The Language of Fear Communicating Threat in Public Discourse (Piotr Cap (Auth.) )
The Language of Fear Communicating Threat in Public Discourse (Piotr Cap (Auth.) )
Piotr Cap
The Language
of Fear
Communicating Threat in Public Discourse
Piotr Cap
Department of Pragmatics
University of Łódź
Łódź, Poland
Cover illustration: Pattern adapted from an Indian cotton print produced in the 19th century
7 Conclusion 81
Bibliography 83
Index 89
v
LIST OF FIGURES
vii
LIST OF TABLES
ix
INTRODUCTION
This book has two aims: empirical and theoretical. The empirical aim is to
study patterns of threat construction and fear generation in contemporary
public communication, including state political discourse as well as non-
governmental, media and institutional discourse on issues of public con-
cern, such as health, environment and technology. We argue that most
public communication is inherently coercive, involving a variety of dis-
cursive strategies by which the top actors (political, organizational and
business leaders) legitimize their goals, actions and policies. We claim that
manufacturing fear and social anxiety is a central feature of modern public
discourse, serving to justify policies which include the policy-makers and
their audiences in a joint course of action aimed to prevent or neutralize
the threat. The book documents these claims in examples from a number
of American as well as European discourses, including presidential
speeches, journalistic opinions and organizational reports. The approach
is essentially critical discourse analytic, combining insights from prag-
matics, cognitive linguistics, text linguistics and several non-linguistic
theories within social and political sciences. In particular, the book
employs the apparatus of Proximization Theory (PT). PT is a recent
model of crisis construction and threat generation which has been devel-
oped to account for the ways in which the discursive construction of
closeness and remoteness can be manipulated in the public sphere and
bound up with fear, security and conflict. Originally designed to deal with
instances of state political communication (presidential addresses, parlia-
mentary debates), PT is used in the book to cover an extended spectrum of
public discourses, from immigration debates to anti-tobacco campaigns.
xi
xii INTRODUCTION
Discourse Representations
Several models have been proposed to account for this cognitive–linguistic
interplay, such as ‘text worlds’ (Fauconnier 1985; Werth 1999; Gavins
2007) and ‘discourse spaces’ (Levinson 2003; Chilton 2004, 2014). Text
World Theory (Gavins 2007), Deictic Space Theory (Chilton 2004, 2014)
and the theory of spatio-temporal frames of reference (Levinson 2003) all
agree that texts/discourses enable hearers to generate cognitive structures
in short- and long-term memory, as it were backstage rather than upfront
in the words themselves. We can think of such structures – ‘spaces’ or
‘worlds’ – as discourse ontologies. All forms of public communication make
assumptions about what there is in the public sphere – what social entities
exist and what are the relationships between them, including physical
distance as well as, usually, ideological/moral distance. The basic archi-
tecture of a discourse space (DS) is thus as follows (Fig. 1.1):
While this core bipolar arrangement of the DS is seldom disputed,
controversies arise with regard to the many and different ways in which
the distance between the Self and the Other can be defined. There is first
of all – as has been noted – physical or spatial distance, but the other
dimensions are far less obvious. In his influential Deictic Space Theory
(DST), Chilton (2004, 2014) acknowledges the primacy of the spatial
dimension and recognizes two accompanying dimensions, temporal and
1 COGNITIVE, SOCIAL AND PSYCHOLOGICAL ISSUES OF PUBLIC DISCOURSE . . . 5
Other
There
Bad
ce
an
st
Di
Self
Here
Good
Discourse space
tpast m
tfuture
s
33
32
Asia, Middle East, Islam
30'
31'
Kosovo, Bosnia, Sarajevo
Metonymy 28-31
25, 26
t
Our new allies
m
WWI Our allies
Map
WWII Europe
Could
End of
Cold war
Turner 2002). ‘This map’ in the studio (or ‘in’ the viewer’s area)
represents a conceptual space that is mutually understood as remote
(‘there’ in [31]), but which the map presented ‘here’ and ‘now’ makes
conceptually close. In the process of defining the map’s conceptual
projection space the use of ‘could’ ([30′] in ‘countries that could be
overwhelmed by a large new wave of refugees from Kosovo’) prompts
the addressee to launch a space at the possibility point of m and in the
near future zone of t. This is not part of the televised map picture; it is
part of the conceptual ‘picture’ produced by the discourse, which
conflates the apparently remote Kosovo space and addressee space.
The resulting proximity of the Kosovo space and its negatively charged
Other-entities (as opposed to the positively charged Self-entities
[President Clinton, his audience, allies in Europe] in the deictic cen-
tre) allows transition to (31), which expresses a generalized likelihood
of a major military conflict and thus threat to American interests. In
(31), the positioning of the (31′) embedded clause (‘ . . . who has done
nothing since the Cold War but start new wars and pour gasoline on
the flames of ethnic and religious divisions’) as a syntactic and intona-
tional focus furthers this likelihood by a metaphoric phrase: the ‘flames
of divisions’ (refugees fleeing from Kosovo) will cause a major ‘fire’ in
the region as they ‘meet’ with (more) ‘gasoline’.
On the t axis, the geopolitical space is extended ‘backwards’, meto-
nymically, by reference to the spatial location ‘Sarajevo’ (32). Kosovo
is linked to Sarajevo, and Sarajevo is linked metonymically to World
War I, and World War I to World War II and the Holocaust. The links
can be considered metonymic since the relation between Kosovo,
Sarajevo and WWI is one of conceptual ‘contiguity’ in a geopolitical
frame which holds events progressing from the remote past toward the
present. ‘Sarajevo’ is used to evoke the whole WWI frame, and ‘this
region’ (33) is used in the same metonymic fashion to evoke the
WWII and the Holocaust frames. These discursively linked frames
constitute the groundwork for two sets of generalizations: (31) relat-
ing to the geographical space conceptualized ‘around’ Kosovo, and
(34)–(35) relating to a flashback historical space conceptualized in
connection with Sarajevo. These generalizations are used in turn to
wrap up the entire representation ([36]–[37]) and justify its initial
point (25), that is a moral imperative to act.
1 COGNITIVE, SOCIAL AND PSYCHOLOGICAL ISSUES OF PUBLIC DISCOURSE . . . 9
CREDIBILITY
The construction of analogy, as well as other carriers of fear-based legit-
imization, relies for success on the credibility of the speaker. This includes
enactment of credibility for a new legitimization case, maintaining cred-
ibility notwithstanding contextual developments which undermine it, and,
notably, re-enactment of credibility after it has been temporarily
damaged/lost. There are two classic theories which are relevant for each
of these three situations. The latitude of acceptance theory (Sherif and
Hovland 1961; Kiesler et al. 1969; Jowett and O’Donnell 1992) main-
tains that the best credibility (and thus legitimization) effects can be
expected if public speaker produces her message in line with the psycho-
logical, social, political, cultural, religious, etc., predispositions of the
addressee (Jowett and O’Donnell 1992). However, since full compliance
is almost never possible, it is essential that the novel message is at least
tentatively or partly acceptable – then, its acceptability and the speaker’s
credibility are going to increase with time. This is where consistency theory
starts. Festinger (1957) observes that the increase in credibility over time
can be attributed to human drive toward consistency in belief. Namely,
people possess the need for ‘homeostasis’, a state of mental stability. This
means that, in the long run, they do not tolerate dissonance in their
judgements, especially with regard to the same or similar issues.
Consequently, whenever faced with a new message producing a potential
conflict with the existing ideological, psychological or moral groundwork,
people go to great lengths trying to see any positive aspects of the
message so it could be internalized as an element of the groundwork.
Naturally, the precondition obtains that the message is not entirely reject-
able from the very beginning; at least some parts of it must be congruent
with the addressee’s predispositions.
Issues of credibility in public discourse have also been investigated by
cognitive-evolutionary theories, such as cheater detection module (Axelrod
1984; Cosmides 1989; Sperber 2000; etc.). The cheater detection
module has been originally (Axelrod 1984; Cosmides 1989) considered
a logico-rhetorical device that evolved in human cognition to resist acts of
deception, through the checking of speaker’s coherence. This basic char-
acterization has undergone several modifications, which involve seeing the
module not only as addressee’s defense mechanism but also as speaker’s
persuasion tool, particularly useful in threat communication. In Dan
Sperber’s (2000, p. 136) words, for addressees the module is ‘a means
1 COGNITIVE, SOCIAL AND PSYCHOLOGICAL ISSUES OF PUBLIC DISCOURSE . . . 11
administration had to find a new legitimization premise for the Iraq war,
yet without making nonsense of the original premise of ‘direct threat’.
