentary privilege is the sum of the peculiar rights enjoyed by each House collectively... and by members of each House individually, without which they could not discharge their functions, and which exceed those possessed by other bodies or individuals. Thus, privilege, though part of the law of the land, is to certain extent an exemption from the general law. Certain rights and immunities such as freedom from arrest or freedom of speech belong primarily to individual members of each House and exist because the House cannot perform its functions without unimpeded use of the services of its members. Other such rights and immunities such as the power to punish for contempt and the power to regulate its own constitution belong primarily to each House as a collective body, for the protection of its members and the vindication of its own authority and dignity. Fundamentally, however, it is only as a means to the effective discharge of the collective functions of the House that the individual privileges are enjoyed by members. "When any of these rights and immunities is disregarded or attacked, the offence is called a breach of privilege and is punishable under the law of Parliament. Each House also claims the right to punish as contempt actions which, while not breaches of any specific privilege, obstruct or impede it in the performance of its functions, or are offences against its authority or dignity, such as disobedience to its legitimate...

Words: 529 - Pages: 3

Premium Essay

White Privilege

...White privilege otherwise known as white skin privilege is a term for societal privileges that benefit white people in western countries beyond what is commonly experienced by the non-white people under the same social, political, or economic circumstances. These privileges are unearned and are distributed based on values of the dominant group, which in the west is white people. According to McIntosh and Lee, whites in a society considered culturally a part of the Western World enjoy advantages that non-whites do not experience. This leads to the controversy over whether or not White people should be able to enjoy these privileges. The term denotes both obvious and less obvious passive advantages that white persons may not recognize they have, which distinguishes it from overt bias or prejudice. These include cultural affirmations of one's own worth; presumed greater social status; and freedom to move, buy, work, play, and speak freely. The effects can be seen in professional, educational, and personal contexts. The concept of white privilege also implies the right to assume the universality of one's own experiences, marking others as different or exceptional while perceiving oneself as normal. Some critics argue that the term uses the concept of "whiteness" as a proxy for class or other social privilege or as a distraction from deeper underlying problems of inequality. Others argue that it is not that whiteness is a proxy but that many other social...

Words: 286 - Pages: 2

Premium Essay

White Privilege In Schools

...disadvantages, worthless, and the list could go on with even more words that relate to racism. Jobs, acceptance, equality, benefits, this list is harder to label is it not? White Privilege is just as real as racism, but not as apparent. According the University of Dayton’s online dictionary, White Privilege is defined as, “a right, advantage, or immunity granted to or enjoyed by white persons beyond the common advantage of all others; an exemption in many particular cases from certain burdens or liabilities,” (“white privilege”). White Privilege is a subject rarely covered by educators due to the difficulty students’ have understanding it; therefore, resulting in a lack of awareness. White Privilege, unlike racism,...

Words: 985 - Pages: 4

Premium Essay

My Reaction of White Privilege by Peggy Mcintosh

...“White Privilege” Topic: McIntosh, Peggy “White Privilege” The author made use of the phenomenon of male privilege to bring out the fact that white privilege is similarly denied and unconsciously protected. By describing how male privilege has rooted in our society, and how men denied this phenomenon by avoiding acknowledgement of the issue, the author explained the development of white privilege. According to the author, whites are taught not to recognize their privileges. They are disciplined in a way that they are unable to recognize racism as something that puts them at an advantage while as a result, put others at a disadvantage. They do not realize the existence of unearned skin privilege and therefore do not feel the need to stop it. By identifying the daily experiences granted by their skin privilege, whites can help themselves to reveal this distorted culture. They have to recognize the problem before they can lessen it and work to end it. The most obvious privileges are that white individuals are assumed to be affluence, civilized and morally neutral. The white community is perceived as a group of people who interact pleasantly and peacefully and that their country enjoys a widely represented state and its people enjoy many of its freedom. These perceived and unearned privileges are not only preserved from other people, they are also used as weapons to oppress others. However, even if white individuals do not approve the way which white dominance has been...

Words: 328 - Pages: 2

Free Essay

Governor Attorney-Client Privilege

...Governor-Attorney Client Privilege I. The Office of the Governor should not invoke government attorney-client privilege to prevent testimony by a government lawyer when the lawyer is subpoenaed in a federal grand jury investigation for possible federal criminal violations. This decision is up to the courts in a case by case basis. a. Attorney Client Privilege is subject to the common law by courts “in the light of reason and experience.” FRE 501. i. FRE 501 can be relied on over FRE 503 at the discretion of the Court. 1. FRE 503(a)(1) only makes “broad propositions that a governmental body may be a client for purposes of the attorney-client privilege” (In Re Duces Tecum, 8th circuit, 916). a. “We are instructed by Rule 501 to interpret the attorney-client privilege via common law ‘in light of reason and experience’ and not solely in light of the rule promulgated by the Supreme Ct. in 1972” (Id). ii. Necessity of Granting Potentially Relevant Info to Fed. Grand Jury as a matter of Constitution and Criminal Justice. 2. It is up to the federal grand jury to determine whether there is sufficient evidence to justify a formal accusation against a person for a crime (US Constitution, 5th amendment). 3. The rule of law should reign supreme and should be considered natural that every step be taken to ensure that justice be served promptly. b. “Supreme Ct. recognizes that the principle...

