Akun Publik Dalam Realitas Virtual Studi Film Citizenfour Karya Laura Poitras

Total Page:16

File Type:pdf, Size:1020Kb

Akun Publik Dalam Realitas Virtual Studi Film Citizenfour Karya Laura Poitras AKUN PUBLIK DALAM REALITAS VIRTUAL STUDI FILM CITIZENFOUR KARYA LAURA POITRAS Skripsi Diajukan Kepada Fakultas Ilmu Dakwah dan Ilmu Komunikasi Untuk Memenuhi Persyaratan Memperoleh Gelar Sarjana Sosial (S. Sos) Oleh : Nadia Karimah NIM: 11140510000025 PROGRAM STUDI JURNALISTIK FAKULTAS ILMU DAKWAH DAN ILMU KOMUNIKASI UNIVERSITAS ISLAM NEGERI SYARIF HIDAYATULLAH JAKARTA 1440 H / 2018 M ABSTRAK NADIA KARIMAH Akun Publik Dalam Realitas Virtual Film Dokumenter Citizenfour Karya Laura Poitras Film dokumenter Citizenfour merupakan dokumentasi dari perngungkapan program mata-mata pemerintah Amerika Serikat yang dilakukan oleh mantan pegawai National Security Agency (NSA) . Data dari akun publik dalam virtual maya dikumpulkan secara sengaja dan disimpan di pangkalan data milik NSA. Bebagai bukti yang muncul dari film ini memberikan aspek penanda makna akun publik dalam realitas virtual. Berdasarkan latar belakang diatas, tujuan penelitian ini adalah untuk menjawab pertanyaan, Bagaimana makna denotasi dan konotasi dalam realitas virtual yang dibentuk film dokumenter Citizenfour? Adakah Mitos akun publik dalam film dokumenter Citizenfour? Dalam hal ini, penulis menggunakan teori analisis semiotik model Roland Barthes dengan pemaknaan dua tahap, yaitu denotasi dan konotasi yang nantinya dapat menghasilkan mitos. Pengumpulan data dilakukan melalui data primer, dengan data elektronik berupa film dan data skunder, yaitu literature yang berkaitan dengan film Citizenfour. Pada penelitian ini, penulis menggunakan paradigm konstruktivis yang menekankan pada suatu realita dari yang paling umum hingga yang paling khusus. Metodologi yang digunakan pada penelitian ini adalah menggunakan pendekatan kualitatif. Metode yang digunakan dalam penelitian ini ialah analisis deskriptif yang berfokus pada penelitian non hipotesis sehingga dalam langkah penelitian tidak perlu merumuskan hipotesis. Penulis memperoleh hasil dari penelitian ini terkait akun publik dalam realitas virtual tidak aman. Tergambar dari berbagai aksi dan program yang pemerintah Amerika lakukan demi kepentingan negaranya. Makna denotasinya, Snowden tidak takut mengungkap program mata-mata pemerintah Amerika Serikat, karena ia merasa tindakannya benar. Makna konotasinya, aksi mata-mata yang dilakukan pemerintah Amerika Serikat melanggar hak privasi dan kebebasan manusia. Terdapat pula Mitos, tindakan pemerintah Amerika Serikat telah melanggar hak kekayaan intelktual manusia untuk bebas bersosialisasi dan berdiskusi dalam akun publik. Amerika mencederai sistem negara demokratis yang mereka anut, yang seharusnya bebas. Kata kunci: Film, Dokumenter, Realitas vitual, privasi, akun publik i KATA PENGANTAR Bismillahirrahmanirrahim Segala puji dan syukur kehadirat Allah SWT. pemilik alam semesta, yang telah melimpahkan rahmat dan karuniaNYA sehingga penulis dapat menyelesaikan penulisan skripsi ini. Tidak lupa pula shalwat beserta salam, semoga selalu tercurah kepada baginda Nabi besar Muhammad SAW, yang telah membawa ummatnya dari zaman jahiliyyah menuju era digital seperti saat ini. Semoga kita semua menjadi ummatnya yang taat dan mendapatkan syafaatnya sampai akhir zaman. Amin Yaa Rabbal Alamin. Tahap demi tahap dengan selalu memohon ridho kepada Allah SWT, Alhamdulillah akhirnya penulis dapat menyelesaikan penulisan skripsi ini, tentunya dengan dukungan dari berbagai pihak. Dalam kesempatan ini penulis ingin mengucapkan terima kasih kepada: 1. Dr. Arief Subhan, M.A, selaku Dekan Fakultas Ilmu Dakwah dan Ilmu Komunikasi, Suparto, M.Ed, Ph.D, selaku Wakil Dekan I Bidang Akademik, Dr. Hj. Roudhonadh, M.A, selaku Wakil Dekan II Bidang Administrasi dan Keuangan, dan Dr. Suhaimi, M.Si, selaku Wakil Dekan III Bidang Kemahasiswaan. 