The Affective Infrastructure of Late Liberalism

Total Page:16

File Type:pdf, Size:1020Kb

The Affective Infrastructure of Late Liberalism Georgia State University ScholarWorks @ Georgia State University Communication Dissertations Department of Communication 8-7-2018 Privacy in the age of Snowden: The Affective Infrastructure of Late Liberalism. Jason Derby Follow this and additional works at: https://scholarworks.gsu.edu/communication_diss Recommended Citation Derby, Jason, "Privacy in the age of Snowden: The Affective Infrastructure of Late Liberalism.." Dissertation, Georgia State University, 2018. https://scholarworks.gsu.edu/communication_diss/91 This Dissertation is brought to you for free and open access by the Department of Communication at ScholarWorks @ Georgia State University. It has been accepted for inclusion in Communication Dissertations by an authorized administrator of ScholarWorks @ Georgia State University. For more information, please contact [email protected]. PRIVACY IN THE AGE OF SNOWDEN: THE AFFECTIVE INFRASTRUCTURE OF LATE LIBERALISM. by JASON DERBY Under the Direction of David Cheshier, PhD ABSTRACT In 2013 NSA contractor Edward Snowden leaked thousands of documents to journalists from The Washington Post and The Guardian. These leaked documents exposed the inner working of the surveillance industrial complex in the United States. Moreover, these actions created a disruption in the smooth affective order connected to liberalism and broader neo liberal forms of governmentality. This project begins the process of tracking this disruption. INDEX WORDS: Affect, Surveillance, Snowden, Journalism, Political Theory, PRIVACY IN THE AGE OF SNOWDEN: THE AFFECTIVE INFRASTRUCTURE OF LATE LIBERALISM. by JASON DERBY A Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in the College of Arts and Sciences Georgia State University 2018 Copyright by Jason Derby 2018 PRIVACY IN THE AGE OF SNOWDEN: THE AFFECTIVE INFRASTRUCTURE OF LATE LIBERALISM. by JASON DERBY Committee Chair: David Cheshier Committee: Ben Miller Alessandra Raengo Joshua Reeves Electronic Version Approved: Office of Graduate Studies College of Arts and Sciences Georgia State University August 2018 iv DEDICATION This work is dedicated to William and Dori Wooton. Their love and generosity has sustained my work in more ways than I can count. I also dedicate this work to Bill Wooton who liked smart people. I miss him and his laughter. v ACKNOWLEDGEMENTS It is no exaggeration to say that this project would never have come together without the many people who have supported me through this process. The content of the project has benefited from the amazing faculty at GSU. In addition to the patient and constant support of my advisor David Cheshier, several of the faculty were amazingly generous with their time and insight specifically Ben Miller, Nate Atkinson, Amelia Arsenault, and Angelo Restivo. Josh Reeves comments about the future of computers has never been far from my thoughts. My conversations and debates with Alessandra Raengo were absolutely amazing and put me on the path to undertaking this project, I will never be able to thank her enough for her input. Additionally, her seminar on Race and Capital was instrumental in forging my intellectual trajectory and was the class that created some of my most treasured relationships. My time at Georgia state has been made remarkable by the friendships I have made and the people that have touched my life. The other students in my cohort have been amazingly helpful and amazing colleagues. Additionally, the students who came before me and showed me the in’s and out’s Stephen Heidt, Scott Tulloch, Andrew and Nicki Barnes, and Mina Ivanova. The number of people supporting me has been astounding. The list is too long for the space I have here but there are certainly some people that I want to specifically name. Several times over the last few years Cutler Edwards and Marilyn Brogan have helped me put the pieces back together after every inevitable collapse. It is no exaggeration to say they have taught me how to be a better person through out all of this. Cutler in particular has shown me how to think in challenging ways. Several friends from Atlanta including Jen Sarret, Hilary King, Isabella Alexander, and Sarah Franzen have provided more support than I can possibly express. The final stages of my project benefited from the detailed feedback and encouragement of my two writing vi partners Matt Lewis and Wendell Marsh. Laurel Ahnert, Emily Kofoed and Lauren Cramer have so often been the inspiration I have needed to get done. These women have done more for me than I will ever be express. Rob Ruth and Cason Lane have been incredibly supportive throughout this entire process. The love and support of my parents Frank and Karen has made so many things possible. They have been my biggest supporters all my life. I am grateful beyond measure for their support. Rebecca Wolniewicz has pushed me and supported from the first day we meet, I will never be able to thank her for all of her kindness and generosity. Finally, Stacy Aldinger came into my life in final stages of my project. Her encouragement and patience are without equal. Simply put, this dissertation would not have gotten done without her. I love you. And I can’t wait to see where we go from here. vii TABLE OF CONTENTS ACKNOWLEDGEMENTS .....................................................................................................V 1 INTRODUCTION ........................................................................................................ 1 1.1 Relevant Literature ................................................................................................ 