27.06.2013 Views

(in) Security - Academic Conferences Limited

(in) Security - Academic Conferences Limited

(in) Security - Academic Conferences Limited

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Saara Jantunen and Aki-Mauri Huht<strong>in</strong>en<br />

The nom<strong>in</strong>alization can be compared to a clause with a Participant +Process configuration:<br />

Process description: America has failed to protect cyberspace.<br />

When Process forms <strong>in</strong>to a Participant, the "event has become an object and the language is no longer<br />

congruent with our experience" (Butt, 2003: 75).<br />

The upcom<strong>in</strong>g analysis will further analyze the evaluative patterns of the data. The action descriptions<br />

can be categorized accord<strong>in</strong>g to their evaluative function. Mart<strong>in</strong> & White (2005) argue there are three<br />

semantic categories for express<strong>in</strong>g attitude. These express positive or negative ways of feel<strong>in</strong>g (Attitude),<br />

our attitudes towards people and how they behave (Judgement), and our evaluations of the worth of<br />

th<strong>in</strong>gs and phenomena around us (Appreciation):<br />

Table 3: Types of attitude<br />

Attitude Affect Judgement Appreciation<br />

Variables un/happ<strong>in</strong>ess, <strong>in</strong>/security,<br />

dis/satisfaction<br />

Social esteem: normality,<br />

capacity, tenacity<br />

Behavior wail, trust, condemn<br />

Social sanction: veracity,<br />

propriety<br />

perform, fail, depend<br />

deceive, abide<br />

reaction, composition,<br />

valuation<br />

bore, help<br />

Whereas the securitization theory discussed <strong>in</strong> the previous section does not provide tools for the<br />

structural analysis of the securitiz<strong>in</strong>g move, the functional language theory offers a method for<br />

determ<strong>in</strong><strong>in</strong>g the representation of 'self' or 'the other' <strong>in</strong> discourse. This is the key to analyz<strong>in</strong>g threat<br />

discourse. The follow<strong>in</strong>g chapter is dedicated to two analyzes: the first analysis deals with the properties<br />

of the securitization narrative, and the second analysis discusses the l<strong>in</strong>guistic patterns and semantic<br />

dimension of cyber discourse.<br />

4. Analysis: Cyber, censorship and securitization<br />

This chapter focuses on two aspects of language and discourse. First, a brief analysis of the WikiLeaks<br />

discussion will discuss the narrative patterns of cyber/<strong>in</strong>formation security. This will act as an <strong>in</strong>troduction<br />

to threat/cyber discourse and provide examples of securitiz<strong>in</strong>g moves. After that, the structural and<br />

evaluative properties of threat discourse are approached through the analysis of cyber discourse.<br />

4.1 Threat discourse as a narrative: WikiLeaks <strong>in</strong> the media<br />

WikiLeaks ga<strong>in</strong>ed wide <strong>in</strong>ternational publicity when it published video material leaked by someone <strong>in</strong> the<br />

U.S. military. These videos were recorded dur<strong>in</strong>g helicopter operations <strong>in</strong> Iraq. The one that caused most<br />

controversy, published by WikiLeaks by the name Collateral Murder, shows the shoot<strong>in</strong>g of a group of<br />

men and later civilians who stopped to help the wounded and killed, who later turned out to be journalists<br />

and photographers. The disproportionate use of force (among other munitions, Hellfire missiles were<br />

employed) and the arrogant and mock<strong>in</strong>g comments of the crew caused public outrage. The comments<br />

"Come on, let us shoot!" and "Oh yeah, look at those dead bastards" can be heard on the video.<br />

WikiLeaks kept publish<strong>in</strong>g controversial material, and <strong>in</strong> November 2010 it released a massive number of<br />

diplomatic cables. WikiLeaks founder, Julian Assange, gave a number of selected journalists access to<br />

the material. He said that the massive amount of <strong>in</strong>formation was too much for them to research, so<br />

journalists, as professionals, would be the right people to research the material, remove any details that<br />

would endanger for example civilian collaborators, and to report their analysis <strong>in</strong> the media (Wikirebels,<br />

2010).<br />

The publish<strong>in</strong>g immediately enraged a number of politicians <strong>in</strong> the U.S. and elsewhere. Assange's<br />

actions were quickly not only condemned, but referred to as acts of 'terror'. Secretary of State Hillary<br />

Rodham Cl<strong>in</strong>ton stated that the actions of WikiLeaks "tear at the fabric" of responsible government, and<br />

are an attack on not only America, but on <strong>in</strong>ternational community. Tom Flanagan, a Canadian former<br />

presidential advisor, suggested President Obama should have Assange assass<strong>in</strong>ated (Coll<strong>in</strong>s, 2010).<br />

Sarah Pal<strong>in</strong> demanded WikiLeaks should be hunted like al-Qaeda (Beckford, 2010). Politicians were<br />

167

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!