2. Drs. Kholis Ridho, M.Si, selaku Ketua Jurusan Jurnalistik dan Dra. Hj. Musfirah Nurlaili, M.A, selaku Sekretaris Jurusan yang membantu penulis dalam menyelesaikan persoalan akademis dan administrasi. 3. Ade Masturi, M.A, selaku Dosen Pembimbing Akademik yang telah memberi masukan dalam persoalan akademis selama perkuliahan. 4. Dr. Suhaimi, M.Si, selaku Dosen Pembimbing yang telah sabar, meluangkan waktunya dan memberikan pengarahan yang sangat baik kepada penulis. ii 5. Seluruh dosen dan staf Fakultas Ilmu Dakwah dan Ilmu Komunikasi yang telah membantu penulis selama di bangku kuliah sehingga penulis bisa menyelesaikan kuliah tepat waktu. 6. Segenap karyawan Perpustakaan Umum dan Perpustakaan Fakultas Ilmu Dakwah dan Ilmu Komunikasi UIN Syarif Hidayatullah Jakarta. 7. Kedua orangtuaku tercinta, Papa Ahmad Zulkarnain Estu dan Mama Suci Zaedah Anwar yang sudah memberikan motivasi yang tak ada hentinya kepada penulis. Sehingga penulis mampu mengerjakan skripsi ini dengan baik. 8. Kepada kakak terbaik Amran Zainuri Rosadi dan adik tercinta Fadila Aisyah yang selalu memberikan doa dan kata-kata penyemangatan kepada penulis. 9. Seluruh keluarga besar Alm. Basthony dan Alm. Anwar Nuris yang telah memberikan doa dan dukungan kepada penulis sehingga semangat menyelesaikan penelitian ini. 10. Kepada para sahabat saya di SMP Al-Ma‟arif Pekanbaru yang selalu menyempatkan waktu untuk silahturahmi dan memberi pesan-pesan motivasinya. 11. Sahabat SMA 5 Pekanbaru yang masih terus berhubungan baik dan sebagai penyemangat penulis, Elsa Ayu Lestari dan Maya Imelda. 12. LKS, Sahabat perkuliahan penulis yang selalu mewarnai hari-hari dengan canda, tawa, kebahagiaan, baik, buruk, doa, harapan dan dukungannya yang tak pernah berhenti diberikan selama penulisan skripsi ini, Sofie Medina Pasha, Arita Ambarani, Ikrimah Afifah dan Nur Isrojah Muniroh. 13. Pejuang skripsi seperbimbingan, Dede Uswatun Hasanah yang selalu bersama melalui proses bimbingan dan penulisan skripsi. 14. Teman-teman Jurnalistik A 2014, Wilda Hayatun Nufus, Siti Maulida Fatmawati, Amimatul Iklilah, Ma‟rifah Istiqomah, Nikmatul Fikriyah, Khairunisa dan lainnya yang tidak dapat penulis sebutkan. 15. KKN HUGOS 2014, Mustika Diani Dewi, Nurlaela, Ulfa Mardiyah, Hafsah Mawarni, Rahmawati, Sri Intan E. Lestari, Riska Isnaeny, iii Ramadika, Amir Artha, Fathur Rahman, Idris Fitriyan, Indriansyah, M. Faried dan Dimas Permadi. 16. Teman-teman Jurnalistik 2014 yang tak dapat penulis sebutkan satu persatu. Suatu anugerah bisa mengenal berbagai macam karakter. Kita telah berjuang bersama menghadapi hari-hari selama perkuliahan. Tentunya untuk semua pihak yang tidak bisa disebutkan satu per satu dalam lembaran ini. Penulis berterima kasih atas kebaikan yang kalian berikan, semoga bantuan yan telah kalian berikan kepada penulis bisa dibalas suatu saat nanti oleh Allah SWT. Aamiin yarabbal alaamiin. Ciputat, 21 November 2018 Nadia Karimah iv DAFTAR ISI ABSTRAK ........................................................................................................................................ i KATA PENGANTAR ..................................................................................................................... ii DAFTAR ISI .................................................................................................................................... v DAFTAR TABEL.......................................................................................................................... vii BAB I PENDAHULUAN ............................................................................................................... 