14 1.1.1 Neoliberalism and Affect .......................................................................... 15 1.1.2 Publics and Communication Media.......................................................... 19 1.1.3 Subjects in late liberalism ......................................................................... 24 1.2 Methodology ........................................................................................................... 34 1.3 Chapter Outline ..................................................................................................... 46 2 SECRETS OF INTIMACY ........................................................................................ 48 2.1 Publics, intimate and otherwise ............................................................................. 50 2.2 Eye witness vs. iWitness ......................................................................................... 55 2.3 Who is the journalist now ...................................................................................... 73 2.4 Conclusion .............................................................................................................. 86 3 SOVEREIGN IN NEUTRALITY .............................................................................. 89 3.1 Defining Privacy ..................................................................................................... 93 3.2 Liberal Neutrality .................................................................................................100 3.3 Private Technologies .............................................................................................104 3.4 The Sovereign FCC ...............................................................................................112 3.4.1 Regulating the Internet ............................................................................116 3.5 Conclusion .............................................................................................................127 4 PUBLIC DEBT, PRIVATE OBLIGATION, SECRET SPENDING. ......................130 4.1 Affect and Rationality ...........................................................................................131 viii 4.2 Debt and Risk ........................................................................................................137 4.3 Snowden’s Crisis ...................................................................................................150 4.4 Private Currency ...................................................................................................156 5 CONCLUSION ..........................................................................................................164 BIBLIOGRAPHY .................................................................................................................180 1 1 INTRODUCTION On January 17th 2014, President Obama addressed the United States Department of Justice regarding the role of clandestine intelligence operations in the execution of American foreign policy. In the speech the president positioned himself as a strident defender of the governmental responsibility to engage in intelligence collection activities while simultaneously burdened by the task of defending the long cherished right to privacy. At one point he asserts: We have to make some important decisions about how to protect ourselves and sustain our leadership in the world while upholding the civil liberties and privacy protections our ideals and our Constitution require. We need to do so not only because it is right but because the challenges posed by threats like terrorism and proliferation and cyberattacks are not going away any time soon. They are going to continue to be a major problem. And for our intelligence community to be effective over the long haul, we must maintain the trust of the America people and people around the world.1 A clear element of the speech
Recommended publications
  • Privacy and Civil Liberties Oversight Board
    PRIVACY AND CIVIL LIBERTIES OVERSIGHT BOARD Semi-Annual Report February 2020 1 2 The Honorable Carolyn B. Maloney Report Distribution Chairwoman U.S. House of Representatives Committee In accordance with Section 801 of the on Oversight and Reform Implementing Recommendations of the 9/11 Commission Act of 2007, the Privacy and Civil The Honorable Jim Jordan Liberties Oversight Board (PCLOB or the Ranking Member Board) is providing this Semi-Annual Report, U.S. House of Representatives Committee which covers the period from August 2019 - on Oversight and Reform January 2020, to the President and the Members of Congress listed below. The Honorable Jerrold Nadler Chairman The Honorable Richard Shelby U.S. House of Representatives Chairman Committee on the Judiciary U.S. Senate Committee on Appropriations The Honorable Doug Collins The Honorable Patrick Leahy Ranking Member Vice Chairman U.S. House of Representatives U.S. Senate Committee on Appropriations Committee on the Judiciary The Honorable Ron Johnson The Honorable Nita M. Lowey Chairman Chairwoman U.S. Senate Committee on Homeland Security and U.S. House of Representatives Committee Governmental Affairs on Appropriations The Honorable Gary C. Peters The Honorable Kay Granger Ranking Member Ranking Member U.S. Senate Committee on Homeland Security and U.S. House of Representatives Committee Governmental Affairs on Appropriations The Honorable Richard Burr The Honorable Bennie G. Thompson Chairman Chairman U.S. Senate Select Committee on Intelligence U.S. House of Representatives Committee on Homeland Security The Honorable Mark Warner Vice Chairman The Honorable Mike Rogers U.S. Senate Select Committee on Intelligence Ranking Member U.S.
