Verified Document

Team America Surveillance And Espionage Essay

Related Topics:

.....motif of surveillance features prominently in Captain America: Civil War. More importantly, the film features the ability of a powerful state entity to control the behavior of its citizens. The types of surveillance and brainwashing depicted in Captain America: Civil War are completely different from those used by the American government. However, the methods of surveillance used by the American government to spy on its own people may be no less sinister. The methods of surveillance used by the government cannot directly control peoples' minds and behavior of individuals, but can control other dimensions of the daily lives of citizens. Captain America: Civil War can be viewed as a metaphor and warning to Americans about the extent, purpose, and meaning of government surveillance in daily life. The film can also be instructional, showing that Americans can empower themselves against encroaching infringements on their rights.Because Captain America: Civil War is a superhero movie, it does not address the genuine legal problems that surveillance and brainwashing raise. The Fourth Amendment to the Constitution addresses surveillance by providing the right to privacy to all American citizens. The government is prohibited from unreasonable searches and seizures according to the Fourth Amendment, and that clause refers to searches and seizures of information, not just of property (Slobogin). There are many types of surveillance that the founding fathers would not have anticipated when the Constitution was ratified. Of course, the most obvious type of surveillance that the founding fathers would not have anticipated is Internet and other digital types of surveillance. In fact, one day in the future it could be possible that the government could engage in more insidious and technologically advanced methods of surveillance that include the ability of direct mind control and manipulation, as depicted in Captain America: Civil War.

There are three main types of surveillance, according to Slobogin. The first type is the classical style of spying on people. This type is known as physical surveillance. The second type of surveillance in common use is communications surveillance, which includes wiretapping and any other "real time interception of communications," (Slobogin 3). Finally, transaction surveillance refers to the monitoring of activities after they have occurred, such as when the government might review phone records or bank activities. This type of information may be used for a range of state missions, from evidence gathering for federal investigation against pornography and human trafficking or to monitor financial transactions of suspicious organizations. The latter type of surveillance is not always perceived of as surveillance, but it is still information gathering and must be accomplished within the provisions of the Fourth Amendment for it to be deemed constitutional. Technology has made each of these three types of surveillance easier, and emerging technologies...

Since September 11, public opinion has tacitly or even explicitly supported increased government surveillance in the interests of monitoring potential terrorist activities domestically (Slobogin). The expanded powers of the federal government over the past few decades have meant that the government has the potential to intrude into the daily lives of people more than ever before. Combined with the advancements in surveillance technology, the power of the government could even become as great as it is demonstrated in Captain America: Civil War.
Americans who resist surveillance or resent it have little recourse except to refrain from public activities entirely. However, one of the best ways to refrain from exposing oneself is to avoid volunteering personal information when using the Internet (Dinev, Hart, and Mullen). The only other means to resist unlawful surveillance is to ensure that civil liberties organizations like the ACLU remain well-endowed and able to protect the rights of citizens. Most Americans would agree that some government surveillance is necessary and desirable in the interests of national security and would gladly sacrifice a small amount of personal privacy in the interest of protecting the country. However, few Americans would agree to allow the contents of their minds be made public, really or symbolically through monitoring of individual social media accounts. What the government views as being "unreasonable search and seizure" under the Fourth Amendment might be defined differently from the common person, which is why civil liberties organizations make a determined effort to work with legal teams to protect the rights of Americans. The judiciary has, as a result, been called upon increasingly to rule on individual cases. Emerging technologies demand each case be heard differently, because from year to year hardware and software considerations will change. Legislation also changes, often in favor of the government and its expanding powers of surveillance. Some legislation may redefine what specific activities a government entity is allowed to do to gather information.

Interestingly, there are other ways of monitoring human behavior and even brainwashing as shown in Captain America: Civil War. Surveillance is only the tip of a large iceberg of rights erosion. For one, marketers collect purportedly anonymous data and usage statistics from customers and members of social media sites. Whenever a person uses a social media site, he or she surrenders a little more privacy. Registering for any website means placing one's email address, at the very least, on a list that can be populated and cross-referenced with other lists. On the surface,…

Cite this Document:
Copy Bibliography Citation

Related Documents

Espionage Study Guide
Words: 9330 Length: 34 Document Type: Essay

Espionage Burds, Chapter 19 Golden Age of Soviet "Illegals" Cambridge Five: Burgess, Blunt, Maclean, Philby and Cairncross These five were all discovered to be spying for the Soviets. Cairncross was never caught. He supplied Stalin with secrets that helped the Soviets stay ahead of British Intelligence, especially at the Battle of Kursk Cairncross also informed Stalin of ULTRA, when Churchill was hiding ULTRA from Stalin Cairncross supplied a total of 5832 documents to the Soviets Cairncros had been

Foreign and Domestic Intelligence the
Words: 6712 Length: 22 Document Type: Term Paper

S. directly. Evidently, the long-term objectives indirectly face the smooth running of the U.S. government. Priority should be given to those aspects that will pull the resources of the country to extreme levels. The U.S. As a super-power is privileged when tackling issues affecting other nations; it is mandated to help developing long-term solutions. Long-term also implies that the impacts and effects need to be widespread in order to maintain balance

Guantanamo Bay
Words: 16801 Length: 61 Document Type: Term Paper

Guantanamo Bay and the United States History of Guantanamo Bay, and the U.S. Involvement with Guantanamo Bay The Legality of the U.S. Occupation of Guantanamo Bay Why Do the U.S. Hold Guantanamo Bay? The Legal Position Regarding the U.S. Being in Guantanamo Bay Recent Events at Guantanamo Bay: Camp X-Ray and Camp Delta The Legal Position Regarding Events at U.S. Camps in Guantanamo Bay The Geneva Convention and Guantanamo Bay In the last two years the U.S. naval

Illegal Immigrants in the U.S.
Words: 2196 Length: 6 Document Type: Term Paper

So who is an American and what an America can or cannot do are questions which are critical to the issue of legalizing immigrants. Does being an American mean you cannot show allegiance to any other country? The images of people raising and waving Mexican flag had enraged many but it need not have. It should be accepted that people who come from different countries would forever hold in their

Counterintelligence
Words: 3490 Length: 12 Document Type: question answer

Question 1: Construct an assessment of ONCIX strategy, prevention and detection concerning either insider threats, or, economic threats. Preventing and detecting insider threats is one of the core aspects of the ONCIX strategy. As a new premier counterintelligence and security agency in the U.S. government, ONCIX needs a strong understanding of how to identify and deter insider threats. According to its strategy, “the most effective safeguard against insider threats is a

Political Science Japanese Internment
Words: 5176 Length: 12 Document Type: Term Paper

internment camps for the Japanese that were set up and implemented by president Franklin D. Roosevelt. The writer explores the history leading up to the decision and the decision itself. There were six sources used to complete this paper. When Japan attacked Pearl Harbor the American public was outraged and stunned. American citizens had lived with a false sense of security for many years that the soil of the United

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now