Professional Documents
Culture Documents
Tahjee Fleming-Robinson
1
MASS MEDIA SURVEILLANCE
Table of Contents
Introduction 3
Movie Review 3
Conclusion 8
References 10
MASS MEDIA SURVEILLANCE
Introduction
The world is quickly becoming a hostile place to live under the influence of mass media
acknowledge that media war via the internet and global communications systems is heading
towards the next level after getting maturity in informational technologies. According to
Lashmar (2017), the world is transforming into bits and bytes because of the prevalence of
information in complicated dynamics. Olive Stone wanted to highlight this threat to the world
because of these advanced surveillance technologies. The true story of Edward Snowden inspired
him to elaborate his case in front of the world so that people can understand that their data is not
protected and they are in constant monitoring of intelligent surveillance (Murata et al., 2017).
The National Security Agency (NSA) of the USA controls the world's security paradigm by
monitoring every cell phone or other electronic gadget spread across the globe (Chavalarias,
2016). This compelled me to share my experience about the movie's outcomes and Snowden's
real courage for spreading awareness of the dark world of the NSA and CIA. This was regarded
as the biggest breakthrough in the spy world because, for the first time, the world came to know
how influential the USA is in monitoring the world's data. I am compelled to think about my
safety and freedom after watching this movie. I feel that I am in a constant monitoring process
that can undermine my right to live anytime. It is crucial for the world to follow the Snowden
suit and compel tech companies to elaborate their position about protecting data.
MASS MEDIA SURVEILLANCE
Movie Review
unethical action in the NSA - decided to whistleblow on the U.S. Government so that people can
be aware of its spying culture. Snowden's life transformed from the U.S. Army personnel to the
CIA technology specialist and finally ended as the NSA sub-contractor (Galli, 2019). The cyber
abilities, and it is shown from his problematic relationship with his girlfriend, Lindsay Mills. The
prevalence of the USA's mass media surveillance causes a real disturbance in Snowden's
thinking capabilities.
Snowden's movie dramatizes the actual incidences that Edward Snowden goes through in
his real life. However, certain movie plots might be included for entertainment purposes to grab
the viewers' attention. The real message to be found in the movie is the fight between Snowden's
cognitive abilities that compelled him to stand for the affairs that did not suit the professional
code of conduct. It perceived that this movie was the fight against the corrupt government but in
the technical sphere. It was interesting to find out that the prevalence of the modern battlefield is
everywhere. The role of Gordon-Levitt's voice in the movie makes it a perfect suite for the spy
movie genre while also providing a clear view of the real Snowden who is dealt with the CIA's
The pinching line such as "You'd think intelligence would count for something in the
political cyberspace. The actions and conversational dialogues are considered to be the great
achievement of Oliver Stone with this real-life event featuring Snowden's life in cyberspace. I
believe that the ending of such a movie features the whistle-blower against the most powerful
MASS MEDIA SURVEILLANCE
country with a happy ending. The same is the fate decided with this movie that instigates
The movie's objective is to highlight the emergence of the fifth and sixth-generation
warfare that is rapidly bearing down on the populace. The technological advancement in
confidentiality. We live in a world of bits and bytes that convert everything in the form of pre-
designed algorithms (Mahmoud and Zeki, 2016). The key example of this can be understood
from the digital media marketing techniques that target the computerized world's relevant
audience to conduct business activities. The theme of this movie is the destruction of the moral
and ethical values that propagate freedom in society. Snowden highlighted the digital prison's
exact version, where everyone and everything is monitored, showing that media warfare through
constant monitoring of the individuals that can be manipulated easily (Adams et al., 2017). The
cyber techniques in society. Snowden provides a little overview of the cyber world's happenings;
The USA being the superpower, wanted to retain its supremacy over the dynamics of the
world. I believe that it started the new era by meddling in many countries' internal affairs and
live without the interaction of individuals with digital technologies (Mols and Janssen, 2017).
The data can be monitored or viewed even from the closed cams of laptops or other gadgets. The
world is becoming a digital prison where big power such as the USA can affect individuals'
mental capabilities without even noticing. I assess that Snowden's actions pour tremendous
MASS MEDIA SURVEILLANCE
impacts on society's social and economic projections by introducing the world to the cyber spy
Currently, Snowden has not been presented before the court to allow the judges to make
rulings on the charges pressed against him. This suggests that there are no existing case laws that
pertain to the U.S. government vs. Snowden. However, there are several cases that are similar to
what Snowden is facing and the views given by the judges are being used to debate about the
possible fate for Snowden. For example, the case of Klayman v. Obama involved the same issue
of collection of metadata and similar stakeholders, including the NSA and the public (Nakashima
& Marimow, 2013). From the views of the courts, the idea of gathering telephone metadata is
unconstitutional. The ruling was made in the wake of the leaks made by Snowden. This decision
has been used to argue that it vindicated Snowden since the underlying issues in the two cases
The main law applied in the case is Section 215 of the Patriot Act, where it was held that
the legislation does not authorize the NSA to embark on the collection of bulk of telephone call
records. This section allows the government to gather tangible items (such as books, documents,
and records) when it is believed that they can provide evidence against a foreigner (Mann, 2014).
