Elite Influence and Threat Construction by Language; The Discursive Features of the US Militarization of Cyberspace in Obama Administration

Document Type : Research Article

Authors

Department of North American Studies, Faculty of World Studies, University of Tehran, Tehran, Iran

10.22055/rals.2022.39479.2681

Abstract

This article focuses on the discursive features of the US securitization of cyberspace in Obama administration. Relying on the Copenhagen school’s definition of securitization and using Fairclough’s dialectical relational approach to critical discourse analysis, this study is an attempt to see how discourse making was done as part of a securitization process whereby cyber threats were moved to national security arena and led to discoursal militarization of cyberspace. Assuming that discourse making prepares a ground for elite influence, the current study looks into how the US political leaders contributed to militarization of cyberspace between 2009 and 2017 through discourse making which, in turn, paved the way for actual policy initiatives to militarize cyberspace.

Keywords


Ameli, S. R., Hosseini, H., & Noori, F. (2019). Militarization of cyberspace, changing aspects of war in the 21st century: The case of Stuxnet against Iran. Iranian Review of Foreign Affairs, 10(1), 99-136.
Brodie, B. (Ed.). (1976). The absolute weapon: Atomic power and world order. New York: Harcourt, Brace & Company.
Buzan, B., & Hansen, L. (2009). The evolution of international security studies. Cambridge University Press.
Buzan, B., Wæver, O., & de Wilde, J. (1998). Security: A new framework for analysis. Boulder: Lynne Rienner.
Canrong, J. (2016). How America's relationship with China changed under Obama. Retrieved March 5, 2021 from the World Wide Web: https://www.weforum.org/agenda/2016/12/america-china-relationship/
Cavelty, M. D. (2007). Cyber-Security and threat politics: US efforts to secure the information age. Taylor & Francis e-Library.
Chalak, A., & Ghasemi, B. (2017). A critical discourse analysis of four advanced ELT textbooks based on Fairclough's framework. Journal of Research in Applied Linguistics, 8, 60-66. https://doi.org/ 10.22055/rals.2017.12869
Cyberspace policy review. (2009). Retrieved March 5, 2021 from the World Wide Web: https://assets.documentcloud.org/documents/2700108/Document-28.pdf
Daniel, J. (2012). Choosing the type of non-probability sampling. In J. Daniel (Ed.), Sampling essentials: Practical guidelines for making sampling choices (pp. 81-124). UK: SAGE.
Dunn, M. (2005). A comparative analysis of cybersecurity initiatives worldwide. Paper prepared by Center for Security Studies, Swiss Federal Institute of Technology (ETH Zurich) for the WSIS Thematic Meeting on Cybersecurity Geneva (28 June-1 July 2005). Document: CYB/05. International Telecommunications Union.
Egglestone, T. A. (2014). A critical discourse analysis (CDA) of the contesting discourses articulated by the ANC and the news media in the city press coverage of the spear [Unpublished master’s thesis]. Rhodes University.
Fairclough, N. (1995). Critical discourse analysis: The critical study of language. London: Longman.
Fairclough, N. (2003/4). Analyzing discourse: Textual analysis for social research. Retrieved 22 April, 2019 from the World Wide Web: http://pirp.harvard.edu/pubs_pdf/ganley/ganley-i93-2.pdf
Hansen, L., & Nissenbaum, H. (2009). Digital disaster, cyber security, and the Copenhagen school. International Studies Quarterly, 53, pp. 1155-1175.
Hjalmarsson, O. (2013). The securitization of cyberspace; How the Web was won. Retrieved 22 April, 2019 from the World Wide Web: http://lup.lub.lu.se/luur/download?func=downloadFile&recordOId=3357990 &fileOId=3357996
Lobato, L. C., & Kenkel, K. M. (2015). Discourses of cyberspace securitization in Brazil and in the United States. Polít. Int, 58(2), 23-43.
Lynn III, W. F. (2010). Defending a new domain: The Pentagon’s cyberstrategy. Foreign Affairs, 89(5), pp. 79-108.
McConnell, M. (2010, Feb. 28). Mike McConnell on how to win the cyber-war we’re losing. The Washington Post. Retrieved 22 April, 2019 from the World Wide Web: http://www.washingtonpost.com/wp-dyn/content/article/2010/02/25/AR2010022502493.html
Mueller, R. (2012). RSA cyber security conference address. Retrieved 25 April 2019 from the World Wide Web: https://www.americanrhetoric.com/speeches/robertmuellerrsacyberconference2012.htm
Obama, B. (2009). Remarks by the president on securing our nation’s cyber infrastructure. The White House. Retrieved 22 April, 2019 from the World Wide Web: https://obamawhitehouse.archives.gov/the-press-office/remarks-president-securing-our-nations-cyber-infrastructure
Obama, B. (2013). Statement by the president. Retrieved 28 April 2020 from the World Wide Web: https://obamawhitehouse.archives.gov/the-press-office/2013/06/07/statement-president
Obama, B. (2014). Remarks by the president on review of signals intelligence. Retrieved 28 April 2020 from the World Wide Web: https://obamawhitehouse.archives.gov/the-press-office/2014/01/17/remarks-president-review-signals-intelligence
Obama. B. (2012). Taking the cyberattack threat seriously. The Wall Street Journal. Retrieved 28 April 2020 from the World Wide Web: https://www.wsj.com/articles/SB10000872396390444330904577 535492693044650
Olszewski, B. (2016). Militarization of cyber space and multidimensionality of security. Journal of Science of the Military Academy of Land Forces, 48(2), 105-120. https://doi.org/10.5604/17318157.1216083
Paalman, M. (2013). The Copenhagen school in the fifth domain: Successfully securitizing cyberspace? Unpublished master’s thesis, Uppsala University.
Panetta, L. (2012, Oct. 11). Remarks by secretary Panetta on cybersecurity to the business executives for national security, New York City. Retrieved 28 April 2020 from the World Wide Web:  https://archive.defense.gov/transcripts/transcript.aspx?transcriptid=5136
Rog, J. (2018). Updating securitization to the age of information: Revisiting Security Sectors by Examining PRISM. Retrieved 20 April 2020 from the World Wide Web: https://studenttheses.uu.nl/handle/20.500.12932/31079
Roohani, A., & Tanbakooei, N. (2012). Evaluating passages 1 and first certificate textbooks: A discourse perspective. Journal of Research in Applied Linguistics, 3(2), 82-106.
Schwarz, K. J. (2016). The securitization of cyberspace through technification. Unpublished master’s thesis, Virginia Polytechnic Institute and State University. Blacksburg.
Snowe, O. (2010, Feb. 23). Hearing before the committee on commerce, science, and transportation United States Senate. Retrieved 28 April 2020 from the World Wide Web:  https://www.govinfo.gov/content/pkg/CHRG-111shrg57888/html/CHRG-111shrg57888.htm
van Dijk, T. A. (1993). Elite discourse and racism. UK: SAGE.
Wæver, O. (1995). Securitization and desecuritization. In R. Lipschutz (Ed.), On security (pp. 46-86). Columbia University Press.