Consequently, the phrase ‘programs for WMD’ was coined at the end of
2003, replacing the initial ‘WMD’. The function of the new phrase was to
induce two apparently disparate inferences at the same time: one seeing
WMD as a ‘product’ in accordance with the original premise, and the
other seeing it as a vague ‘conception’.
Credibility and legitimization issues have also been addressed by text and
corpus linguistics, especially in the area of internal and external coherence of
texts (Hart 2010, pp. 92–94), offering a much needed linguistic addition to
cognitive models such as cheater detection. As far as internal coherence is
concerned, Gough and Talbot (1996) indicate that legitimization of asser-
tions is greatly enhanced by the use of logical terms (‘and’, ‘or’, ‘if’) and
items marking inferential relationships (‘therefore’, ‘since’, ‘nevertheless’,
etc.). These terms are considered adaptive devices for persuasion, facilitating
acceptance of ideational information and ‘cueing ideological assumptions’
(Fairclough 1989, p. 109). Regarding external coherence, scholars have
stressed the role of evidentiality (the linguistic marking of evidence) as a
source of reliability of assertions. For example, Bednarek (2006) identifies
four specified bases of knowledge used as evidence in the British newspaper
reporting of transnational crises: (i) Perception; (ii) General Knowledge;
(iii) Proof; (iv) Obviousness. These bases of knowledge legitimize assertions
in different ways, drawing on different types of evidence. Perception provides
directly attested sensory evidence, whose existence is indicated in discourse
by phrases such as ‘it appears that’ or ‘visibly’. The evidence is construed as
acquired directly via visual perception or as something made available to see.
Evidence from General Knowledge is ‘marked as based on what is regarded
as part of the communal epistemic background’ (Bednarek 2006, p. 640)
and the most typical markers are ‘widely held [view(s), opinion(s)]’ and
‘everybody knows (it/that)’. Hart (2010) observes that this pattern of
legitimization reflects what Van Leeuwen and Wodak (1999) call ‘confor-
mity authorization’, involving the ad populum fallacy that something is true
if everyone believes it. Proof is expressed by markers such as ‘research’,
‘results’, ‘statistics’, etc., which ‘show’, ‘indicate’ or ‘reveal’ facts; as such,
Proof often overlaps with Perception. Finally, Obviousness provides evidence
from so-called facts of life – self-evident claims containing phrases such as
‘obviously’ or ‘clearly’.
Lastly, applied studies point out that legitimization of assertions, espe-
cially those expressing strong and imminent threats, benefits a lot from
1 COGNITIVE, SOCIAL AND PSYCHOLOGICAL ISSUES OF PUBLIC DISCOURSE . . . 13
NOTE
1. Numbering original (Chilton 2004, p. 142).
CHAPTER 2
Them
There
Bad
n
tio
iza ODC
o xim
Pr
Us
Here
Good
IDC
Discourse space
Table 2.1 Spatial proximization framework and its key lexico-grammatical items
Category Key items
but also serves to abstract the relevant lexico-grammatical items. The items
in the framework are quantifiable, which means they define the intensity of
the kind of proximization applied. Table 2.1 below includes the spatial
items abstracted from a corpus of the US anti-terrorist rhetoric – a state
interventionist discourse widely analysed within the proximization para-
digm (Cap 2013; among others).
The six categories depicted in the left-hand column are a stable element
of the spatial proximization framework, while the key items provided in
the right-hand column depend on the actual discourse under investiga-
tion. Table 2.1 includes the most frequent of the spatial proximization
items in the 2001–2010 corpus of presidential addresses on the US anti-
terrorist policies.1 Quantifiable items appear in square brackets and
20 THE LANGUAGE OF FEAR
We are facing a crucial period in the history of our nation, and of the
civilized world. . . . On a September morning, threats that had gathered for
years, in secret and far away, led to murder in our country on a massive
scale. As a result, we must look at security in a new way, because our
country is a battlefield in the first war of the 21st century. . . . We learned a
lesson: the dangers of our time must be confronted actively and forcefully,
before we see them again in our skies and our cities. And we will not allow
the flames of hatred and violence in the affairs of men. . . . The world has a
clear interest in the spread of democratic values, because stable and free
nations do not breed the ideologies of murder. . . . Saddam Hussein and his
weapons of mass destruction are a direct threat to our people and to all free
people. . . . My job is to protect the American people. When it comes to our
security and freedom, we really don’t need anybody’s permission. . . .
We’ve tried diplomacy for 12 years. It hasn’t worked. Saddam Hussein
hasn’t disarmed, he’s armed. Today the goal is to remove the Iraqi regime
22 THE LANGUAGE OF FEAR
In a nutshell, the AEI speech states that there are WMD4 in Iraq and
that, given historical context and experience, ideological characteristics of
the adversary as opposed to American values and national legacy, and G.
W. Bush’s obligations as standing US president, there is a case for
legitimate military intervention. This complex picture involves historical
flashbacks, as well as descriptions of the current situation, which both
engage proximization strategies. These strategies, involving the usual
credibility ploys (cf. Chap. 1), operate at two interrelated levels, which
can be described as ‘diachronic’ and ‘synchronic’. At the diachronic level,
Bush evokes ideological representations of the remote past, which are
‘proximized’ to underline the continuity and steadfastness of purpose,
thus linking with and sanctioning current actions as acts of faithfulness to
long-accepted principles and values. An example is the final part: ‘The
liberation is . . . promise. The objectives . . . have come before’. It launches
a temporal analogy ‘axis’ which links a past reference point (the founding
of America) with the present point, creating a common conceptual space
for both the proximized historical ‘acts of heroism’ and the current and/
or prospective acts construed as their natural ‘follow-ups’. This kind of
legitimization, performed by mostly temporal and axiological proximiza-
tion (the originally past values become the ‘here and now’ premises for
action5), draws, in many ways, upon the socio-psychological predisposi-
tions of the US addressee (Dunmire 2011). On the lexical plane, the job
of establishing the past-present link is performed by assertions, which fall
within addressee’s ‘latitude of acceptance’ (Jowett and O’Donnell
1992).6 The assertions range from indisputably acceptable (‘My job
is . . . ’; ‘The liberation of millions . . . ’), to acceptable due to credibility
developed progressively within a ‘fact-belief series’ (‘We’ve tried diplo-
macy for twelve years [FACT] . . . he’s armed [BELIEF]’), but none of
them is inconsistent with the key predispositions of the addressee.
At the synchronic level, historical flashbacks are not completely aban-
doned, but they involve proximization of near history and the main
legitimization premise is not (continuing) ideological commitments, but
the direct physical threats looming over the country (‘a battlefield’, in
G.W. Bush’s words). As the threats require a swift and strong pre-emptive
2 PROXIMIZATION: A THREAT-BASED MODEL OF POLICY LEGITIMIZATION 23
the AEI speech, however, all the entities (both IDCs and ODCs) are
construed in abstract, rather than physical, ‘tangible’ terms, as respective
lexical items are not explicitly but only inferentially attributed to concrete
parties/groups. For example, compare phrases such as ‘all free people’,
‘stable and free nations’, [terrorist] ‘flames of hatred’, etc., in the AEI
address, with the single-word abstract items of general reference such as
‘dictatorship’ and ‘radicalism’, in the Whitehall speech. Apparently, prox-
imization in the Whitehall speech is essentially a proximization of antag-
onistic values, and not so much of physical entities as embodiments of
these values. The consequences for maintaining legitimization stance
which began with the AEI address are enormous.
First, there is no longer a commitment to a material threat posed by
a physical entity. Second, the relief of this commitment does not
completely disqualify the original WMD premise, as the antagonistic
‘peripheral’ values retain a capacity to materialize within the DS deictic
centre (viz. ‘ . . . a cycle of dictatorship and radicalism that brings mil-
lions of people to misery and brings danger to our own people’,
reiterating ‘The world has a clear interest in the spread of democratic
values, because stable and free nations do not breed the ideologies of
murder’ from the AEI speech). Third, as the nature of ideological
principles is such that they are (considered) global or broadly shared,
the socio-ideological argument helps extend the spectrum of the US
(military) engagement (‘Burma’, ‘Sudan’, ‘Zimbabwe’), which in turn
forces the construal of failure to detect WMD in Iraq as merely an
unlucky incident amongst other (successful) operations, and not as
something that could potentially ruin the US credibility.
