A Matter of Concern: Kenneth Burke, Phishing, and the Rhetoric of National Insecurity

Kyle Jensen University of North Texas at Dallas

Abstract

Abstract This essay draws on concepts developed by Kenneth Burke to examine how a rhetoric of national insecurity has saturated phishing research and antiphishing campaigns. In response to the widespread public dispersal of antiphishing campaigns, it calls for a new terminology that challenges the underlying racial violence that characterizes its current practices. Notes 1Jakobsson and Myers define phishing as "[a] form of social engineering in which an attacker, also known as a phisher, attempts to fraudulently retrieve legitimate users' confidential or sensitive credentials by mimicking electronic communications from a trustworthy or public organization in an automated fashion" (1). 2In July of 2009, Symantec observed a fifty-two percent increase in phishing attacks from the previous month. 3Robert C. Miller and Min Wu argue, "Phishing succeeds because of a gap between the user's mental model and the true implementation, so promising technical solutions should try to bridge this gap" (291). Note how the technology becomes the agent of intervention. 4See, for example, Gurak and Warnick. Later, I will discuss how phishers utilize peer networks to share components of phishing solicitations in order to make the process more efficient. This use of file-sharing technology complicates more sanguine perspectives on the role that collaboration and sharing play in digital networks (see Devoss and Porter; Moxley). I am not alone in pointing out the dangerous limitations of digital technologies such as emails and online forums (see Holdstein; Moses and Katz; Blair and Takayoshi). 5Jenkins writes, "New forms of community are emerging, however: these new communities are defined through voluntary, temporary, and tactical affiliations, reaffirmed through common intellectual enterprises and emotional investments… . Only certain things are known by all—the things the community needs to sustain its existence and fulfill its goals. Everything else is known by individuals who are on call to share what they know when the occasion arises" (27–28). 6I am grateful to RR reviewers Stephen Bernhardt and Jim Zappen for their helpful feedback on this essay. Thank you RF, MM, and MH—you are indispensable.

Journal
Rhetoric Review
Published
2011-03-21
DOI
10.1080/07350198.2011.552378
CompPile
Search in CompPile ↗
Open Access
Closed
Topics
Export

Citation Context

Cited by in this index (0)

No articles in this index cite this work.

References (32) · 3 in this index

  1. Yahoo! News
  2. 10.1215/01642472-20-3_72-101
  3. The Cultural Politics of Emotion
  4. Metaphor and Knowledge: The Challenges of Writing Science
  5. 10.1353/par.2007.0009
Show all 32 →
  1. Feminist Cyberscapes: Mapping Gendered Academic Spaces
  2. Permanence and Change: An Anatomy of Purpose
  3. Computers and Composition
  4. Conference on Human Factors in Computing Systems
  5. Symposium on Usable Privacy and Security
  6. Rhetorical Figures in Science
  7. Kenneth Burke in the 1930s
  8. Persuasion and Privacy in Cyberspace: The Online Protests over Lotus Marketplace and the …
  9. College Composition and Communication
  10. Democracy and America's War on Terror
  11. Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
  12. Phishing Exposed: Uncover Secrets from the Dark Side
  13. Convergence Culture: Where Old and New Media Collide
  14. Phishing: Cutting the Identity Theft Line
  15. Gartner Media Relations: 2007 Press Releases
  16. Security and Usability: Designing Secure Systems that People Can Use
  17. Critical Power Tools: Technical Communication and Cultural Studies
  18. Computers and Composition
  19. Rhetoric Review
  20. Brave New War: The Next Stage of Terrorism and the End of Globalization
  21. JAC
  22. 10.1017/CBO9780511483202
  23. Rhetoric Online: Persuasion and Politics on the World Wide Web
  24. Rhetoric Review
  25. Whitney, Lance. “Symantec: Phishing Activity Up in July.CNET News, 6 Aug 2009. Web. 10 Aug. 2009
  26. The Rhetorical Imagination of Kenneth Burke
  27. JAC