This suggests that the law applied in the case does not support the gathering of telephone call
records from the members of the public. The same view was supported by two different courts,
including the U.S. District Court for the District of Columbia in the Klayman v. Obama and the
U.S. Court of Appeal for the Second Circuit in the ACLU v. Clapper case. Judges in both courts
favored Snowden’s line of thought and the possible defense, in case he is taken to court.
MASS MEDIA SURVEILLANCE
Snowden’s leaks could not affect national security directly. Individuals who claim that
the documents threatened the security rely on the wrong assumption that he took millions of
documents and then dumped them online. However, there is sufficient evidence to show that
Snowden released zero documents (Timm, 2016). On the contrary, he asked for the help of
experienced journalists with the knowledge of national security to review each document and
release those that were in the public interest only. Timm (2016) held that the national security
reporters working with the news outlets that were respected were given the documents.
It was estimated that Snowden was able to copy more than 1.5 million documents (Timm,
2016), but only 200,000 of them were released (Hosenball, 2013). These statistics show that only
a small percentage of the documents in the hands of Snowden reached the public. Documents
that had the potential to threaten national security were concealed. More importantly, there are
reports showing that the journalists consulted by Snowden allowed the government to make
objections to the leaking of files based on the security concerns (Timm, 2016). The effectiveness
of the measures taken to select the documents that could be released is based on the fact that
there are no significant security incidents that can be directly linked to the leaked information.
The USA's leaked documents by Snowden are compelling other world powers to prepare
themselves against the USA's rhetoric approach in the cyber world. Countries like China, Russia,
and Britain are enhancing the cyber world's barriers to protect their data from the USA's
domination of the world's cyberspace. The ongoing tussle between the world powers is already
witnessed from the USA's allegations on Chinese companies such as Huawei and TikTok for
breaching privacy protocols to threaten the USA's national security (Marthews and Tucker,
MASS MEDIA SURVEILLANCE
2017). After watching this movie, it is easy to wonder why the USA would object to monitoring
its data by other countries when it was the sole proprietor for initiating the world's cyberwar.
Citizens need to recommend that strict laws be implemented for tech companies regarding
It is clear to see that Mass Media Surveillance is pouring disturbing impacts on the
operational growth of the world's dimensions. The tussle between the world powers is making
the circumstances worse than is expected. One suggestion is minimizing the interaction with tech
gadgets and using apps that show compliance with ethical and legal considerations in cyberspace
(Dimitrova and Brkan, 2018). This might reduce the security concerns, but the solution to living
in complete isolation in remote locations such as Siberia or Antarctica is where interaction with
the tech gadgets cannot be possible. They are much too ingrained in the modern world.
Conclusion
the prevalence of security threats in cyberspace. This movie by Olive Stone contributes greatly to
understanding the cyber warfare projections that are haunting the world's interests and
sustainability. The actions and dialogues in the movies give proximity to the real incidents that
happened to Snowden's real character. This movie provides me a piece of evidence regarding the
trap of the tech companies in our surroundings. There is no way out unless the appropriate
measures can be taken to reduce the intelligence meddling in people's common interests across
the globe. I get a sense of insecurity from the tech gadgets that I own. I believe that every
individual in this world is getting the same sense of insecurity from tech companies. The ongoing
tussle between the world powers such as the USA, Russia, and China leads to devastating
outcomes. Snowden's courage might be the wake-up call for the world's residents to compel
MASS MEDIA SURVEILLANCE
governments in their capacity to minimize the threats of the cyberwar in the world. The movie
played an important role in highlighting different aspects of the controversial spectrum of data
handling and protection (Edgar, 2017). The world leaders need to take steps to prevail over the
References
Adams, A. A., Yáñez-Luna, J. C., Ramírez, P. I. G., Arias-Oliva, M., & Murata, K. 2017. "The
Adams, A. A., Murata, K., Fukuta, Y., Orito, Y., & Lara Palma, A. M. 2017. "Following
in Society, 15(3).
Chavalarias, D. 2016. "The unlikely encounter between von Foerster and Snowden: When
second-order cybernetics sheds light on societal impacts of Big Data". Big Data &
Society, 3(1), 2053951715621086.