    [Show full text]
  • Against Authority
    AGAINST AUTHORITY Freedom and The Rise of the Surveillance States by John Twelve Hawks for Thomas Pynchon ©2014 by John Twelve Hawks. All Rights Reserved. A LITTLE BOY IN A ROOM OF MIRRORS Both dogs and humans know when we’ve been caged. We sense instinctually when some other person—or an institution—has the power to direct or control our lives. And our first awareness of this reality occurs at an early age. The older kids on the schoolyard are bigger and stronger. They have the power to knock us down and tell us what to do. When I was growing up in the 1950s, I was quite aware of my own powerlessness. I couldn’t tell anyone what to do—not even a first grader. Although my brain was crammed with a great many words, I had a terrible stutter and couldn’t get the words out. Everyone in my elementary school class laughed when I struggled to speak, and sometimes even my teacher had to conceal her smile. By the time I was eight years old, I started to believe that a demon with a perverse sense of humor was in charge of my lips and tongue. On some days, he was a lazy demon, and I could talk on the phone or answer questions in class. Then the demon would get annoyed with me and I would spit and sputter over every word. On Sundays my family attended a Scotch Presbyterian church headed by a conservative pastor who preached about infant damnation. I was confused about the power of baptism, but I definitely understood the concept of hell.
    [Show full text]
  • Replanting Paradise on Page 2
    $4 at Newsstands and Bookstores SocialistViewpoint H The philosophers have only interpreted the world in various ways; the point is to change it. —Karl Marx H JULY/AUGUST 2016 VOL. 16 NO. 4 When Janis Joplin sang, “Freedom’s just another word for nothing left to lose,” she spoke perhaps unconsciously for millions of America’s victims in faraway places. Read Get Ready for Another World War on page 17. On the Front Cover: s Capitalism is destroying the planet. Read Replanting Paradise on page 2. French citizens take to the streets to stand up against the One Percent’s relentless attacks on living standards. Read French Stand Up on page 51. Replanting Paradise - Page 2 Let Them Drown, The Violence of Othering in a Warming World - Page 4 Once More on the European Union - Page 32 Supporting the “lesser evil,” because we can’t live with a Trump victory, is a tacit admission that the status quo is tolerable. Read Leap Manifesto - Page 49 Trumpophobia on page 19. Vol. 16, No. 4 SOCIALIST VIEWPOINT BC Muhammad Ali Fighter for Palestine By Palestinian Prisoner Solidarity Network On the occasion of the passing of leg- United States, and as a force against “U.S. my people is here. I will not disgrace endary athlete and struggler for justice, imperialism worldwide. He wrote poetry my religion, my people or myself by Muhammad Ali, Samidoun Palestinian in tribute to the Black leaders of the Attica becoming a tool to enslave those Prisoner Solidarity Network joins mil- prison uprising. At the height of his who are fighting for their own jus- lions around the world in remembering career, Muhammad Ali refused to fight in tice, freedom and equality.
