Abstract

Scholars in discourse studies have defined legitimation as the justification (and critique) of powerful institutions and their practices. In moments of crisis, legitimation tactics often shift. This article considers how such shifts are incited by unauthorized information leaks. Leaks, I argue, constitute freshly available texts that reveal privileged institutional information presented in a specialized rhetorical style. To explore how leaks are harnessed by institutional critics, I examine the 2013 Snowden/National Security Agency (NSA) crisis. Combining corpus analysis with discourse analysis, I explore how Snowden’s NSA leaks affected the online writing of the American Civil Liberties Union (ACLU). I also consider overlaps between the rhetorical patterns in the leaked NSA documents and those in the ACLU’s post-leaks writing. Findings from my analysis of legitimation and style categories suggest that, prior to the leaks, ACLU writers primarily used a character- and narrative-based style to delegitimize the NSA’s policies as illegal and secretive, and to push for their reform. After the leaks, though, the ACLU mainly used an informationally dense style rife with academic terms and vocabularies of strategic action, portraying NSA surveillance as massive and complex. As the documents moved from the NSA’s secret, technical discourses to public, critical discourses, the latter came to resemble the former rhetorically. These findings raise crucial questions about how critics can make use of leaks without necessarily relegitimizing institutional power.

Journal
Written Communication
Published
2021-07-01
DOI
10.1177/07410883211007870
CompPile
Search in CompPile ↗
Open Access
Closed
Topics
Export

Citation Context

Cited by in this index (2)

  1. Written Communication
  2. Technical Communication Quarterly

References (45) · 5 in this index

  1. Amnesty v. Clapper: Challenge to FISA Amendments Act. (2015, February 26). ACLU. https://www.aclu.org/cases/a…
  2. Anthony L., Baker P. (2015). ProtAnt: A tool for analysing the prototypicality of texts. International Journa…
  3. Written Communication
  4. Bauman R., Briggs C. L. (1990). Poetics and performance as critical perspectives on language and social life.…
  5. Burrows J. F. (2007). All the way through: Testing for authorship in different frequency strata. Literary and…
Show all 45 →
  1. Cap P. (2008). Towards the proximization model of the analysis of legitimization in political discourse. Jour…
  2. Clapper v. Amnesty International USA, 568 U.S. 398 (2013).
  3. 10.2307/j.ctv1h9dkt0
  4. Currie B. F. (2011, August 30). Don’t let phone companies off the hook: Demanding accountability for warrantl…
  5. Dwyer D., Meek J. G., Ross B. (2013, June 6). Verizon phone records secretly collected by feds: Report. https…
  6. Eder M., Rybicki J., Kestemont M. (2016). Stylometry with R: A package for computational text analysis. R Jou…
  7. Written Communication
  8. Gallagher R. (2013, June 4). Ten revelations from Bradley Manning’s WikiLeaks documents. https://slate.com/te…
  9. Dark mirror: Edward Snowden and the American surveillance state
  10. Gellman B., Poitras L. (2013, June 7). U.S., British intelligence mining data from nine U.S. Internet compani…
  11. Gorski A., Toomey P. (2016, September 23). Unprecedented and unlawful: The NSA’s “upstream” surveillance. htt…
  12. Greenwald G. (2013a, June 6). NSA collecting phone records of millions of Verizon customers daily. https://ww…
  13. Greenwald G. (2013b, July 31). XKeyscore: NSA tool collects “nearly everything a user does on the internet.” …
  14. No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state
  15. Habermas J. (1975). Legitimation crisis (McCarthy T., Trans.). Beacon Press. https://doi.org/10.3817/0975025210
  16. Communication and the evolution of society
  17. Written Communication
  18. Ishizaki S., Kaufer D. (2012). Computer-aided rhetorical analysis. In McCarthy P. M., Boonthum-Denecke C. (Ed…
  19. Linell P. (1998). Discourse across boundaries: On recontextualizations and the blending of voices in professi…
  20. Martin Rojo L., Van Dijk T. A. (1997). “There was a problem, and it was solved!” Legitimating the expulsion o…
  21. McGee M. C. (1980). The “ideograph”: A link between rhetoric and ideology. Quarterly Journal of Speech, 66(1)…
  22. Nakashima E. (2015, June 2). Congressional action on NSA is a milestone in the post-9/11 world. https://www.w…
  23. NSA slides explain the PRISM Data-Collection Program. (2013, July 10). The Washington Post. https://www.washi…
  24. Oddo J. (2011). War legitimation discourse: Representing “us” and “them” in four US presidential addresses. D…
  25. The discourse of propaganda: Case Studies from the Persian Gulf War and the War on Terror
  26. Poll finds U.S. split over eavesdropping. (2006, January 11). CNN.com. http://edition.cnn.com/2006/POLITICS/0…
  27. 10.1007/BF00148128
  28. Journal of Writing Analytics
  29. The New York Times
  30. Columbia Journalism Review
  31. Savage C. (2015, November 9). Judge deals a blow to N.S.A. data collection program. The New York Times. https…
  32. Shelton M., Rainie L., Madden M., Anderson M., Duggan M., Perrin A., Page D. (2015, March 16). Americans’ pri…
  33. Written Communication
  34. S. Rep. No. 94-755. Book II. (1976). https://www.intelligence.senate.gov/sites/default/files/94755_II.pdf
  35. Timberg C. (2013, July 10). NSA slide shows surveillance of undersea cables. The Washington Post. https://www…
  36. Van Leeuwen T. (2007). Legitimation in discourse and communication. Discourse & Communication, 1(1), 91–112. …
  37. Van Leeuwen T., Wodak R. (1999). Legitimizing immigration control: A discourse-historical analysis. Discourse…
  38. Verizon forced to hand over telephone data: Full court ruling. (2013, June 6). The Guardian. https://www.theg…
  39. Warner M. (2002). Publics and counterpublics. Public Culture, 14(1), 49–90. https://doi.org/10.1215/08992363-…
  40. Wittes B. (2011, April 14). I’m from the NSA, and we don’t get out much. Lawfare. https://www.lawfareblog.com…