1 A. Latar Belakang Masalah ................................................................................................... 1 B. Identifikasi Masalah ......................................................................................................... 4 C. Batasan Masalah ............................................................................................................... 4 D. Rumusan Masalah ............................................................................................................ 5 E. Tujuan Penelitian dan Manfaat Penelitian ........................................................................ 5 F. Tinjauan Kajian Terdahulu ............................................................................................... 5 G. Metode Penelitian ............................................................................................................. 6 H. Sistemaika Penulisan ........................................................................................................ 8 BAB II KAJIAN PUSTAKA ........................................................................................................ 10 A. Tinjauan Umum Tentang Film ....................................................................................... 10 1. Sejarah dan Perkembangan Film Dokumenter ...................................................... 10 2. Teknik Pengambilan Gambar ................................................................................ 11 B. Tinjauan Umum Tentang Semiotik ................................................................................ 16 1. Pengertian Umum Semiotik ................................................................................... 16 2. Model Semiotik Roland Barthes ............................................................................ 18 C. Tinjauan Tentang Media Siber dan Akun Publik ........................................................... 21 1. Tinjauan Sejarah dan Perkembangan Internet........................................................ 21 2. Tinjauan Realitas Virtual ....................................................................................... 23 3. Tinjauan Akun Publik ...........................................................................................
Recommended publications
  • How America Lost Its Secrets: Edward Snowden, the Man and the Theft. by Edward Jay Epstein. New York, N.Y.; Alfred A. Knopf, 2017
    Journal of Strategic Security Volume 10 Number 1 Article 9 How America Lost its Secrets: Edward Snowden, The Man and The Theft. By Edward Jay Epstein. New York, N.Y.; Alfred A. Knopf, 2017. Millard E. Moon, Ed.D., Colonel (ret), U.S. Air Force Office of Special Investigations Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 143-147 Recommended Citation Moon, Ed.D.,, Millard E. Colonel (ret),. "How America Lost its Secrets: Edward Snowden, The Man and The Theft. By Edward Jay Epstein. New York, N.Y.; Alfred A. Knopf, 2017.." Journal of Strategic Security 10, no. 1 (2017) : 143-147. DOI: http://doi.org/10.5038/1944-0472.10.1.1590 Available at: https://scholarcommons.usf.edu/jss/vol10/iss1/9 This Book Review is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. How America Lost its Secrets: Edward Snowden, The Man and The Theft. By Edward Jay Epstein. New York, N.Y.; Alfred A. Knopf, 2017. This book review is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/ vol10/iss1/9 Moon, Ed.D.,: How America Lost its Secrets How America Lost its Secrets: Edward Snowden, The Man and The Theft. By Edward Jay Epstein. New York, N.Y.; Alfred A. Knopf, 2017. ISBN: 9780451494566. Photographs. Notes. Selected Bibliography. Index. Pp. 350. $27.95. Edward Jay Epstein is a well known and respected investigative journalist.