Words: 1142 - Pages: 5

Premium Essay

Corporate Attorney Client Privilege and Work Product Doctrine

...exchanged between parties should be prepared with a thought to potential litigation. Attorney Client Privilege and the Work Product Doctrine are two separate and distinct issues and should be treated within the legal world as separate disclosures. Attorney Client Privilege, which originated in Roman and canon law, has evolved into a recognized judicial doctrine and is necessary in order to provide clients with access to effective, well informed counsel. In Upjohn Co. v US the Supreme Court the Court stated that “Its purpose is to encourage full and frank communication between attorneys and their clients and thereby promote broader public interests in the observance of law and administration of justice.”(a) However, since the passage of the Patriot Act (b) (terrorism, September 11, 2001), and the various corporate scandals leading to the Sarbanes Oxley Act(c) and the Securities and Exchange Commission (2001 Seaboard Report) and the fall out from such companies as Enron, WorldCom the federal, state and regulatory offices of the government are attempting to pierce the Attorney Client Privilege. The government has attempted through two (2) separate practices to tear into what was once considered a “privilege” that was recognized and adhered to throughout the US. The two (2) issues we know face are (i) attorneys are being required to “waive” attorney client privilege in order to appear cooperative. Failure to waive has resulted in the court stipulating that the attorney...

Words: 2103 - Pages: 9

Free Essay

Linux

...Secure Computing Corporation, Trusted Computer Solutions, and Tresys Technology. Experimental ports of the FLASK/TE implementation have been made available via the TrustedBSD Project for the FreeBSD and Darwin operating systems. SELinux also adds finer granularity to access controls. Instead of only being able to specify who can read, write or execute a file, for example, SELinux lets you specify who can unlink, append only, move a file and so on. SELinux allows you to specify access to many resources other than files as well, such as network resources and interprocess communication. A Linux kernel integrating SELinux enforces mandatory access-control policies that confine user programs and system servers to the minimum amount of privilege they require to do their jobs. This reduces or eliminates the ability of these programs and daemons to cause harm when compromised. This confinement mechanism operates independently of the traditional Linux access control...

Words: 1252 - Pages: 6

Premium Essay

Chapter 13

..............................................................3 I. Exploiting XP .........................................................................................................................................................4 II. Exploiting Ubuntu ...............................................................................................................................................20 Summary ......................................................................................................................................................................39 1 CHAPTER 13 2 CHAPTER 13 Introduction In the post-exploitation phase, we will look at information gathering on the exploited systems, privilege escalation. Perhaps we’ll find that we can access sensitive data stored on the exploited system. Maybe the exploited system is part of a domain, and we can use it to access other systems on the domain. These are just a few of the potential avenues open to us in post exploitation. Post exploitation is arguably the most important way to get a clear picture of a client’s security posture. 3 CHAPTER 13 I. Exploiting XP Kalis IP Address 4 CHAPTER 13 Windows XP IP Address 5 CHAPTER 13 Starting metasploit 6 CHAPTER 13 Stablished link again from lab 8 to continue this lab 7 CHAPTER 13 Showing help upload 8 CHAPTER 13 Uploading file to C: drive 9 CHAPTER 13 Showing name...

Words: 857 - Pages: 4

Premium Essay

Reserch Assignment 2.1

...understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted before the SElinux policy during access attempts. If the standard permissions deny access the access is denied so therefore SElinux is not involved. When the standard file permissions do allow access, the SElinux policy will be consulted and access is either gained or denied based on the security contexts of...

Words: 938 - Pages: 4

Premium Essay

Linux

...Chapter 18 Exercises 1.What is the difference between the scp and sftp utilities? copies file to and from a remote system SFTP is the same but is secure 2.How can you use ssh to find out who is logged in on a remote system? Assuming you have the same username on both systems, the following command might prompt you for your password on the remote system; it displays the output of who run on host: $ ssh host who 3.How would you use scp to copy your ~/.bashrc file from the system named plum to the local system? $ scp ~/.bashrc zack@plum: 4.How would you use ssh to run xterm on plum and show the display on the local system? Assuming you have the same username on both systems and an X11 server running locally, the following command runs xterm on plum and presents the display on the local system: $ ssh plum xterm You need to use the –Y option if trusted X11 forwarding is not enabled. 5.What problem can enabling compression present when you are using ssh to run remote X applications on a local display? When using compression latency is increased and the outcome is always undesirable slower speeds, and data interruption. 6.When you try to connect to a remote system using an OpenSSH client and you see a message warning you that the remote host identification has changed, what has happened?What should you do? This message indicates that the fingerprint of the remote system is not the same as the local system remembers it. Check with the remote system’s...