Add to these general factors the power of legitimization ploys in
specific pragmalinguistic constructs (‘programs for weapons of mass
destruction’,7 the enumeration of the ‘new’ foreign fields of engage-
ment [viz. ‘Burma’, etc., above], the always effective appeals for soli-
darity in compassion [viz. ‘terrified victims’ in ‘torture chambers’]) and
there are reasons to conclude that the autumn 2003 change to essen-
tially axiological discourse (subsuming axiological proximization) has
helped a lot towards saving credibility and thus maintaining legitimiza-
tion of not only the Iraq war, but the later anti-terrorist campaigns as
well. The flexible interplay and the discursive switches between spatial
and axiological proximization (both aided by temporal projections) in
the early stages of the US anti-terrorist policy rhetoric have indeed
made a major contribution.
26 THE LANGUAGE OF FEAR
NOTES
1. The corpus contains 402 texts (601,856 words) of speeches and remarks,
downloaded from the White House website http://www.whitehouse.gov
in January 2011. It includes texts matching at least two of the three issue
tags: defense, foreign policy, homeland security.
2. See Cap (2013, pp. 108–109) for details. See also the two other frameworks,
temporal (p. 116) and axiological (p. 122), which we do not have space to
discuss here.
3. The parts are quoted according to the chronology of the speech.
4. Weapons of mass destruction.
5. This is a secondary variant of axiological proximization. As will be shown,
axiological proximization mostly involves the adversary (ODC); antagonistic
values are ‘dormant’ triggers for a possible ODC impact.
6. We have noted in Chap. 1 that the best credibility and thus legitimization
effects can be expected if the speaker produces her message in line with the
psychological, social, political, cultural, etc., predispositions of the addres-
see. However, since a full compliance is almost never possible, it is essential
that a novel message is at least tentatively or partly acceptable; then, its
acceptability and the speaker’s credibility tend to increase over time.
7. The nominal phrase ‘[Iraq’s] programs for WMD’ is essentially an implica-
ture able to legitimize, in response to contextual needs, any of the following
inferences: ‘Iraq possesses WMD’, ‘Iraq is developing WMD’, ‘Iraq intends
to develop WMD’, ‘Iraq intended to develop WMD’, and more. The phrase
was among G.W. Bush’s rhetorical favourites in later stages of the Iraq war,
when the original premises for war were called into question.
8. See Hart and Cap (2014) for an overview of current work in Critical
Discourse Analysis (CDA).
CHAPTER 3
Health Discourse:
The War on Cancer and Beyond
Abstract Initiating a series of four case studies, this chapter explores the
applicability of Proximization Theory in health discourse. It demon-
strates that fear-inducing proximization strategies are widely present in
the discourse of disease prevention and health promotion. Picturing
disease as ‘aggressive enemy’ which ‘invades’ the patient, the speaker
(medical practitioner, healthcare institution) generates a fear appeal
which helps justification of a preferred course of treatment. The chapter
uses data from anti-tobacco and swine flu prevention campaigns.
The study in Chap. 2, as well as several other proximization studies (e.g. Cap
2013; Dunmire 2011; Hart 2010, 2014; Wieczorek 2013), points towards
new empirical territories. They suggest that the explanatory power of
Proximization Theory (PT) goes beyond state political discourse (such as
the US anti-terrorist rhetoric) and can be used to account for a broader range
of legitimization discourses in the vast space of public communication.
Prospects look promising as many of these discourses demonstrate analogies,
apparently remote yet actually close, to state-level interventionist discourse.
First, many reveal a similar conceptual groundwork, that is the presumed
cognitive dichotomy of the ‘bad Other’ encroaching upon the ‘good Self’.
(1) Cancer is an aggressive enemy that invades the body. In response, the
body launches an offensive and defends itself, fighting back with its army of
3 HEALTH DISCOURSE: THE WAR ON CANCER AND BEYOND 31
killer T-cells. However, this is not enough and doctors are needed to target,
attack and try to defeat, destroy, kill or wipe out the cancer cells with their
arsenal of lethal weapons. However, cancer cells may become resistant and
more specialised treatments are required, such as magic bullets or stealth
viruses. (Van Rijn-van Tongeren 1997, emphasis original)
(2) The next trial involves several hundred patients, helping microwaves
become another cancer-fighting tool.
(3) This molecule called Sumo, is then attacked by an enzyme called RNF4,
a process that also destroys the cancer-causing proteins.
(4) A second gene, called LMTK2 is a promising target for new drugs to
treat the disease.
(5) This activates only those antibodies surrounding cancer, which then
attract the immune system’s army of killer T cells, to destroy the tumor.
differences call for a more extensive, textual look at the cancer prevention
discourse, to distinguish the areas which can be described in terms of the
STA model, from those which might not be describable quite as easily,
unless the model is revised to deal with a broader spectrum of data.
(6) Some say we can contain melanoma with standard chemotherapy mea-
sures. The evidence we have says we must strike it with a full force in its
earliest stages. We will continue to conduct screening programmes to spot
the deadly disease before it has spread throughout the body. We must be
able to wipe out all the infected cells in one strike, otherwise it takes a
moment before they continue to replicate and migrate around the body. We
now aim to develop a new treatment that targets the infected cells with
precision, effectively destroying the engine at the heart of the disease, and
doing minimal harm to healthy cells. We will inject specially-designed anti-
bodies coated in a light-sensitive shell. The coating prevents the antibodies
from causing a massive immune reaction throughout the body. Once the
‘cloaked’ antibodies have been injected, we will shine the new strong ultra-
violet light on the engine and the infected cells.
To elucidate all analogies and empirical similarities, the analysis of this text
in terms of PT and the STA model must involve, same as the analysis of the
US anti-terrorist discourse in Chap. 2, at least three interrelated levels.
These are: the conceptual level of organization of the Discourse Space
(DS), the level of lexis responsible for the enactment of strategic changes
to the DS principal organization, and finally the coercion level, where the
text is considered an example of legitimization discourse which aims to
win support for specific actions performed by the speaker. At the DS
conceptual level, we must be able to determine the presence of the IDC
(‘home’, ‘central’, ‘Self’) entity and the ODC (‘alien’, ‘peripheral’,
‘Other’) entity, the existence of a conceptual shift whereby the ODC
entity impacts the IDC entity, and a preventive or reactive posture of the
IDC entity. Looking at (8), this arrangement indeed holds in general,
3 HEALTH DISCOURSE: THE WAR ON CANCER AND BEYOND 33
though there are some deviations. The IDC status can be assigned, most
directly, to the patient’s body, which is invaded by cancer cells, which thus
emerge as the ODC entity. This basic proximization construal follows the
standard metaphoric conceptualization of the body as a container (Lakoff
and Johnson 1980; etc.). But the container metaphor is only partly of
relevance here since the patient’s body is not a typical IDC, in the sense of
where the impact it undergoes comes from. In that sense, the cancer cells,
responsible for the impact, are not a typical ODC, either. As has been
pointed out, cancer cells develop, technically, inside the patient’s body. At
the same time, causes of cancer are put down to internal (e.g. genetic), as
well as external (e.g. civilizational), factors. The picture gets even more
complex if we consider the aspect of agency. While the body has an
internal defense mechanism, fighting the cancer cells involves mostly
external resources, that is measures applied by the physician. Thus, in
terms of neutralization of the ODC impact, the physician becomes an
IDC entity as well, and even more so considering he remains under the
cancer threat himself. What we arrive at, then, is a rather broad concept of
the IDC entity, involving the patient and, by the attribution of agency and
the recognition of common threat, the physician, as well as a vaguely
construed concept of the ODC party, involving the infected cells in the
patient, but also a whole array of cancer provoking factors, ‘located’
externally. Looking at (6), it appears that the only (though crucial) part
of the default proximization arrangement that cancer discourse does not
alter in any way is the construal of the very impact. Indeed, it seems that all
of its characteristics, like speed, imminence and deadliness, are there in the
text, which in that sense resembles the two texts of state political discourse
in Chap. 2.
