The Snowden Films - Spirit of the Whistleblower

Laura Poitras’ Oscar-winning 2014 documentary Citizenfour captured the precise moment at which Edward Snowden turned whistleblower after quitting his job at the NSA. Is there room for another film on the same subject? Oliver Stone’s fictionalised account, Snowden, would suggest not. 

In effect, it admits defeat from the get-go by using the making of Citizenfour as a framing device, incorporating flashbacks to show what led Snowden to commit the security breach that exposed the extent of US government surveillance. 

Cooped up in a Hong Kong hotel room with him as he spills the beans are Poitras (Melissa Leo) and the Guardian journalists Glenn Greenwald (Zachary Quinto) and Ewen MacAskill (Tom Wilkinson), who put on their best listening faces and try to forget that all of the most interesting scenes are happening in other parts of the film.

What Snowden has in its favour is an economical performance by Joseph Gordon-Levitt which is mysterious without being aloof, cool but never cold. 

The actor gets the voice right (it’s a benign rumble) and though he is physically dissimilar to the real Snowden, that need be no barrier to success: look at Anthony Hopkins in Stone’s Nixon. Gordon-Levitt is absorbed by the role like water vanishing into a sponge. When the real Snowden pops up to stare wistfully off into the distance (there’s a lot of that here), it can’t help but be a let-down. People are so bad at playing themselves, don’t you find?

Gordon-Levitt (pictured) makes Snowden’s motives transparent without ever fully dropping his guard, and it is reassuring that a film in which people are spied on through the webcams of dormant laptops can still have a protagonist who remains essentially unknowable. 

The script, written by Stone and Kieran Fitzgerald, pulls in the opposite direction, allowing every character to deliver a remark of nudging innuendo. 

When Snowden is discharged from the army after injuring himself, a doctor tells him: “There are plenty of other ways to serve your country.” When he is approved for a job at the CIA, Snowden tells his employer: “You won’t regret this.” 

What we have here, give or take the strip club scene in which a pole dancer is filmed from an ungallantly low angle, is a more-sober Stone than the one who made JFK and Natural Born Killers but he still can’t resist giving us a few deafening blasts of the old irony klaxon.

Though we know by now not to expect subtlety, Stone’s storytelling techniques are still surprisingly crude. When Snowden’s girlfriend, Lindsay Shailene Woodley, complains that he has become distant, that he doesn’t touch her any more, the viewer is likely to wonder why that point had to be expressed in soap-opera dialogue rather than, say, action or camera angles. After all, the film was more than happy to throw in a superfluous sex scene when their love life was hunky-dory.

But when Stone does make his points visually, the cringe factor is even higher. He used carnivorous imagery in Nixon, a bloody steak stood in for murder, and the new film doesn’t take the vegetarian option either. Snowden is already starting to be alarmed by surveillance tactics when he goes hunting with his boss, Corbin O’Brian (Rhys Ifans). The pheasants they kill are barbecued in sizzling close-up, providing a buffet of symbolism. Snowden is going to be grilled. His goose is cooked. He’s dead meat.

An early scene showing him establishing contact with Poitras and Greenwald by an exchange of coded phrases, “What time does the restaurant open?” “Noon. But the food is a little spicy”, suggests that Stone intends to have fun with the story’s espionage trappings. 

The movie falls between two stools, however, lacking either the irreverence of satire or the tautness of a well-tooled thriller. At its most effective moments, it floats free of irony and captures a quaint, tactile innocence. 

We see Snowden communicating in sign language with an NSA colleague to avoid being eavesdropped on, or sitting in bed with a blanket over him as he taps away at his laptop. He is only hiding his passwords but he looks for all the world like a kid reading comics by torchlight after his mother has said: “Lights out.”

New Statesman:            Open Access To The Snowden Archive:      Oliver Stone’s Snowden Film:

 

 

« Is Antivirus Software Now Dead?
France Launches a Cyber Warfare Division »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Patchstack

Patchstack

Patchstack (formerly WebARX) is a web application security platform, which allows digital agencies and developers to monitor, protect and maintain their websites.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Cyber8Lab

Cyber8Lab

Cyber8Lab provides cybersecurity training programmes simulating real world cybersecurity incidents such as web defacement, malware, phishing, digital forensics analysis and wireless intrusion.

NowSecure

NowSecure

NowSecure are the experts in mobile app security testing software and services.

MER Group

MER Group

MER Group is a world-leading integrator in the areas of communications and security. MER cyber solutions cover the entire range of cyber and intelligence related products and services.

Cybeats Technologies

Cybeats Technologies

Cybeats delivers an integrated security platform designed to secure and protect high-valued connected devices.

Computer Network Defence (CND)

Computer Network Defence (CND)

Computer Network Defence (CND) are a Broad-Spectrum Cyber Security Consultancy and Recruitment Agency.

VIQU Recruitment

VIQU Recruitment

VIQU Recruitment was formed with the primary focus of providing 'Smarter People Solutions' to the UK’s professional IT & Cyber Security markets.

FraudWatch International

FraudWatch International

FraudWatch has been protecting client brands around the world since 2003, and are the leaders in online brand protection from phishing, malware, social media and mobile apps impersonation.

Slice

Slice

Slice offer subscription based Cyber Insurance for small businesses.

Let's Encrypt

Let's Encrypt

Let’s Encrypt is a free, automated, and open digital certificate authority, run for the public’s benefit. It is a service provided by the Internet Security Research Group (ISRG).

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

Open Web Application Security Project (OWASP)

Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.