    [Show full text]
  • Edward Snowden
    wanted”, and the more he learned about NSA’s ubiquitous international surveillance pro- The man who grammes, the more troubled he became. “A sys- tem of global mass surveillance,” he realised, pro- exposed the duces “a permanent record of everyone’s life”, and indeed that was the intelligence agencies’ pro- watchers fessed goal. “The value of any piece of information is only known when you can connect it with some- David J. Garrow thing else that arrives at a future point in time,” CIA chief technical officer Gus Hunt explained in early Dark Mirror: 2013. “Since you can’t connect dots you don’t Edward Snowden dward snowden revealed him- have, it drives us into a mode of, we fundamentally and the American self to the world, via a Guardian try to collect everything and hang onto it forever.” Surveillance State web-video, on 9 June 2013, four By that time, Snowden had resolved to act, but by Barton Gellman days after the Guardian, and then his initial anonymous messages to radical journal- The Bodley Head, the Washington Post, first reported ist Glenn Greenwald went unanswered. Progres- £20 on the astonishing treasure trove of top-secret US sive filmmaker Laura Poitras did respond, and she Eintelligence community documents they had in turn contacted both former Washington Post Permanent Record been given by the 29-year-old computer systems reporter Bart Gellman, a well-known national se- by Edward Snowden engineer who worked at the National Security curity journalist, and Greenwald. By mid-May Poi- Macmillan, £20 Agency’s (NSA) Hawaii listening post.
    [Show full text]
  • Digital Security for Activists
    Training the Motivated: Digital Security for Activists Glencora Borradaile Kelsy Kretschmer Abstract School of Electrical Engineering School of Public Policy The state of global surveillance and the political and Computer Science Sociology Program environment has many activists caring more about their Oregon State University Oregon State University online security culture. We report on the initiation of a Corvallis, OR 97331, USA Corvallis, OR 97331, USA Digital Security for Activists program and a pilot study of an [email protected] [email protected] introductory seminar. Pre- and post-surveys of the seminar will form an initial assessment of what kind of intervention might increase the security practices of activists and to inform the design of program offerings. We report on the pre-surveys from three offerings of the seminar. Introduction In collaboration with the Civil Liberties Defense Center (CLDC), the first author had been offering informal digital security trainings for activists and their lawyers. After the fall elections in the U.S., requests for these trainings increased dramatically and shortly thereafter we launched a Digital Security for Activists (DSA) program. The DSA program’s intent is to align with the CLDC mission (“to defend and uphold civil liberties through education, outreach, litigation, legal support, and assistance”) and enable citizen activists to assert their constitutional rights while organizing online. Copyright is held by the author/owner. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee. Poster In order to provide trainings that are useful and effective, we presented at the 13th Symposium on Usable Privacy and Security (SOUPS 2017).
    [Show full text]
  • Snowdenshailene Woodley ©2016 Sacha, Inc
    PATHÉ PRÉSENTE EN ASSOCIATION AVEC WILD BUNCH, VENDIAN ENTERTAINMENT ET TG MEDIA JOSEPH GORDON-LEVITT SNOWDENSHAILENE WOODLEY ©2016 SACHA, INC. TOUS DROITS RÉSERVÉS © CRÉDITS NON CONTRACTUELS INC. ©2016 SACHA, UN FILM DE OLIVER STONE PATHÉ PRÉSENTE EN ASSOCIATION AVEC WILD BUNCH ENTERTAINMENT VENDIAN ENTERTAINMENT TG MEDIA UNE PRODUCTION MORITZ BORMAN SNOWDEN UN FILM DE OLIVER STONE JOSEPH GORDON-LEVITT SHAILENE WOODLEY MELISSA LEO ZACHARY QUINTO TOM WILKINSON UN FILM PRODUIT PAR MORITZ BORMAN & ERIC KOPELOFF D’APRÈS L’OUVRAGE DE LUKE HARDING & LE ROMAN DE ANATOLY KUCHERENA SCÉNARIO DE KIERAN FITZGERALD & OLIVER STONE SORTIE LE MARDI 1ER NOVEMBRE DURÉE : 2H14 www.snowden-lefilm.com DISTRIBUTION PRESSE PATHÉ DISTRIBUTION MICHÈLE ABITBOL-LASRY 2, RUE LAMENNAIS − 75008 PARIS SÉVERINE LAJARRIGE TÉL. : 01 71 72 30 00 184, BD HAUSSMANN − 75008 PARIS FAX : 01 71 72 33 10 TÉL. : 01 45 62 45 62 [email protected] / [email protected] DOSSIER DE PRESSE ET PHOTOS TÉLÉCHARGEABLES SUR WWW.PATHEFILMS.COM À elle seule, l’Histoire fait d’Edward Snowden une figure marquante. Ses révélations en 2013 – une démarche qui en Amérique vaut le qualificatif de « lanceur d’alerte » à son auteur s’il s’agit d’un fonctionnaire du gouvernement – ont déclenché une prise de conscience générale du fait que les nouvelles technologies avaient atteint des niveaux d’omniscience inédits jusqu’alors – du fait que « ils », les Yeux et les Oreilles du gouvernement, pouvaient voir et entendre tout ce que nous, vous, moi, considérons comme privé. Quelles que soient vos convictions ou réactions à propos de la démarche de Snowden, il est indéniable qu’il a tenté de nous alerter sur l’illégalité des agissements de ce nouvel État de Sécurité Nationale, dont la surveillance de masse de sa propre population.