This last observation explains why there are fewer analytic problems at
the level of lexis. In proximization discourse, lexical markers of the ODC
impact generally count among the most plentiful, within all the linguistic
material categorized (Cap 2013). As a result, the abundance of such
markers in (6) makes its phrases resemble many of the discourse items
and sequences we have seen above in the war on terror rhetoric.1 The
ODC impact speed is coded explicitly in phrases such as ‘spread through-
out the body’, ‘it takes a moment’, ‘replicate and migrate around’, and
can also be inferred from ‘we must strike it with a full force in its earliest
stages’, ‘we must be able to wipe out all the infected cells in one strike’
and ‘the engine at the heart of the disease’. The imminence is construed
in, for instance, ‘before it has spread throughout’ and ‘in its earliest
34 THE LANGUAGE OF FEAR
texts differ with regard to the kind and number of ODC agents (‘swine flu
virus’ in [7]; ‘secondhand smoke’, ‘tobacco’, ‘tobacco industry’ in [10]),
both construe all the ODC agents as inherently evil (‘killer virus’, ‘deadly
virus’, ‘tobacco kills’ ‘[tobacco industry] are terrorists’). This is contrasted
with the innocence and helplessness of the victims: both texts include in the
IDC group the most vulnerable individuals, such as ‘pregnant women’ and
‘the elderly’ in (7), and ‘children’ in (8). As a result, the fear-raising appeal
of the enemy entity gets stronger, triggering expectations of an effective
defense or prevention plan. The characterization of the ODC entity as evil is
deftly combined with its construal as active and potent. In (7) a historical
flashback is used to endorse the high calibre of the current threat (‘The
swine flu virus that swept the world last year causing a global health
emergency has returned’). In (8), a bomb metaphor is used to underline
the size and urgency of the threat (‘The bomb is ticking’).
This brings us to the construal of the ODC impact. To force the construal
of the impact as a close and threatening possibility, both (7) and (8) include
expressions structured grammatically in the progressive imperfective aspect
(‘The H1N1 swine flu virus is targeting’, ‘We are just beginning to see more
of H1N1 activity’, ‘Toxicity is growing every second’, ‘The bomb is tick-
ing’). It is commonly accepted that with regard to its grammatical and
discourse function, the progressive imperfective represents actions as
‘unbounded’, incomplete and without explicitly indicated endpoints
(Bybee and Fleischman 1995). It thus helps construe the present moment
as durative, that is continuing on into the future unless intervened upon. The
continuity salient in the progressive imperfective phrases can thus be read, in
our case, as the continuity of threat extending into the future yet without
indication of the precise moment of materialization. The consequences of
such a construal for fear generation are enormous. First, the threat that is
unpredictable gets automatically bigger, entailing a continual mobilization
and preparedness of resources to handle it. Second, since the timeframe of
‘waiting for the threat to happen’ is extensive, it provides a background
against which the actual materialization of the threat (the actual impact) is
conceptualized. In this process, the impact is naturally construed as a ‘deadly
strike’, a nick of time bringing about devastating and irreversible change.
The last element of the arrangement is the construal of the ODC
impact effects. Since the ultimate goal of (7) and (8) is unconditional
legitimization, and legitimization gains are the greatest when the impact
of ODCs is conceptualized as maximally consequential, the two texts
feature a number of constructs which evoke globality of the gathering
3 HEALTH DISCOURSE: THE WAR ON CANCER AND BEYOND 37
reproductive capacity in both males and females. . . . Until all forms of public
smoking are banned state-wide in California, your life is at a continual
risk. . . .
(8b) Tobacco kills, and people who market it are terrorists. The bomb is
ticking. Will we respond? If we don’t, who will? Awareness is not
enough; only strategic action will change the course of human events.
The industry is increasingly spending money to target all, but especially
the most vulnerable cells of our society: children, minorities, and
American citizens who had immigrated to our country from the third
world. . . . We need to more aggressively fight tobacco marketing. This is
an issue of social justice. Predatory marketing by the tobacco industry
must be actively opposed.
(Action on Smoking and Health in California, Internet release on
passive smoking and tobacco marketing, 29 July 2009)
The division of excerpt (8) into two parts (8a–8b) allows examination of
the conceptual specificity and heterogeneity of health discourse, particu-
larly disease prevention discourse. Even though (8a) and (8b) belong to
the same text, they reveal, apart from similarities, some subtle differences
with regard to the arrangement of the DS which they construe to generate
threat and fear. Both (8a) and (8b) make use of proximization strategies
conceptually similar to those in the ‘canonical’ representation of state
political discourse (except that the response they legitimize comes no
longer from the speaker alone but rather from the speaker and the addres-
see together). At the DS basic organization level, in both parts the speaker
and the addressee are positioned in the deictic centre, facing an external
threat entity construed as moving from the apparent periphery of the DS
in the direction of the DS centre. Yet in contrast to these similarities, the
argument in (8a) differs from (8b), as well as from a ‘typical’ proximiza-
tion discourse, in its use of intended vagueness. The passive voice makes it
unclear who exactly is expected to act. At the same time, the addressee in
(8b) seems more concrete (activists, voters, legislators) and more able to
deliver a response (‘Will we respond? If we don’t, who will?’). (8b) uses
mostly active voice, as well as inclusive ‘we’, which refers to a broad range
of possible agents.
Less vagueness can be observed as regards the ODC entities, which
become proximized to negatively affect the DS central entities (IDCs).
However, the overall design of the DS is again not quite uniform. In (8a)
the ODC entity is simply ‘secondhand smoke’, which is construed as
3 HEALTH DISCOURSE: THE WAR ON CANCER AND BEYOND 39
animate, almost ‘intelligent’ in fact. This not only maximizes the speed
and force of the impact, but also marks its ‘strategic’ character, which
involves a step-by-step assumption of full control over the body.
Speaking of ‘the body’, we must note that the IDCs in (8a) are not
only the persons exposed to secondhand smoke within their social space,
but also their organs, exposed to the smoke within the bodies, concep-
tualized as ‘containers’ similar to social spaces. This onion structure of
the DS ‘Self’ entities does not detract from their general status as
‘central’; it only produces some referential and agency problems. That
is, while the collective agency in (8a) can easily pertain to people, it
cannot pertain to their organs. In (8b) the ODC entity is again the
smoke (tobacco), but also the ‘tobacco industry’ and ‘people who mar-
ket it’. In contrast to (8a), (8b) reveals no vagueness resulting from the
IDC composition.
At the level of lexis responsible for the discourse enactment of prox-
imization there are fewer asymmetries. In both (8a) and (8b) some
strongly appealing lexico-grammatical forms are used (‘Tobacco kills,
and people who market it are terrorists. The bomb is ticking’, ‘ . . . to
target all, but especially the most vulnerable cells of our society . . . ’,
‘Predatory marketing . . . ’, ‘ . . . could penetrate . . . in no time at all. The
moment you inhale your . . . become affected, transmitting . . . all over . . . ’,
‘Toxicity is growing every second . . . ’, ‘ . . . stroke, heart attack,
cancer . . . ’, ‘ . . . life is at a continual risk’), to indicate the ODC ‘evil’
power, capacity and unpredictability such as necessary to force construals
of the continuing possibility of an unexpected, fast and devastating impact
(note the metaphor of terrorist attacks). At the coercion level, the analo-
gies to state political discourse are equally clear, involving a consistent use
of proximization strategies in the service of legitimization. Both (8a) and
(8b) include discourse that works consistently towards legitimization of
the adoption of anti-tobacco policies – even though there are some
differences with regard to who is directly addressed, who is expected to
respond, and who has the necessary tools. The similarities at the coercion
and lexico-grammatical levels seem to offset these relatively small disana-
logies at the DS organization level. We can thus conclude that health
discourse – and particularly the discourse of disease prevention – lends
itself to analysis within the proximization framework. Moreover, it invites
explorations in further public discourses using the rhetoric of threat and
fear to force interventionist policies.
40 THE LANGUAGE OF FEAR
NOTE
1. Let alone intriguing metaphoric correspondences. Apart from the analogies
listed by Van Rijn-van Tongeren (1997), note that (6) may force construal
of the screening programs as intelligence, the infected cells as terrorist cells,
the new treatment as air strikes on the terrorist cells, and the healthy cells as
civilian population (‘We now aim to . . . , doing minimal harm to healthy
cells’).