    [Show full text]
  • Calendars of the United States House of Representatives and History of Legislation
    1 ONE HUNDRED FIFTEENTH CONGRESS CONVENED JANUARY 3, 2017 FIRST SESSION ! ADJOURNED JANUARY 3, 2018 SECOND SESSION ! CALENDARS OF THE UNITED STATES HOUSE OF REPRESENTATIVES AND HISTORY OF LEGISLATION FINAL EDITION E PL UR UM IB N U U S FIRST SESSION www.HouseCalendar.gov PREPARED UNDER THE DIRECTION OF KAREN L. HAAS, CLERK OF THE HOUSE OF REPRESENTATIVES: By the Office of Legislative Operations The Clerk shall cause the calendars of the House to be Index to the Calendars will be included on the first legislative day of distributed each legislative day. Rule II, clause 2(e) each week the House is in session U.S. GOVERNMENT PUBLISHING OFFICE : 2018 28–916 2 SPECIAL ORDERS SPECIAL ORDER The Speaker’s policy with regard to special-order speeches announced on February 11, SPEECHES 1994, as clarified and reiterated by subsequent Speakers, will continue to apply in the 115th Congress, with the following modifications. The Chair may recognize Members for special-order speeches for up to 4 hours. Such speeches may not extend beyond the 4-hour limit without the permission of the Chair, which may be granted only with advance consultation between the leader- ships and notification to the House. However, the Chair will not recognize for any special-order speeches beyond 10 o’clock in the evening. The 4-hour limitation will be divided between the majority and minority parties. Each party is entitled to reserve its first hour for respective leaderships or their designees. The second hour reserved to each party will be divided into two 30- minute periods.
    [Show full text]
  • Tom's Tidbits Our Feature Articles
    Tom's Tidbits Snowden and the NSA… keep your eye on the ball Our Feature Articles . Orwell was an optimist “Idiot Lights”? Only if you “1998 and newer” isn’t The best articles on the don’t understand them for everyone evolving NSA scandal What do your dashboard We’ll gladly work on our warning lights mean? existing client’s older vehicles Our Monthly Columns . "What NOW?!!" Toons Book Spotlight News To Make You Furious Our special Toon-of-the-Month Surprise! No one is innocent. Small problems… big guns Drew’s Kitchen Humorousness Kelley’s Creamed Potatoes and The lighter side of Orwellian Hell Peas Popcorn Shorts Shop Talk Cool and important stuff that's too Calendar nominations, road trip short for a big article tips, and an indestructible kitten Finally… Flying cars are Health Notes- here! The sweetener that gives Oregon officially agrees… monkeys tumors Corporations are not people! Sellwood Bridge Update FREE Sellwood Park What’s missing in this picture? concerts started with a bang Build your own swamp cooler Tom’s Tidbits Snowden and the NSA… keep your eye on the ball Greetings! Did Edward Snowden watch and learn from the lessons of Bradley Manning? More importantly, have we? Manning leaked information to WikiLeaks anonymously, and it wasn’t until his arrest two months later that we learned his name. That was the beginning of a three-year Kafkaesque odyssey, three years of silence from Manning as Julian Assange tried to make his case, and three years in which the government sequestered and tortured Manning and stonewalled the substance of his leaks.