    [Show full text]
  • Legal Responses and Countermeasures to National Security Letters
    Washington University Journal of Law & Policy Volume 47 Intellectual Property: From Biodiversity to Technical Standards 2015 Legal Responses and Countermeasures to National Security Letters Brett Weinstein Washington University School of Law Follow this and additional works at: https://openscholarship.wustl.edu/law_journal_law_policy Part of the National Security Law Commons Recommended Citation Brett Weinstein, Legal Responses and Countermeasures to National Security Letters, 47 WASH. U. J. L. & POL’Y 217 (2015), https://openscholarship.wustl.edu/law_journal_law_policy/vol47/iss1/15 This Note is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Journal of Law & Policy by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. Legal Responses and Countermeasures to National Security Letters Brett Weinstein INTRODUCTION In early June of 2013, governmental surveillance suddenly and dramatically entered the public consciousness, prompting a torrent of debate and backlash. The Guardian published a top secret court order requiring Verizon to hand over all telephone call records to the National Security Agency (NSA); the Washington Post disclosed a secret but widespread Internet surveillance program, and months of similar revelations followed, all stemming from leaks by former NSA contractor, Edward Snowden.1 As a result, the public and the press began to question the tools that the government uses for surveillance, including National Security Letters (NSLs), and the relationship between the government and the technology and telecommunications companies that seemingly possess all personal and private information generated in the modern, digital world.2 J.D.
    [Show full text]
  • October 2016 the Head of the Charles Continued on Page 24
    The RegisterRegister ForumForum Established 1891 Vol. 129, No. 2 Cambridge Rindge and Latin School October 2016 The Head of the Charles Continued on page 24 Three Rindge boats raced in the 52nd Head of the Charles; the Varsity Boys boats came in 19th and 66th and the Varsity Girls came in 22nd place. Photo Credit: Cam Poklop For Rindge, It’s No Contest Cambodian Genocide In RF Mock Election Hillary Wins Handily Survivor Speaks at CRLS nominee for president. ge students are not a fan eight years old to fight in By By All together, 14.4% of of the Twenty-Second Am- a war. In the middle of the Diego Lasarte Kiana Laws students, unprompted, re- mendment, as 1.8% of the war, Pond fled to the jungle Register Forum Register Forum Staff fused to pick one of the four student body—fifth place— Editor-in-Chief and later found himself in a major candidates or to ab- wrote in President Obama, In 1975, after the Viet- Thai refugee camp. Soon he After surveying al- stain and instead wrote in a wanting a third term for the nam war, the Khmer Rouge was found by Peter Pond, an most one fourth of CRLS candidate of their choosing. sitting president. took over Cambodia. They American man who later ad- students, teachers, and After Senator Sanders, However, President promised to bring peace opted him and brought him staff, the Register Forum is Republican nominee Don- Obama was not the only back to their country, but to America. prepared to announce that ald Trump and Libertarian write-in ineligible for the instead they starved and In America, he went Democratic nominee Sec- nominee Governor Gary office of the presidency: re- abused millions of Cambo- to highschool, but things retary Clinton has cently martyered dians, wiping out almost all were still very difficult for won the Rindge gorilla Harambe of their music him.