CHAPTER 4
CLIMATE CHANGE
Climate change is a relatively new domain of discourse studies, investi-
gated mainly within the rapidly expanding CDA paradigm (Boykoff 2008;
Berglez and Olausson 2010; Krzyżanowski 2009). Thus far, studies in
climate change demonstrate a unilateral focus: most analyses concentrate
on climate change as a form of transnational crisis. There are, however,
two different ways in which this broad conception is approached in actual
analysis. These different approaches result – probably – from two rather
contradictory views that emerge from the media and the related dis-
courses. On the one hand (Krzyżanowski 2009), there exists a tendency
to frame climate change as a general issue of interest and critical impor-
tance to the entire societies and all social groups. Within that trend,
climate change is described mainly as a threat to the entire humanity
which thus must be dealt with by the entire societies or the global
populace as a whole. On the other hand, the somewhat contradictory
approach (Boykoff 2008) sees climate change as a problem which cannot
be handled by the entire societies but by selected individuals who, due to
their knowledge and expertise, are able to cope with different facets of
climate change.
define the Self party and its agents in the first place. We have seen from the
analysis of cancer discourse how difficult that might be. Considering that
climate change is dealt with by a number of different (locationally, politi-
cally, rhetorically, perhaps also ideologically) individual expert voices in
the vast and heterogeneous area of the global socio-political space, an
attempt to ascribe any stable and homogeneous discursive strategies or
practices to these actors would probably fail. However, if we focus on the
global, institutionalized dimension of the discourse of climate change, the
dimension that evens out the individual legitimization-rhetorical and
other differences and conceptually consolidates the Self, chances emerge
that proximization may indeed be applicable. To determine that applic-
ability, and to demonstrate the role of proximization in threat and fear
generation, we discuss excerpts from the speech ‘Emerging Security Risks’
by the NATO Secretary General Anders Fogh Rasmussen. The speech was
given in London, on 1 October 2009:
(1) I want to devote a little more time today discussing the security aspects
of climate change, because I think the time has come for a change in our
approach.
First, I think we now know enough to start moving from analysis to
action. Because the trend lines from climate change are clear enough, and
grim enough, that we need to begin taking active steps to deal with this
global threat.
We know that there will be more extreme weather events – catastrophic
storms and flooding. If anyone doubts the security implications of that, look
at what happened in New Orleans in 2006.
We know sea levels will rise. Two thirds of the world’s population lives
near coastlines. Critical infrastructure like ports, power plants and factories
are all there. If people have to move they will do so in large numbers, always
into where someone else lives, and sometimes across borders.
We know there will be more droughts. According to evidence, by 2025
about 40% of the world’s population will be living in countries experiencing
water shortages. Again, populations will have to move. And again, the
security aspects could be devastating.
If you think I’m using dramatic language, let me draw your attention to
one of the worst conflicts in the world, in Darfur. One of the main causes was
a long drought. Both herders and farmers lost land, including to the desert.
What happened? The nomads moved South, in search of grazing land – right
to where the farmers are. Of course, a lot of other factors have contributed to
what has happened – political decisions, religious differences and ethnic
tensions. But climate change in Sudan has been a major contributor to this
44 THE LANGUAGE OF FEAR
tragedy. And it will put pressure on peace in other areas as well. When it
comes to climate change, the threat knows no borders.
There are more examples, but to my mind, the bottom line is clear. We
may not yet know the precise effects, the exact costs or the definite dates of
how climate change will affect security. But we already know enough to start
taking action. This is my first point: either we start to pay now, or we will pay
much more later.
You get the point. Climate change is different than any other threat we
face today. The science is not yet perfect. The effects are just starting to be
visible, and it’s difficult to pin down what will actually change because of
climate change. The timelines are not clear either. But that only makes the
threat bigger. Sailors never thought the mythical North-West Passage would
ever open. But it is opening. Anything’s possible.
The security challenges being discussed today are big, and they are
growing. They might also seem overwhelming. But I firmly believe that a
lot can be done – to address the root causes, to minimize their impact, and
to manage the effects when they hit.
Table 4.1 Spatial proximization framework and its key lexico-grammatical items
(in anti-terrorist discourse, after Table 2.1)
Category Key items
and proximization. There are two major construals, both involving con-
ceptual shifts. On the one hand, the adversarial posture of the Other
(ODC) is shown as increasingly conducive to physical impact and destruc-
tion. On the other, the Self (IDC) is presented as mindful of certain
historical events and analogies that underlie the present situation. These
events and memories are recontextualized as background for the current
judgment and decisions. The four excerpts below reveal both construals,
embedded in larger patterns of policy legitimization. The excerpts come
from four consecutive State of the State addresses (2007–2010) by the
California Governor Arnold Schwarzenegger:
(2) There are some who don’t see the threat. Some who pretend not to
see it and some who don’t want to see it. I think that global warming is
real; it is a huge and growing problem. There is no single issue that is
threatening the health and prosperity of our nation and humanity more
than climate change. . . . The costs are high and they are growing. The
cost of 19,000 people that are dying here in California alone every year
because of smog, the cost of millions of hospital visits every year for
smog related illnesses. I don’t think that we can afford to waste any more
time. (2007)
(3) We know what’s going on with global warming and we know what’s
going on with the pollution, what kind of a health hazard it is. We must act
because waiting only makes the threat bigger. We must act before the threat
hits with its full force. California has taken the leadership role in fighting
global warming and cleaning our environment, and we have worked very hard
to pass laws in the last few years to make sure that we are fighting global
warming and do everything to clean our environment. This is the challenge of
our generation, and we will meet it with innovation and technology, and with
total commitment that matches the greatest pioneers in our history, because
that’s the way California works. That’s what California is all about. (2008)
(4) We can put not just our nation but the entire world on a path towards a
clean and sustainable future. Wouldn’t that be a great, great thing?
Wouldn’t that be a great legacy for our generation to do that? So this is
why I say let’s go to work, let’s roll up our sleeves make it happen. ‘There are
some in the industry and over there in Washington DC who may not be on
our side. But we have economics on our side. Since the supply of wind and
sun and algae is unlimited, their prices will not jump. That cannot be said of
oil, the supply of which is limited and declining. We are facing all of these
challenges locally here, while in Washington they are still taking their time
and they are not doing anything to act on curbing the greenhouse gas
emissions. (2009)
48 THE LANGUAGE OF FEAR
(5) It used to be that we could sit and wait. But the last years have changed
all that. The time has come to start adopting green policies as fast as we can
develop them, because this is the only way to go and that’s how we can
inspire the creation of new technology, which will save us all. Some have
argued that we can still wait and that’s an option. In my view, it’s the riskiest
of all options. Being dependent on one source of fuel leaves our economy
and our national security vulnerable to price shocks and global events
beyond our control. Hydrogen [as a fuel source in cars] leaves no trail of
pollution and causes no global warming. Using it does not fund the terror-
ists who would destroy us. (2010)
The common function of texts (2), (3), (4) and (5) is to construct a
legitimization frame for a continual implementation of clean energy
policies, providing an effective yet very costly alternative to toxic gas
emissions. Under the Assembly Bill (AB) 32, or the ‘California Global
Warming Solutions Act of 2006’, California will reduce its greenhouse
gas emissions to 1990 levels by 2020, which roughly equates to a 15 %
reduction. In 2011 the California Air Resources Board adopted a cap-
and-trade program, which covers the ‘major sources of [greenhouse gas]
emissions in the State such as refineries, power plants, industrial facilities
and transportation fuels’ (Air Resources Board 2013). The program
commenced in 2012, and ‘enforceable compliance obligations’ came
into effect in relation to emissions generated in 2013. It is planned that
the cap-and trade program will aid the achievement of an 80 % reduction
of emissions, as dictated by AB 32. The Low Carbon Fuel Standard,
which was issued in 2007, ‘calls for a reduction of at least 10 % in the
carbon intensity of California’s transportation fuels by 2020’. Overall, it
is estimated that these regulations will result in an ‘18 % reduction in
climate change emissions from the light-duty fleet [of vehicles] in 2020
and a 27 % reduction in 2030.’ (Air Resources Board 2014). Further
investments include the Million Solar Roof Initiative, which offers tax
incentives to the general public in return for installing solar panels on
their homes; and the Hydrogen Highway project, which is designed to
ensure that those who buy hydrogen powered cars will have access to
hydrogen fuelling stations throughout the state. Altogether, the cost of
green energy solutions adopted in the state of California in the years
2005–2015 is estimated at $2.4 billion, a truly staggering amount. To
legitimize this size of investment, Governor Schwarzenegger develops a
4 ENVIRONMENTAL DISCOURSE: CLIMATE CHANGE 49
The RST holds that for best argumentative effects, the speaker’s positive
claim (the thesis part) should follow the opening negative claim (the
antithesis). That way, the positive claim is better remembered and can
serve to legitimize direct action. Governor Schwarzenegger’s speeches
contain several examples of the RST formula, for instance, (3) starts with
issues of public concern, such as pollution and health hazards, which
subsequently give way to a reassuring ideological call. Interestingly, the
call draws upon another pragma-rhetorical strategy, which can be
described as ‘complimenting the hearer’ (Brown and Levinson 1987,
among others). By paying compliments (to the hearer and/or the hearer
and himself), the speaker expresses appreciation and solidarity between the
parties and enacts mental ‘common ground’ as a prerequisite for soliciting
involvement of the hearer in a joint course of action. In Schwarzenegger’s
speech of 2008 (3), the strategy of complimenting is particularly appealing
and credible, as it builds on past facts (‘California has taken the leadership
role in fighting global warming and cleaning our environment, and we
have worked very hard to pass laws in the last few years to make sure that
we are fighting global warming and do everything to clean our environ-
ment’). It thus abides by the core rule of consistency, which we discussed in
Chap. 1.
