(in) Security - Academic Conferences Limited
(in) Security - Academic Conferences Limited
(in) Security - Academic Conferences Limited
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Saara Jantunen and Aki-Mauri Huht<strong>in</strong>en<br />
The nom<strong>in</strong>alization can be compared to a clause with a Participant +Process configuration:<br />
Process description: America has failed to protect cyberspace.<br />
When Process forms <strong>in</strong>to a Participant, the "event has become an object and the language is no longer<br />
congruent with our experience" (Butt, 2003: 75).<br />
The upcom<strong>in</strong>g analysis will further analyze the evaluative patterns of the data. The action descriptions<br />
can be categorized accord<strong>in</strong>g to their evaluative function. Mart<strong>in</strong> & White (2005) argue there are three<br />
semantic categories for express<strong>in</strong>g attitude. These express positive or negative ways of feel<strong>in</strong>g (Attitude),<br />
our attitudes towards people and how they behave (Judgement), and our evaluations of the worth of<br />
th<strong>in</strong>gs and phenomena around us (Appreciation):<br />
Table 3: Types of attitude<br />
Attitude Affect Judgement Appreciation<br />
Variables un/happ<strong>in</strong>ess, <strong>in</strong>/security,<br />
dis/satisfaction<br />
Social esteem: normality,<br />
capacity, tenacity<br />
Behavior wail, trust, condemn<br />
Social sanction: veracity,<br />
propriety<br />
perform, fail, depend<br />
deceive, abide<br />
reaction, composition,<br />
valuation<br />
bore, help<br />
Whereas the securitization theory discussed <strong>in</strong> the previous section does not provide tools for the<br />
structural analysis of the securitiz<strong>in</strong>g move, the functional language theory offers a method for<br />
determ<strong>in</strong><strong>in</strong>g the representation of 'self' or 'the other' <strong>in</strong> discourse. This is the key to analyz<strong>in</strong>g threat<br />
discourse. The follow<strong>in</strong>g chapter is dedicated to two analyzes: the first analysis deals with the properties<br />
of the securitization narrative, and the second analysis discusses the l<strong>in</strong>guistic patterns and semantic<br />
dimension of cyber discourse.<br />
4. Analysis: Cyber, censorship and securitization<br />
This chapter focuses on two aspects of language and discourse. First, a brief analysis of the WikiLeaks<br />
discussion will discuss the narrative patterns of cyber/<strong>in</strong>formation security. This will act as an <strong>in</strong>troduction<br />
to threat/cyber discourse and provide examples of securitiz<strong>in</strong>g moves. After that, the structural and<br />
evaluative properties of threat discourse are approached through the analysis of cyber discourse.<br />
4.1 Threat discourse as a narrative: WikiLeaks <strong>in</strong> the media<br />
WikiLeaks ga<strong>in</strong>ed wide <strong>in</strong>ternational publicity when it published video material leaked by someone <strong>in</strong> the<br />
U.S. military. These videos were recorded dur<strong>in</strong>g helicopter operations <strong>in</strong> Iraq. The one that caused most<br />
controversy, published by WikiLeaks by the name Collateral Murder, shows the shoot<strong>in</strong>g of a group of<br />
men and later civilians who stopped to help the wounded and killed, who later turned out to be journalists<br />
and photographers. The disproportionate use of force (among other munitions, Hellfire missiles were<br />
employed) and the arrogant and mock<strong>in</strong>g comments of the crew caused public outrage. The comments<br />
"Come on, let us shoot!" and "Oh yeah, look at those dead bastards" can be heard on the video.<br />
WikiLeaks kept publish<strong>in</strong>g controversial material, and <strong>in</strong> November 2010 it released a massive number of<br />
diplomatic cables. WikiLeaks founder, Julian Assange, gave a number of selected journalists access to<br />
the material. He said that the massive amount of <strong>in</strong>formation was too much for them to research, so<br />
journalists, as professionals, would be the right people to research the material, remove any details that<br />
would endanger for example civilian collaborators, and to report their analysis <strong>in</strong> the media (Wikirebels,<br />
2010).<br />
The publish<strong>in</strong>g immediately enraged a number of politicians <strong>in</strong> the U.S. and elsewhere. Assange's<br />
actions were quickly not only condemned, but referred to as acts of 'terror'. Secretary of State Hillary<br />
Rodham Cl<strong>in</strong>ton stated that the actions of WikiLeaks "tear at the fabric" of responsible government, and<br />
are an attack on not only America, but on <strong>in</strong>ternational community. Tom Flanagan, a Canadian former<br />
presidential advisor, suggested President Obama should have Assange assass<strong>in</strong>ated (Coll<strong>in</strong>s, 2010).<br />
Sarah Pal<strong>in</strong> demanded WikiLeaks should be hunted like al-Qaeda (Beckford, 2010). Politicians were<br />
167