    [Show full text]
  • FBI–Apple Encryption Dispute - Wikipedia, the Free Encyclopedia 6/2/16, 6:59 AM
    FBI–Apple encryption dispute - Wikipedia, the free encyclopedia 6/2/16, 6:59 AM FBI–Apple encryption dispute From Wikipedia, the free encyclopedia The FBI–Apple encryption dispute concerns whether and to what extent courts in the United States can compel manufacturers to assist in unlocking cell phones whose contents are cryptographically protected.[1] There is much debate over public access to strong encryption.[2] In 2015 and 2016, Apple Inc. has received and objected to or challenged at least 11 orders issued by United States district courts under the All Writs Act of 1789. Most of these seek to compel Apple "to use its existing capabilities to extract data like contacts, photos and calls from locked iPhones running on operating systems iOS 7 and older" in order to assist in criminal investigations and prosecutions. A few requests, however, involve phones with more extensive security protections, which Apple has no current ability to break. These orders would compel Apple to write new software that would let the government bypass these device's security and unlock the phones.[3] The most well-known instance of the latter category was a February 2016 court case in the United States District Court for the Central District of California. The FBI wanted Apple to create and electronically An iPhone 5C, the model used by one sign new software that would enable the FBI to unlock a work-issued of the perpetrators of the 2015 San iPhone 5C it recovered from one of the shooters in a December 2015 Bernardino attack terrorist attack in San Bernardino, California, that killed 14 people and injured 22.
    [Show full text]
  • Citizenfour Discussion Guide
    www.influencefilmclub.com Citizenfour Discussion Guide Director: Laura Poitras Year: 2015 Time: 114 min You might know this director from: The Oath (2010) My Country, My Country (2006) Flag Wars (2003) FILM SUMMARY Director Laura Poitras was in the middle of her third documentary on post-9/11 America when she received an email from “Citizenfour,” an individual claiming to possess insider information on the wide-scale surveillance schemes of the U.S. government. Rather than brushing the message off as bogus, she pursued this mysterious mailer, embroiling herself in one of the greatest global shockwaves of this millennium thus far. Teaming up with journalist Glenn Greenwald of “The Guardian,” Poitras began her journey. The two travel to Hong Kong, where they meet “Citizenfour,” an infrastructure analyst named Edward Snowden working inside the National Security Agency. Joined by fellow Guardian colleague Ewen MacAskill, the four set up camp in Snowden’s hotel room, where over the course of the following eight days he reveals a shocking protocol in effect that will uproot the way citizens across the world view their leaders in the days to come. Snowden does not wish to remain anonymous, and yet he insists “I’m not the story.” In his mind the issues of liberty, justice, freedom, and democracy are at stake, and who he is has very little bearing on the intense implications of the mass surveillance in effect worldwide. Snowden reminds us, “It’s not science fiction. This is happening right now,” and at times the extent of information is just too massive to grasp, especially for the journalists involved.
    [Show full text]
  • Final MA Portfolio
    Bowling Green State University ScholarWorks@BGSU Master of Arts in English Plan II Graduate Projects English Fall 12-12-2018 Final MA Portfolio Laura Risaliti Bowling Green State University, [email protected] Follow this and additional works at: https://scholarworks.bgsu.edu/ms_english Part of the English Language and Literature Commons Repository Citation Risaliti, Laura, "Final MA Portfolio" (2018). Master of Arts in English Plan II Graduate Projects. 29. https://scholarworks.bgsu.edu/ms_english/29 This Dissertation/Thesis is brought to you for free and open access by the English at ScholarWorks@BGSU. It has been accepted for inclusion in Master of Arts in English Plan II Graduate Projects by an authorized administrator of ScholarWorks@BGSU. Final Master’s Portfolio Laura Risaliti [email protected] A Final Portfolio Submitted to the English Department of Bowling Green State University in partial fulfillment of the requirements for the degree of Master of Arts in the field of English with a specialization in English Teaching December 2018 Senior Lecturer Kimberly Spallinger, First Reader Professor Lee Nickoson, Second Reader 2 Table of Contents Portfolio Narrative………………………………………………………………………………...3 “The Femme Fatale as the Modern Feminist”.................................................................................7 “The New Colonialism” (Research and Analysis).........................................................................22 “Deeply Divided: Working Towards Healthier Public Discourse in America” (Pedagogy).........36 “Social