There are however two hypotheses that emerge from data analysis. On the
first, the media discourse of cyber-terror has a strong political purpose: it
aims to alert the people, the government and state’s security structures to
the seriousness of the issue, thus exerting pressure on the state to imple-
ment or strengthen defense measures. Such a discourse can be considered
a legitimization discourse since the measures become pre-legitimized by
discourse construals reflecting a true intent to influence the state’s policies.
On the other hypothesis, the press representations of cyber-terror have,
instead of or apart from political motives, a strong commercial purpose
and one of the central aims is to increase readership.
The data evidence to determine the ultimate correctness of the hypoth-
eses is limited. Thus, in the proximization analysis that follows we cannot
help speculations at the coercion-legitimization level. In other words, we
cannot tell with an absolute certainty why the proximization strategies, as a
whole, have been used. Still, it is thought-provoking to see so many of
different proximization forms operate within just two relatively small texts.
The texts are excerpts from a book by Dan Verton, a respected IT journal-
ist working with the influential Computerworld magazine.1 In the book
(2003), he recaps the thoughts presented in the 2002 issues of the
Computerworld:
(1) This is the emerging face of the new terrorism. It is a thinking man’s game
that applies the violent tactics of the old world to the realities and vulner-
abilities of the new high-tech world. Gone are the days when the only victims
are those who are unfortunate enough to be standing within striking distance
of the blast. Terrorism is now about smart, well-planned indirect targeting of
the electronic sinews of the whole nations. Terrorists are growing in their evil
capacity to turn our greatest technologies against us. Imagine, one day,
overloaded digital networks, resulting in the collapse of finance and e-com-
merce networks, collapsed power grids and non-functioning telephone net-
works. Imagine, another day, the collapse, within seconds, of air traffic
control systems, resulting in multiple airplane crashes; or of any other control
systems, resulting in widespread car and train crashes, and nuclear melt-
downs. Meanwhile, the perpetrators of the war remain undetected behind
their distant, encrypted terminals, free to bring the world’s mightiest nations
to their knees with a few keystrokes in total impunity. (Verton 2003, p. 55)
(2) Armed with nothing but a laptop and a high speed Internet connec-
tion, a computer geek could release a fast spreading computer virus that
in a matter of minutes gives him control of thousands, perhaps millions,
of personal computers and servers throughout the world. This drone
56 THE LANGUAGE OF FEAR
army launches a silent and sustained attack on computers that are crucial
for sending around the billions of packets of data that keep e-mail, the
Web and other, more basic necessities of modern life humming. At first
the attack seems to be an inconvenience – e-mail traffic grinds to a halt,
Web browsing is impossible. But then the problems spread to services
only tangentially related to the Internet: your automated-teller machine
freezes up, your emergency call fails to get routed to police stations and
ambulance services, airport- and train-reservation systems come down.
After a few hours, the slowdown starts to affect critical systems: the
computers that help run power grids, air-traffic control and telephone
networks. (Verton 2003, p. 87)
Analysis
Similar to the discourse of climate change, (1) and (2) include a number of
fearful anticipations and alerts to the imminence of a gathering threat. To
make the threat global, they construe a broad spectrum of the IDC
entities: it seems from the texts that there is no entity in the world,
whether a nation or an individual, that is not under threat. This construal
involves several lexico-grammatical ploys, such as, in (1), the abundant
pluralization of the affected entities (e.g., ‘victims’, ‘nations’, ‘networks’,
‘systems’) or, in (2), depicting the cyberthreat in personally consequential
terms (‘your automated-teller machine freezes up, your emergency call fails
to get routed to police stations and ambulance services’). Analytically, the
texts reiterate the problem with demarcating the ODC entities. Unless we
take Verton’s ‘cyber-terrorists’ as ‘terrorists’ in the ideological, geopoliti-
cal and locational sense of alterity that we have recognized so far, we have
to approach them as, in a way, isolated ‘ODC cells’ among the IDC
entities. This dilemma may well be unresolvable given the short history
of the cyberthreat discourse and the resulting shortage of data, especially
reference data. Thus, the part of the conceptual scenario that remains most
in line with the ‘default’ proximization scenario is the act of proximization
as such, the symbolic shift of the threatening entity in the direction of the
IDC entities. Though neither (1) nor (2) give a clear picture of the source
of the threat, they include a large number of lexico-grammatical forms
construing its speed, imminence, as well as devastating effects.
Most of these forms echo the language choices and strategies from,
again, the war on terror discourse. They also reveal – to the benefit of
Proximization as a theory – several features of the discourses that have
5 TECHNOLOGICAL DISCOURSE: THREATS IN THE CYBERSPACE 57
REASONING BY ANALOGY
Drawing on fears instilled in the public space by the 9/11 attacks, the
discourse of cyber-terror makes ample use of historical flashbacks and
analogies, whose function is to endorse credibility of future visions by
linking them to real events of the past. Catastrophic past events are thus
proximized and conflated with current developments. As a result, the
current events, as well as projections, increase their dramatic appeal. The
main reference point is, naturally, the 9/11 itself, but there are other and
more distant analogies too, such as ‘electronic Pearl Harbor’ and
58 THE LANGUAGE OF FEAR
debates about terrorism and information warfare it has been emphasized that
non-state actors too may pose a threat. The idea that anonymous adversaries
might attempt to penetrate information systems from virtually anywhere in
the world breaks with the traditional understanding of security – that the
identity, location and goals of the enemy are known – and increases the sense
of fear and insecurity. Eriksson (2001) argues that ‘the introduction of non-
state enemies in security thinking implies opening up Pandora’s box, as the
number of potential enemies in “cyberspace” is virtually unlimited’
(Eriksson 2001, p. 218). In terms of IT security, Sandwell (2006) posits
five different types of antagonistic actors: insiders, hackers, criminals, cor-
porations, governments and terrorists. Conceptually and analytically, each of
these ‘ODC’ groups reveals a different positioning in discourse space (DS).
The patterns of discursive coercion involving proximization of an external
threat are thus also different – though interrelated – as these examples
demonstrate (italics added):
(3) The so-called hacker intrusions not only cost Defense tens of millions of
dollars, but pose a serious threat to our national security. Without increased
attention by Defense top management and continued oversight by the
Congress, security weaknesses will continue. Hackers and our adversaries
will keep compromising sensitive Defense systems.
(4) Air Force officials at Wright-Patterson Air Force Base told us that, on
average, they receive 3,000 to 4,000 attempts to access information each
month from countries all around the world. It is quite possible that at least
one of the hackers may have been working for a foreign country interested in
obtaining military research data or learning what the Air Force is working on.
(5) We do have evidence that computer-related education and training
courses conducted by nation-state sponsored organizations are being
attended by those who go on to act independently. Some of us have strong
suspicions that there is occasionally some foreknowledge by those actually
conducting the training that that is why the training was being pursued by
certain individuals.
(6) Because of the seriousness and gravity of the potential consequences, we
never discount and remain very vigilant to, the possibility of foreign intelli-
gence exploitation by nation-states whom we know have the capability to
conduct cyber-terrorist activities.
All the examples come from an interview with Jack L. Brock, Director
of US Defense Information and Financial Management Systems. The
interview took place on CNN on 2 May 2006, three days before a
62 THE LANGUAGE OF FEAR
Other:
Institu-
tions
n
tio
iza
o xim
Pr
Other:
Cyber-
Self terrorists
Discourse space
number of modality markers which conflate the present and the future
into one temporal frame characterized by the continuing presence of an
outside threat. The main marker used in the text is, as exemplified above,
the verb could, which construes a grave and ominous threat existing in the
present and extending infinitely into the future. The threat is thus prox-
imized through its indefiniteness: there is no clue when to expect the
impact.
NOTE
1. www.computerworld.com
CHAPTER 6
Abstract The focus of this last chapter is on immigration, a theme that has
been salient in public discourse of the modern UK, especially the ‘Brexit’
rhetoric, where it encroached on issues of national sovereignty, democracy
and economic prosperity. The chapter shows that the British immigration
discourse is to a large extent a discourse of uncertainty and ever-growing
anxiety, as well as xenophobia and hatred, involving a strong Self–Other
distinction and organized ways of othering. It relies on discursively con-
structed threat and fear generation mechanisms, such as proximization,
which perform a coercive function. The chapter analyses data from state
political and media discourses, including speeches by David Cameron and
Nigel Farage, as well as newspaper editorials and commentaries.