    [Show full text]
  • SEP 2020 Part A.Pdf
    1 HZS C2BRNE DIARY – September 2020 www.cbrne-terrorism-newsletter.com 2 HZS C2BRNE DIARY – September 2020 HZS C2BRNE DIARY– 2020© September 2020 Website: www.cbrne-terrorism-newsletter.com Editor-in-Chief BrigGEN (ret.) Ioannis Galatas MD, MSc, MC (Army) PhD cand Consultant in Allergy & Clinical Immunology Medical/Hospital CBRNE Planner & Instructor Senior Asymmetric Threats Analyst Manager, CBRN Knowledge Center @ International CBRNE Institute (BE) Senior CBRN Consultant @ HotZone Solutions Group (NL) Athens, Greece Contact e-mail: [email protected] Editorial Team ⚫ Bellanca Giada, MD, MSc (Italy) ⚫ Hopmeier Michael, BSc/MSc MechEngin (USA) ⚫ Kiourktsoglou George, BSc, Dipl, MSc, MBA, PhD (UK) ⚫ Photiou Steve, MD, MSc EmDisaster (Italy) ⚫ Tarlow Peter, PhD Sociol (USA) A publication of HotZone Solutions Group Prinsessegracht 6, 2514 AN, The Hague, The Netherlands T: +31 70 262 97 04, F: +31 (0) 87 784 68 26 E-mail: [email protected] DISCLAIMER: The HZS C2BRNE DIARY® (former CBRNE-Terrorism Newsletter), is a free online publication for the fellow civilian/military CBRNE First Responders worldwide. The Diary is a collection of papers/articles related to the stated thematology. Relevant sources/authors are included and all info provided herein is from open Internet sources. Opinions and comments from the Editor, the Editorial Team or the authors publishing in the Diary do not necessarily represent those of the HotZone Solutions Group (NL) or the International CBRNE Institute (BE). Arabic in the cover says: “Remember Beirut!” www.cbrne-terrorism-newsletter.com 3 HZS C2BRNE DIARY – September 2020 www.cbrne-terrorism-newsletter.com 4 HZS C2BRNE DIARY – September 2020 Editorial Brig Gen (ret.) Ioannis Galatas, MD, MSc, MC (Army) Editor-in-Chief HZS C2BRNE Diary Dear Colleagues, In the news of September, two issues were monopolized our interest: schools opening and covid 19 vaccines.
    [Show full text]
  • Calendars of the United States House of Representatives and History of Legislation
    1 ONE HUNDRED FOURTEENTH CONGRESS CONVENED JANUARY 6, 2015 FIRST SESSION ! ADJOURNED DECEMBER 18, 2015 SECOND SESSION ! CALENDARS OF THE UNITED STATES HOUSE OF REPRESENTATIVES AND HISTORY OF LEGISLATION FINAL EDITION E PL UR UM IB N U U S FIRST SESSION www.HouseCalendar.gov PREPARED UNDER THE DIRECTION OF KAREN L. HAAS, CLERK OF THE HOUSE OF REPRESENTATIVES: By the Office of Legislative Operations The Clerk shall cause the calendars of the House to be Index to the Calendars will be included on the first legislative day of distributed each legislative day. Rule II, clause 2(e) each week the House is in session U.S. GOVERNMENT PUBLISHING OFFICE : 2016 99–687 2 SPECIAL ORDERS SPECIAL ORDER The Speaker’s policy with regard to special-order speeches announced on February 11, SPEECHES 1994, as clarified and reiterated by subsequent Speakers, will continue to apply in the 114th Congress, with the following modifications. The Chair may recognize Members for special-order speeches for up to 4 hours. Such speeches may not extend beyond the 4-hour limit without the permission of the Chair, which may be granted only with advance consultation between the leader- ships and notification to the House. However, the Chair will not recognize for any special-order speeches beyond 10 o’clock in the evening. The 4-hour limitation will be divided between the majority and minority parties. Each party is entitled to reserve its first hour for respective leaderships or their designees. The second hour reserved to each party will be divided into two 30- minute periods.
