-
Cap P. (2008). Towards the proximization model of the analysis of legitimization in political discourse. Jour…
-
Clapper v. Amnesty International USA, 568 U.S. 398 (2013).
-
10.2307/j.ctv1h9dkt0
-
Currie B. F. (2011, August 30). Don’t let phone companies off the hook: Demanding accountability for warrantl…
-
Dwyer D., Meek J. G., Ross B. (2013, June 6). Verizon phone records secretly collected by feds: Report. https…
-
Eder M., Rybicki J., Kestemont M. (2016). Stylometry with R: A package for computational text analysis. R Jou…
-
FAHNESTOCK (1998)
Written Communication
-
Gallagher R. (2013, June 4). Ten revelations from Bradley Manning’s WikiLeaks documents. https://slate.com/te…
-
Gellman B. (2020)
Dark mirror: Edward Snowden and the American surveillance state
-
Gellman B., Poitras L. (2013, June 7). U.S., British intelligence mining data from nine U.S. Internet compani…
-
Gorski A., Toomey P. (2016, September 23). Unprecedented and unlawful: The NSA’s “upstream” surveillance. htt…
-
Greenwald G. (2013a, June 6). NSA collecting phone records of millions of Verizon customers daily. https://ww…
-
Greenwald G. (2013b, July 31). XKeyscore: NSA tool collects “nearly everything a user does on the internet.” …
-
Greenwald G. (2014)
No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state
-
Habermas J. (1975). Legitimation crisis (McCarthy T., Trans.). Beacon Press. https://doi.org/10.3817/0975025210
-
Habermas J. (1979)
Communication and the evolution of society
-
Hyland (2010)
Written Communication
-
Ishizaki S., Kaufer D. (2012). Computer-aided rhetorical analysis. In McCarthy P. M., Boonthum-Denecke C. (Ed…
-
Linell P. (1998). Discourse across boundaries: On recontextualizations and the blending of voices in professi…
-
Martin Rojo L., Van Dijk T. A. (1997). “There was a problem, and it was solved!” Legitimating the expulsion o…
-
McGee M. C. (1980). The “ideograph”: A link between rhetoric and ideology. Quarterly Journal of Speech, 66(1)…
-
Nakashima E. (2015, June 2). Congressional action on NSA is a milestone in the post-9/11 world. https://www.w…
-
NSA slides explain the PRISM Data-Collection Program. (2013, July 10). The Washington Post. https://www.washi…
-
Oddo J. (2011). War legitimation discourse: Representing “us” and “them” in four US presidential addresses. D…
-
Oddo J. (2018)
The discourse of propaganda: Case Studies from the Persian Gulf War and the War on Terror
-
Poll finds U.S. split over eavesdropping. (2006, January 11). CNN.com. http://edition.cnn.com/2006/POLITICS/0…
-
10.1007/BF00148128
-
Ringler (2018)
Journal of Writing Analytics
-
Risen J. (2005)
The New York Times
-
Rozen L. (2009)
Columbia Journalism Review
-
Savage C. (2015, November 9). Judge deals a blow to N.S.A. data collection program. The New York Times. https…
-
Shelton M., Rainie L., Madden M., Anderson M., Duggan M., Perrin A., Page D. (2015, March 16). Americans’ pri…
-
Smagorinsky (2008)
Written Communication
-
S. Rep. No. 94-755. Book II. (1976). https://www.intelligence.senate.gov/sites/default/files/94755_II.pdf
-
Timberg C. (2013, July 10). NSA slide shows surveillance of undersea cables. The Washington Post. https://www…
-
Van Leeuwen T. (2007). Legitimation in discourse and communication. Discourse & Communication, 1(1), 91–112. …
-
Van Leeuwen T., Wodak R. (1999). Legitimizing immigration control: A discourse-historical analysis. Discourse…
-
Verizon forced to hand over telephone data: Full court ruling. (2013, June 6). The Guardian. https://www.theg…
-
Warner M. (2002). Publics and counterpublics. Public Culture, 14(1), 49–90. https://doi.org/10.1215/08992363-…
-
Wittes B. (2011, April 14). I’m from the NSA, and we don’t get out much. Lawfare. https://www.lawfareblog.com…