This last chapter is being written shortly after a momentous event in the
history of the modern Europe: the UK’s referendum on EU membership.
On 23 June 2016, after a long and heated campaign, 52 % of the British
people cast their votes in favour of leaving the Union. Voting for ‘Brexit’,
they put an end to the 24-year long period of UK’s membership in the EU
as one of its founding states. The promise to hold the referendum was first
announced by the British PM David Cameron in January 2013, subject to
the condition that the Conservative party win the next general election in
2015. The year 2013 was thus the first year of the ‘proto-referendum’
debate, defining the main themes, attitudes, ideological positions and
their representations in public discourse for the following three years. In
this chapter we focus on immigration, a theme that has been particularly
salient in UK’s discourse of 2013, encroaching on several other issues such
as national sovereignty, democracy and economic prosperity. As will be
shown, the immigration discourse in 2013 Britain is to a large extent the
discourse of uncertainty and ever-growing anxiety, as well as xenophobia
and hatred, involving a strong Self–Other distinction and organized ways
of othering. Much of this discourse is characterized by linguistic opera-
tions that draw upon spatial cognition and construed movement, such as
proximization. We support these claims by examining the following data:
In what follows, we first characterize the main points and voices in the
2013 discourse, and then re-examine the particular texts and phrases for
instances of proximization.
Cameron goes on to note that ‘there is a gap between the EU and its
citizens which has grown dramatically in recent years. And which repre-
sents a lack of democratic accountability and consent that is felt particu-
larly acutely in Britain’. He similarly affirms that ‘there is a growing
frustration that the EU is seen as something that is done to people rather
than acting on their behalf’ and that ‘democratic consent for the EU in
Britain is now wafer thin’. This leads him to conclude that ‘we need to
have a bigger and more significant role for national parliaments. There is
not, in my view, a single European demos. It is national parliaments,
which are, and will remain, the true source of real democratic legitimacy
and accountability in the EU’ (Cameron 2013). These excerpts show
Cameron advocating British exceptionalism and enacting political distinc-
tion by reference to an ‘independent’ and ‘forthright’ country that is an
70 THE LANGUAGE OF FEAR
(2) This vote, what we decide and what people in the future decide will
determine the character and strength of our national constitutional history,
which is being threatened. Why should we defer in such an adventure, when
this is the most remarkable and ancient of all the democratic communities
within western Europe? Why? (Hansard 2013–2014, p. 1201)
(3) It is inconceivable that only 30 years after the end of the second world
war, the British people would have willingly embarked on a programme to
hand over swathes of their hard-won sovereignty to another state, and let us
be clear: that is what the European Union aspires to be. (Hansard 2013–
2014, p. 1232)
This is the kind of commonsense history everyone knows even if they are not
historians . . . the kind that tells us all we need to know about Europe from
Britain’s martial past; its encounters with the Spanish Armada, at the battle
of Trafalgar, with Napoleon at Waterloo, after the let-down of Munich in
1938 and against Hitler’s Germany during the Second World War.
(4) The fact is we just don’t belong in the European Union. Britain is
different. Our geography puts us apart. Our history puts us apart. Our
institutions produced by that history put us apart. We think differently.
We behave differently. . . . The roots go back seven, eight, nine hundred
years with the Common Law. Civil rights. Habeas corpus. The presumption
of innocence. The right to a trial by jury. On the continent confession is the
mother of all evidence. (Farage 2013)
Farage’s words are a clear example of deictic ‘othering’, and cementing the
IDC-ODC distinction based on historical and ideological differences.
Farage appeals to the weight of ‘seven, eight, nine hundred years’ of history,
in which ‘Britain is different [from continental Europe]’. He uses ethical
dimensions of identity to differentiate between a British tradition of pre-
sumption of innocence and jury trial from a continental system based on
confession. In the same speech Farage also affirms that ‘We know that only
72 THE LANGUAGE OF FEAR
by leaving the Union can we regain control of our borders, our parliament,
democracy and our ability to trade freely with the fastest-growing econo-
mies in the world’. Implying lack of control of the ‘[UK] borders’, he sets
up a link to the immigration theme, framing it as an issue of extreme
urgency and consequentiality. Like Cameron, he employs identity and
cultural differentiation (Todd 2015) to serve his political cause of increasing
UKIP’s electoral strength and achieving a British exit from the EU.
These concerns about British sovereignty and democracy are echoed by
both The Times and the Daily Mail. An editorial from The Times argues
that ‘a union worth preserving would be one that valued national sover-
eignty, not only for this nation but for any that wished it, and which was
willing to reform to advance the prosperity of its members’. (The Times; 24
January 2013). The Daily Mail is more strongly critical:
(5) According to José Manuel Barroso, any country that wishes to re-claim
powers from Brussels risks taking Europe back to the ‘divisions’ that led to
the First World War. Doubtless, the president of the EU Commission is
worried that, if the voters of Britain are given a say over our future member-
ship by David Cameron, the verdict may not be to his liking. So, with typical
contempt for democracy, he raises the spectre of the ‘trenches’ to try to
intimidate us back into line. Yet it is Mr. Barroso’s claim that the EU has
brought ‘peace’ to Europe that is most risible. For the painful reality is that,
by imposing the hopelessly-flawed single currency on its citizens, the EU has
sparked terrifying social and economic unrest across great swathes of the
continent. (Daily Mail; 13 September 2013)
(6) We have to have control over our borders, which means saying to our
European colleagues that we do not accept unfettered free movement of
people if it is not in the United Kingdom’s interest at any particular given
time. (Hansard 2013–2014: 1205)
(7) As the country prepares for a fresh influx of migrant workers from
Romania and Bulgaria, their impact may or not may not become a serious
social challenge. . . . In a new Times poll of attitudes on Europe and
immigration, anxieties that Britain lacks control over its borders are the
overwhelming concern of voters asked what Mr. Cameron should focus
on when renegotiating the European relationship . . . .Our poll shows that
voters of all political persuasions are far more concerned about the impact
of new immigration on housing and public services than on crime, inter-
ethnic relations or even the availability of jobs. (The Times; 23 November
2013)
74 THE LANGUAGE OF FEAR
(8) Ministers continue to duck questions about the scale of a new wave of
immigration from Eastern Europe. So Migration Watch, a respected inde-
pendent campaign group, has worked it out for them. The organisation
estimates that up to 350,000 from Bulgaria, the EU’s poorest country, and
Romania will arrive over the next five years. Under EU rules, we are power-
less to deny them entry or benefits once restrictions are lifted next January.
(The Sun; 17 January 2013)
(9) For well over a decade, opinion polls have shown substantial majorities
in favour of cutting immigration to a rate at which it can be comfortably
absorbed. Yet in this supposed democracy, politicians have simply ignored
those who elected them. Indeed, less than eight weeks from today, under
orders from the EU, the Coalition plans to throw open our borders to any of
29 million Bulgarians and Romanians who choose to settle here. With our
national identity at stake, the time to start listening is now. The first step
must surely be to defy Brussels and declare that the UK is full up. (Daily
Mail; 22 November 2013)
The Daily Mail and The Sun editorials bring together the main themes of
British immigration discourse, construing fear via reference to loss of
control and powerlessness against waves of immigration from the
Continent. They are thus a great example of perhaps the most common
6 IMMIGRATION AND ANTI-MIGRATION DISCOURSES… 75
(10) Britain is facing a nightly tidal wave of asylum seekers from Cherbourg,
France’s second biggest port. (Sunday Telegraph; 25 August 2013)
(11) Illegal entrants are at the gates but Gibraltar is standing firm. (Sunday
Times; 8 December 2013)
(12) Britain is full to bursting point. The Government’s own figures show
that the UK has the highest levels of immigration in its history: in the last ten
years, over two millions were added to the UK population, and the expan-
sion shows no signs of slowing. (The Observer; 8 December 2013)
6 IMMIGRATION AND ANTI-MIGRATION DISCOURSES… 77
(13) Today The Sun reveals the shocking figure that nearly one in five of all
rape or murder suspects is foreign. The sheer scale of crimes committed by
foreigners is astonishing. Confront politicians with an embarrassing statistic
and they try to get off the hook by talking about ‘context’. So here’s some
context for that crime figure. A report published today shows that, because
of a loophole in the immigration rules, more than 20,000 foreigners from
outside the EU come to live here every year. It doesn’t take a genius to work
out that the two figures might be connected. The more foreigners who live
here, the more likely it is that crimes will be committed by foreigners. The
Government is trying to get a grip on immigration. The numbers overall are
down. But crime figures like this show just how vital it is that loopholes are
closed and sanity is restored to immigration. (The Sun; 6 January 2013)
PROXIMIZATION
The examples (1)–(13), comprising governmental, parliamentary and media
voices and opinions, as well as a telling voice from the UKIP leader Nigel
Farage, give a fair picture of the 2013 ‘proto-referendum’ discourse in the
UK. Overall, this discourse can be characterized as conceptually bipolar,
recognizing the Self–Other distinction, and enacting this distinction with
regard to ideological and policy issues. It seems that the presence of con-
ceptual dichotomies in the 2013 discourse is a stable feature of the debate,
unaffected by any twists or heated exchanges. Both radical voices (such as
Farage’s or The Sun’s) and more moderate positions (such as Cameron’s or
Shepherd’s) presuppose the distinctiveness of the British state, though in
different argumentation patterns. The moderate voices use it to construe an
essentially ideological appeal to remain consistent with historical legacy,
which emphasizes Britain’s sovereignty and political autonomy. This can
be seen from the argument in Cameron’s speech in (1). On the other hand,
radical Eurosceptics use it in a more instrumental manner, to present
immigration as well as other forms of external influence (including EU
policies), as a tangible threat to the daily functioning of the country.