    [Show full text]
  • Department of Defense Insider Threats: Sharing and Oversight to Protect U.S
    Walden University ScholarWorks Walden Dissertations and Doctoral Studies Walden Dissertations and Doctoral Studies Collection 2020 Department of Defense Insider Threats: Sharing and Oversight to Protect U.S. Installations Yokeitha Anita Ramey Walden University Follow this and additional works at: https://scholarworks.waldenu.edu/dissertations Part of the Public Policy Commons This Dissertation is brought to you for free and open access by the Walden Dissertations and Doctoral Studies Collection at ScholarWorks. It has been accepted for inclusion in Walden Dissertations and Doctoral Studies by an authorized administrator of ScholarWorks. For more information, please contact [email protected]. Walden University College of Social and Behavioral Sciences This is to certify that the doctoral dissertation by Yokeitha A. Ramey has been found to be complete and satisfactory in all respects, and that any and all revisions required by the review committee have been made. Review Committee Dr. Ian Cole, Committee Chairperson, Public Policy and Administration Faculty Dr. Olivia Yu, Committee Member, Public Policy and Administration Faculty Dr. Michael Brewer, University Reviewer, Public Policy and Administration Faculty Chief Academic Officer and Provost Sue Subocz, Ph.D. Walden University 2020 Abstract Department of Defense Insider Threats: Sharing and Oversight to Protect U.S. Installations by Yokeitha A. Ramey MS, Columbia Southern University, 2007 BGS, Louisiana State University and A&M College, 1997 Dissertation Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy Public Policy and Administration Walden University May 2020 Abstract The growing threat of Islamic State of Iraq and the Levant and other terrorist organizations increases the Department of Defense’s (DoD’s) chance of encountering an insider threat, which creates the need for the DoD to develop programs to address this concern and mitigate the risk to national security.
    [Show full text]
  • Ethical Implications of the Snowden Revelations
    1 Ethical Implications of the Snowden Revelations Draft 12 for IJISPA (International Journal of Intelligence, Security, and Public Affairs) Michael Andregg, University of St. Thomas and University of Minnesota, St. Paul, Minnesota, USA. [email protected] abstract This paper addresses a number of ethical dilemmas and practical consequences of the revelations of Edward Snowden about massive electronic surveillance of telephone calls, emails, social media posts and other “Signals Intelligence” (or SIGINT) across the entire world, but especially including domestic American communications formerly thought immune to such surveillance unless authorized by judicial warrant. Practical consequences matter for all “utilitarian” ethical judgments. The author concludes that by far the largest issue is whether US intelligence professionals regard the US Constitution as supreme law in America, or non- disclosure contracts with individual agencies or the US government. Reactions to Snowden follow this pattern, with security cleared insiders generally considering him a traitor, and ordinary people generally considering him a hero for telling the public about illegal activity within the National Security agency directed against fundamental, and constitutionally protected civil liberties like freedom of speech. Introduction The most profound ethical question raised by revelations by Edward Snowden of vast increases in National Security Agency (NSA) surveillance, both foreign and domestic, is which is more important: An oath before God to preserve, protect and defend the US Constitution, or contracts with government agencies to guard every secret so classified from disclosure, even if those secrets suggest pervasive violations of the Constitution? This is the fissure that divides many practitioners, who think that Snowden is a traitor to their agencies and perhaps even to the people 2 at large, and a great many outsiders who think that Snowden is a hero for revealing massive wrongdoing under color of authority, shielded by excessive secrecy.
