Abstract

Scholars in discourse studies have defined legitimation as the justification (and critique) of powerful institutions and their practices. In moments of crisis, legitimation tactics often shift. This article considers how such shifts are incited by unauthorized information leaks. Leaks, I argue, constitute freshly available texts that reveal privileged institutional information presented in a specialized rhetorical style. To explore how leaks are harnessed by institutional critics, I examine the 2013 Snowden/National Security Agency (NSA) crisis. Combining corpus analysis with discourse analysis, I explore how Snowden’s NSA leaks affected the online writing of the American Civil Liberties Union (ACLU). I also consider overlaps between the rhetorical patterns in the leaked NSA documents and those in the ACLU’s post-leaks writing. Findings from my analysis of legitimation and style categories suggest that, prior to the leaks, ACLU writers primarily used a character- and narrative-based style to delegitimize the NSA’s policies as illegal and secretive, and to push for their reform. After the leaks, though, the ACLU mainly used an informationally dense style rife with academic terms and vocabularies of strategic action, portraying NSA surveillance as massive and complex. As the documents moved from the NSA’s secret, technical discourses to public, critical discourses, the latter came to resemble the former rhetorically. These findings raise crucial questions about how critics can make use of leaks without necessarily relegitimizing institutional power.

Journal
Written Communication
Published
2021-07-01
DOI
10.1177/07410883211007870
Open Access
Closed
Topics

Citation Context

Cited by in this index (2)

  1. Written Communication
  2. Technical Communication Quarterly

Cites in this index (4)

  1. Written Communication
  2. Written Communication
  3. Written Communication
  4. Written Communication
Also cites 17 works outside this index ↓
  1. Anthony L., Baker P. (2015). ProtAnt: A tool for analysing the prototypicality of texts. International Journa…
  2. Bauman R., Briggs C. L. (1990). Poetics and performance as critical perspectives on language and social life.…
  3. Burrows J. F. (2007). All the way through: Testing for authorship in different frequency strata. Literary and…
  4. Cap P. (2008). Towards the proximization model of the analysis of legitimization in political discourse. Jour…
  5. 10.2307/j.ctv1h9dkt0
  6. Eder M., Rybicki J., Kestemont M. (2016). Stylometry with R: A package for computational text analysis. R Jou…
  7. Habermas J. (1975). Legitimation crisis (McCarthy T., Trans.). Beacon Press. https://doi.org/10.3817/0975025210
  8. Ishizaki S., Kaufer D. (2012). Computer-aided rhetorical analysis. In McCarthy P. M., Boonthum-Denecke C. (Ed…
  9. Linell P. (1998). Discourse across boundaries: On recontextualizations and the blending of voices in professi…
  10. Martin Rojo L., Van Dijk T. A. (1997). “There was a problem, and it was solved!” Legitimating the expulsion o…
  11. McGee M. C. (1980). The “ideograph”: A link between rhetoric and ideology. Quarterly Journal of Speech, 66(1)…
  12. Oddo J. (2011). War legitimation discourse: Representing “us” and “them” in four US presidential addresses. D…
  13. 10.1007/BF00148128
  14. 10.37514/JWA-J.2018.2.1.03
  15. Van Leeuwen T. (2007). Legitimation in discourse and communication. Discourse & Communication, 1(1), 91–112. …
  16. Van Leeuwen T., Wodak R. (1999). Legitimizing immigration control: A discourse-historical analysis. Discourse…
  17. Warner M. (2002). Publics and counterpublics. Public Culture, 14(1), 49–90. https://doi.org/10.1215/08992363-…
CrossRef global citation count: 5 View in citation network →