Dimitrova, A., & Brkan, M. 2018. "Balancing National Security and Data Protection: The Role
of E.U. and US Policy‐Makers and Courts before and after the NSA Affair". JCMS:
Edgar, T. H. 2017. "Beyond snowden: privacy, mass surveillance, and the struggle to reform the
Galli, B. J. 2019. "Effects on Current Day Technology, Legislation with Respect to Ethical
Lashmar, P. 2017. "No more sources? The impact of Snowden's revelations on journalists and
Murata, K., Adams, A. A., & Palma, A. M. L. 2017. "Following Snowden: a cross-cultural study
Mann, F. (2014). Fact sheet: Section 215 of the USA Patriot Act. Retrieved from
https://www.csis.org/analysis/fact-sheet-section-215-usa-patriot-act Hosenball, M.
(2013). NSA chief says Snowden leaked up to 200,000 secret documents. Retrieved from
https://www.reuters.com/article/us-usa-security-nsa/nsa-chief-says-snowden-leaked-up-
to-200000-secret-documents-idUSBRE9AD19B20131114
Mols, A., & Janssen, S. 2017. "Not interesting enough to be followed by the NSA: An analysis
Nakashima, E. & Marimow, E. (2013). Judge: NSA’s collecting of phone records is probably
collecting-of-phone-records-is-likely-unconstitutional/2013/12/16/6e098eda-6688-11e3-
a0b9-249bbb34602c_story.html?noredirect=on&utm_term=.23bbc3bbd418
Timm, T. (2016). The Washington Post is wrong: Edward Snowden should be pardoned.
post-wrong-edward-snowden-pardon
MASS MEDIA SURVEILLANCE
Guidelines
Text must be in 12-point Times or Times New Roman font. All text should be double-spaced
author(s), a complete word count, running head, and a title footnote with name and
Abstract: Begin on a new page headed by the title. Brief, jargon-free paragraph (less
than 200 words) summarizing the work, followed by three to five key words.
Body: Begin on a new page headed by the title. Use headings and subheadings after the
introduction.
numbers. The notes can be typed at the bottom of the page (footnotes) or in a separate
section labeled Notes or Endnotes. Do only one or the other; not both. Begin each note
Appendices: If more than one, label Appendix A, Appendix B, etc. Appendices should
FIRST-LEVEL HEAD
First-level headings are all in caps and left-justified. Start using headings after the introduction.
MASS MEDIA SURVEILLANCE
Second-Level Head
Second-level headings are italicized, left-justified, and all words except prepositions and
Third-level headings are italicized, indented, end with a period, and only the first word and any
References
Authors with multiple works should be listed from earliest to latest date.
Works that have been accepted for publication should be listed as (forthcoming).
When listing multiple items published by an author in the same year, distinguish the dates
Guidelines
Book, 1 author
Buhs, Joshua Blu. 2009. Bigfoot: The Life and Times of a Legend. Chicago: University of
Chicago Press.
MASS MEDIA SURVEILLANCE
Book, 2 authors
Fritz, Birgit, Ralph Yarrow, and Lana Sendzimir. 2012. Inexactart - The Autopoietic Theatre of
Ibidem-Verlag.
Book, edited
Crenshaw, Kimberlé, ed. 1995. Critical Race Theory: The Key Writings that Formed the
Howard, Robert Glenn. 2009. “Crusading on the Vernacular Web: The Folk Beliefs and
Practices of Online Spiritual Warfare.” Pp. 159-174 in Folklore and the Internet:
University Press.
MASS MEDIA SURVEILLANCE
Journal article
Newspaper article
Archival source
Archive of Folk Culture, Vance Randolph Collection, Box 3, Folder 36, 1941-1972. Ozark
U.S. Census Bureau. 2013. 2009-2013 American Community Survey. Washington, DC: U.S.
Department of Commerce.
U.S. Council of Economic Advisers. 2014. “The War on Poverty 50 Years Later: A Progress
MASS MEDIA SURVEILLANCE
Conference paper
McNabb, Caroline. 2013. “Women’s Wisdom: Menarche Narratives and Body Politics.” Paper
Website
American Sociological Association. 2014. “Section on Peace, War and Social Conflict.”
Blog post
Wade, Lisa. 2014. “When Force is Hardest to Justify, Victims of Police Violence are Most
2014 (http://thesocietypages.org/socimages/2014/11/28/chart-of-the-week-63-of-white-
people-are-wrong-about-ferguson/).
Podcast
Commonplace Books. 2012. “Welcome to Night Vale.” Audio Podcast. Retrieved August 28,
2014 (http://commonplacebooks.com/).
Audiovisual media
Firstenberg, Sam [Director]. 1984. Breakin’ 2: Electric Bugaloo. DVD. Santa Monica, CA:
Personal communication
Should not appear in the reference list but should be cited in-text and with a footnote/endnote.