    [Show full text]
  • SECRET SOURCES Whistleblowers, National Security, and Free Expression SECRET SOURCES: WHISTLEBLOWERS, NATIONAL SECURITY, and FREE EXPRESSION
    SECRET SOURCES Whistleblowers, National Security, and Free Expression SECRET SOURCES: WHISTLEBLOWERS, NATIONAL SECURITY, AND FREE EXPRESSION November 10, 2015 © PEN American Center 2015. All rights reserved PEN American Center is the largest branch of PEN International, the world’s leading literary and human rights organization. PEN works in more than 100 countries to protect free expression and to defend writers and journalists who are imprisoned, threatened, persecuted, or attacked in the course of their profession. PEN America’s 4,200 members stand together with more than 20,000 PEN writers worldwide in international literary fellowship to carry on the achievements of such past members as James Baldwin, Robert Frost, Allen Ginsberg, Langston Hughes, Arthur Miller, Eugene O’Neill, Susan Sontag, and John Steinbeck. For more information, please visit www.pen.org. Cover (clockwise): Photograph of Pentagon by David B. Gleason. Photograph of the Central Intelligence Agency New Headquarters Building by the CIA. Photograph of the National Security Agency building by the NSA. CONTENTS Introduction 4 Methodology 6 U.S. and International Legal Provisions on Freedom of Expression and Access to Information 7 Current Law and Policy Relating to the Reporting and Disclosure of Government Practices 9 Protections Afforded to Intelligence Community Employees and Contractors: An Overview 9 Specific Legal Mechanisms to Protect National Security Whistleblowers 13 Laws and Policies Used Against National Security Leakers 17 Conclusion 27 Recommendations 27
    [Show full text]
  • Insider Threat Detection Study
    Markus Kont, Mauno Pihelgas, Jesse Wojtkowiak, Lorena Trinberg, Anna-Maria Osula Insider Threat Detection Study 1 This publication is a product of the NATO Cooperative Cyber Defence Centre of Excellence (the Centre). It does not necessarily reflect the policy or the opinion of the Centre or NATO. The Centre may not be held responsible for any loss or harm arising from the use of information contained in this publication and is not responsible for the content of the external sources, including external websites referenced in this publication. Digital or hard copies of this publication may be produced for internal use within NATO and for personal or educational use when for non- profit and non-commercial purpose, provided that copies bear a full citation. www.ccdcoe.org [email protected] 2 Executive Summary This study focuses on the threat to information security posed by insiders (i.e., insider threat) as the recent cases of Edward Snowden, Chelsea Manning, and Herman Simm have highlighted the significant risks of “good guys gone bad” within a defence structure. Insider threat has to, in particular, be explored as most security frameworks focus on intrusions by external actors. But what happens if the malicious user is able utilise internal channels to access your systems? What if the perpetrator is someone who you trust? How do you detect and deal with a destructive and hostile insider with a security clearance? Our work provides a comprehensive overview of insider threat, examines a selection of high-profile incidents and existing research. The analysis takes an interdisciplinary approach, discussing insider threat from technical, legal, and behavioural perspectives.
    [Show full text]
  • A Rhetorical Hermeneutics of Danger: Leaks in the Digital Age
    A Rhetorical Hermeneutics of Danger: Leaks in the Digital Age. A DISSERTATION SUBMITTED TO THE FACULTY OF UNIVERSITY OF MINNESOTA BY Daniel Ladislau Horvath IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY Advisor Ronald Walter Greene May 2015 © Daniel Ladislau Horvath 2015 Acknowledgements I would like to express the deepest appreciation to my mentor and advisor, Dr. Ronald Walter Greene. His truly inspiring work and his gentle soul have defined the trajectory of my entire academic career. I also want to thank my committee—Dr. Karlyn Kohrs Campbell, Dr. Arthur Walzer, Dr. Edward Schiappa—for their hard work and, above all, for their patience. Their attentive reading and thoughtful feedback have shaped the present argument, made me a better writer, and helped me become a more discerning thinker. I would also like to thank my writing and support group—Dr. Shannon Stevens, Erin Cole, and Dr. Dana Schowalter—for their unwavering support. My appreciation goes to the larger UMN family as well—professors, friends, colleagues—as integral parts of the universe that made this project possible. I also want to mention all my professors at UNLV who encouraged me to pursue my studies, none more adamantly so than my MA advisor Dr. Donovan Conley. On a personal note, my sister, Edith, my brother in law, Robert, and my niece, Petra, have provided a home far from home. I would not have survived let alone thrived in the U.S. without their love and support. I am also grateful for my parents’ patience. Silvia and Vasile paid the steepest price for my success: not being able to see their son in person for the last 10 years.
    [Show full text]