Words: 1325 - Pages: 6

Premium Essay

Linux Security Basics

...Linux Security Basics Security is always at the top of the list when setting up a network and also administering a network. Linux is an operating system that can be easily obtained over the internet due to its open source distributions. Linux is one of the most secure operating systems because of having less use than Windows for the end user. There are several security technologies in Linux that can be implemented into a network. The three technologies that I will be discussing are SELinux, chroot jail, and iptables. SELinux was developed by the National Security Administration in an effort to incorporate a strong, flexible mandatory access control architecture into the major subsystems of the Linux kernel. The NSA recognized that operating system security is critical at higher levels. It provides a tool to enforce the separation of information based on the confidentiality and integrity requirements. This helps when addressing threats of tampering and bypassing of application security. It also assists in the isolation of damage that is caused by malicious software or damaged applications. SELinux uses the Flux Advanced Security Kernel which contains components that provide support for enforcing many kinds of MAC policies like type enforcement, role-based access control, and multilevel security. The Linux kernel that is implementing SELinux enforces MAC policies that limit the user programs and system servers to only what they need to complete the job. When a limit...

Words: 1313 - Pages: 6

Premium Essay

Lunix

...are used to configure TCP Wrappers? host.allow and hosts.deny (e) What keyword in TCP Wrappers matches any daemon or client? All or Exact (f) Given the following entry in TCP Wrappers what will happen when a client address 172.16.24.100 tries to access a Web site running on this server? The IP matches both the access and deny hosts files. It will be allowed access because it matches the first hosts file that is checked. (g) What is a chroot jail? It is a process with a root directory other than /. Say you run a process or program and specify its root as /home/sam/jail, it would have no knowledge of any files above /home/sam. Jail is the root directory. (h) When might a chroot jail not work? Running a chroot utility with root privileges, and also using su or sudo programs. Those are compiled for Fedora/REEL and they call PAM, you would have to modify the source so it does not call PAM. Either one could lead to an unsecure jail. (i) What is the name of the kernel component that uses the iptables rules to filter network traffic? Netfilter 2. Create an iptables rule that will block all traffic from 10.14.34.207 and not let the sender know that the traffic was blocked. #...

Words: 345 - Pages: 2

Premium Essay

The Pathology of Privilege

...The Pathology of privilege Intro * Privileges (monopoly status, favorable regulations, subsidies, bailouts, loan guarantees, targeted tax breaks, protection from foreign competition, and noncompetitive contracts) that governments occasionally bestow upon particular firms are and extraordinary destructive force. * It misdirects resources, impedes genuine economic progress, breeds corruption and undermines the legitimacy of both, the government and the private sector I. Gains from exchange * Free and voluntary trade results in gains for both sellers and buyers * Voluntary exchange is mutually beneficial * The national economy is simply a very large number of beneficial trades * The collapse of this trades is a Recession * Specialized production permits grater productive efficiency and allows us to do more with less * In a healthy market, there will be so much exchange that the gains from trade are maximized * Markets are competitive * When property rights are well defined, costs of transacting are minimal, and there are no barriers to enter or exit the industry II. Types of privilege * Monopoly privilege * Sole and exclusive rights * Governmental legal challenges fines to private carriers out of business * Regulatory privilege * Many firms enjoy regulatory preferences that give them a measure of monopoly power * “The part of the wisdom is not to destroy the commission, but to utilize it” ...

Words: 663 - Pages: 3

Premium Essay

Linux Technology

...understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted before the SElinux policy during access attempts. If the standard permissions deny access the access is denied so therefore SElinux is not involved. When the standard file permissions do allow access, the SElinux policy will be consulted and access is either gained or denied based on the security contexts of...

Words: 940 - Pages: 4

Premium Essay

It302 Research #1

...IT302 Linux Administration Research #1 I researched three Linux security technologies which are, SELinux, chroot jail and iptables. As you read into this research you will see that they are split up into their own catagories so that it is easy to read information on whichever topic you would like. SELinux As part of its Information Assurance mission, the National Security Agency has long been involved with the computer security research community in investigating a wide range of computer security topics including operating system security. Recognizing the critical role of operating system security mechanisms in supporting security at higher levels, researchers from NSA's National Information Assurance Research Laboratory have been investigating an architecture that can provide the necessary security functionality in a manner that can meet the security needs of a wide range of computing environments. End systems must be able to enforce the separation of information based on confidentiality and integrity requirements to provide system security. Operating system security mechanisms are the foundation for ensuring such separation. Unfortunately, existing mainstream operating systems lack the critical security feature required for enforcing separation: mandatory access control. As a consequence, application security mechanisms are vulnerable to tampering and bypass, and malicious or flawed applications can easily cause failures in system security. The results of several...

Words: 1295 - Pages: 6