    [Show full text]
  • Edward Snowden Also in This Issue
    Featuring 262 Industry-First Reviews of Fiction, Nonfiction, Children'sand YA books KIRKUSVOL. LXXXVII, NO. 19 | 1 OCTOBER 2019 REVIEWS Edward Snowden on mass surveillance, life in exile, and his new memoir, Permanent Record p. 56 Also in this issue: Jeanette Winterson, Joe Hill, Maulik Pancholy, and more from the editor’s desk: Chairman Stories for Days HERBERT SIMON President & Publisher BY TOM BEER MARC WINKELMAN # Chief Executive Officer MEG LABORDE KUEHN [email protected] Photo courtesy John Paraskevas courtesy Photo Lisa Lucas, executive director of the National Book Foundation, recently Editor-in-Chief TOM BEER told her Twitter followers that she has been reading a short story a day and [email protected] Vice President of Marketing that “it has been a deeply satisfying little project.” Lisa’s tweet reminded SARAH KALINA me of a truth I often lose sight of: You’re not required to read a story col- [email protected] Managing/Nonfiction Editor lection cover to cover, all at once, as if it were a novel. As a result, I’ve ERIC LIEBETRAU [email protected] started hopscotching among stories by old favorites such as Lorrie Moore, Fiction Editor LAURIE MUCHNICK Deborah Eisenberg, and Alice Munro. I’ve also turned my attention to [email protected] Children’s Editor some collections that are new this fall. Here are three: VICKY SMITH Where the Light Falls: Selected Stories of Nancy Hale edited by Lauren [email protected] Young Adult Editor Tom Beer Groff (Library of America, Oct. 1). Like so many neglected women writers of LAURA SIMEON [email protected] short fiction from the middle of the 20th century—Maeve Brennan, Edith Templeton, Mary Ladd Editor at Large MEGAN LABRISE Gavell—Hale isn’t widely read today and is ripe for rediscovery.
    [Show full text]
  • Laura Poitras: O’ Say Can You See?
    Laura Poitras: O’ Say Can You See? Where were you on September and Yemen, giving context and 11, 2001? Laura Poitras was in a human dimension to a world lower Manhattan where she lives, with which we are ill-prepared to and in the hours and days after understand or sympathize. the bombing and collapse of the World Trade Center Towers O’ Say Can You See? is Poitras’ she shot film footage of stunned first art gallery exhibition. Her and grief-stricken citizens. The installation features a projection world has dramatically changed of the imagery from Ground since that date, and Poitras has Zero in 2001, with audio recorded made two probing and powerful weeks later at the Yankees’ come- documentary films that examine from-behind Game 4 World Series post-9/11 socio-political reali- victory on October 20. Poitras has ties as they impact individuals, said that “O’ Say Can You See? re- families, government policies, and turns to the moment of innocence belief systems. when America waited for the dead to arise. It is a meditation on loss Poitras’s film, My Country, My and revenge.” Interviews with Country (2006), focuses on the recently released detainees from U.S. occupation of Iraq, while Guantanamo Bay are presented on The Oath (2010) examines the flat screen monitors, adding new Laura Poitras, O’ Say Can You See?, 2010, Film stills, Courtesy of the artist. fates of two brothers-in-law, Abu layers of information and emotion Jandal and Salim Hamdan, whose about the War on Terror. Poitras was nominated for an Academy Award, Independent Spirit Award and Emmy Award for associations with al-Qaeda provide My Country, My Country (2006).
    [Show full text]
  • US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Félix Tréguer
    US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Félix Tréguer To cite this version: Félix Tréguer. US Technology Companies and State Surveillance in the Post-Snowden Context: Be- tween Cooperation and Resistance. [Research Report] CERI. 2018. halshs-01865140 HAL Id: halshs-01865140 https://halshs.archives-ouvertes.fr/halshs-01865140 Submitted on 30 Aug 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License UTIC Deliverable 5 US Technology Companies and State Surveillance in the Post-Snowden Context: Between Cooperation and Resistance Author: Félix Tréguer (CERI-SciencesPo) 1 tech Executive Summary This deliverable looks at the growing hybridization between public and private actors in the field of communications surveillance for national security purposes. Focusing on US-based multinationals dominating the digital economy globally which became embroiled in the post-Snowden debates (companies like Google, Apple, Facebook, Microsoft, Yahoo), the report aims at understanding the impact of the Snowden scandal on the strategies of these companies in relation to state Internet surveillance. To that end, the report identifies seven factors that are likely to influence the stance of a given company and its evolution depending on the changing context and constraints that it faces across time and space.
    [Show full text]