The stability and permanence of the in/out distinction in the UK
discourse constitutes the main deictic prerequisite for strategies of
proximization to occur. The examples (1)–(13) contain a broad range
78 THE LANGUAGE OF FEAR
NOTE
1. Private Members’ Bills are presented by individual MPs or members of the
House of Lords (‘Private Members’). They must go through the same
procedures as Government bills in order to become law, but much less
time is made available for them in the Parliamentary calendar. Most of
them fail because there is not enough time for them to progress, rather
than because of active opposition.
CHAPTER 7
Conclusion
Abstract This chapter briefly summarizes the main findings of the book
and outlines analytical prospects. It reflects on the growing popularity and
effectiveness of threat-based rhetoric in legitimization discourse. It pro-
vides a positive assessment of Proximization Theory as a critical-linguistic
tool of analysis of threat-based discourse in various thematic domains.
Daddow, O.J. (2006). Euroscepticism and the culture of the discipline of history.
Review of International Studies, 32, 309–328.
Daily Mail. (2013a, 13 September). EU must be joking! Daily Mail.
Daily Mail. (2013b, 7 November). We don’t have room for another London.
Daily Mail.
Daily Mail. (2013c, 22 November). Brussels and why Mr Cameron can no longer
ignore the people on immigration. Daily Mail.
Dunmire, P. (2011). Projecting the future through political discourse: The case of the
bush doctrine. Amsterdam: John Benjamins.
Eriksson, J. (2001). Cyberplagues, IT, and security: threat politics in the informa-
tion age. Journal of Contingencies and Crisis Management, 9, 210–222.
Fairclough, N. (1989). Language and power. London: Longman.
Farage, N. (2013). Nigel Farage’s speech at the UKIP conference. The Spectator.
http://blogs.spectator.co.uk/coffeehouse/2013/09/nigelfaragesspeech-full-
text-and-audio/.
Fauconnier, G. (1985). Mental spaces: Aspects of meaning construction in natural
language. Cambridge: Cambridge University Press.
Fauconnier, G. & M. Turner. (2002). The way we think: Conceptual blending and
the mind’s hidden complexities. New York: Basic Books.
Festinger, L. (1957). A theory of cognitive dissonance. Stanford, CA: Stanford
University Press.
Fetzer, A. & G. Lauerbach (Eds.). (2007). Political discourse in the media.
Amsterdam: John Benjamins.
Gavins, J. (2007). Text world theory: An introduction. Edinburgh: Edinburgh
University Press.
Gellman, B. (2012, 27 June). Cyber-attacks by Al Qaeda feared. Washington Post.
http://www.washingtonpost.com/ac2/wp-dyn/A50765-2002Jun26.
Gough, V. & M. Talbot. (1996). “Guilt over games boys play”: Coherence as a
focus for examining the constitution of heterosexual subjectivity on a problem
page. In C.R. Caldas-Coulthard & M. Coulthard (Eds.), Texts and practices:
Readings in critical discourse analysis (pp. 214–230). London: Routledge.
Graham, S. (2004). War in the “weirdly pervious world”: infrastructure, demo-
dernisation, and geopolitics. Paper presented at the conference on Urban
Vulnerability and Network Failure, University of Salford.
Grice, P. (1975). Logic and conversation. In P. Cole & J.L. Morgan (Eds.),
Syntax and semantics 3: Speech acts (pp. 41–58). New York: Academic Press.
Groom, N. (2000). Attribution and averral revisited: Three perspectives on man-
ifest intertextuality in academic writing. In P. Thompson (Ed.), Patterns and
perspectives: Insights into EAP writing practices (pp. 15–27). Reading: CALS.
Habermas, J. (1981). Theorie des kommunikativen Handelns. Frankfurt am Main:
Suhrkamp.
Hansard. (2013–2014). House of Commons Debates, vol. 565–571.
86 BIBLIOGRAPHY
Hart, C. (2010). Critical discourse analysis and cognitive science: New perspectives
on immigration Discourse. Basingstoke: Palgrave Macmillan.
Hart, C. (2014). Discourse, grammar and ideology. Functional and cognitive
perspectives. London: Bloomsbury.
Hart, C. & P. Cap (Eds.). (2014). Contemporary critical discourse studies. London:
Bloomsbury.
Hartman, R. (2002). The knowledge of good: Critique of axiological reason.
Amsterdam: Rodopi.
Hockett, C. (1960). The origin of speech. Scientific American, 203, 88–96.
Horn, L. (2004). Implicature. In L. Horn & G. Ward (Eds.), The handbook of
pragmatics (pp. 3–28). Oxford: Blackwell.
Hunston, S. (2000). Evaluation as the planes of discourse: Status and value in
persuasive texts. In S. Hunston & G. Thompson (Eds.), Evaluation in text:
Authorial stance and the construction of discourse (pp. 176–207). Oxford:
Oxford University Press.
Huntington, S. (2004). Who are we: The challenges to America’s national identity.
New York: Simon & Schuster.
Jarvis, L. (2016). Unpacking cyberterrorism discourse: Specificity, status and scale
in news media constructions of threat. European Journal of International
Security, 16, 20–35.
Jary, M. (2010). Assertion. Basingstoke: Palgrave Macmillan.
Jowett, G.S. & V. O’Donnell. (1992). Propaganda and persuasion. Newbury
Park, CA: Sage.
Kiesler, C., B. Collins & N. Miller. (1969). Attitude change: A critical analysis of
theoretical approaches. New York: Wiley.
Krzyżanowski, M. (2009). Europe in crisis: discourses on crisis-events in the
European press 1956–2006. Journalism Studies, 10, 18–35.
Lakoff, G. & M. Johnson. (1980). Metaphors we live by. Chicago: University of
Chicago Press.
Levelt, W.J. (1989). Speaking: From intention to articulation. Cambridge, MA:
The MIT Press.
Levinson, S.C. (1983). Pragmatics. Cambridge: Cambridge University Press.
Levinson, S.C. (2000). Presumptive meanings: The theory of generalized conversa-
tional implicature. Cambridge, MA: The MIT Press.
Levinson, S.C. (2003). Space in language and cognition: Explorations in cognitive
diversity. Cambridge: Cambridge University Press.
Mann, W. & S. Thompson. (1988). Rhetorical Structure Theory: a theory of text
organization. Text, 8, 243–281.
Marcussen, M., T. Risse, D. Engelmann-Martin, H. Knopf & K. Roscher. (1999).
Constructing Europe? The evolution of French, British and German nation
state identities. Journal of European Public Policy, 6, 614–633.
BIBLIOGRAPHY 87
Martin, J.R. & R. Wodak (Eds.). (2003). Re/reading the past. Critical and
functional perspectives on time and value. Amsterdam: John Benjamins.
McGray, D. (2003). The minister of net defense. Wired 11. http://www.wired.
com/wired/archive/11.05/schmidt.html.
Porteus, L. (2001, 15 May). Feds still need to define role in tackling cyberterror,
panelists say. GovExec.com. http://www.govexec.com/dailyfed/0501/
051501td.htm.
Poulsen, K. (2003, 31 July). Official: cyberterror fears missed real threat.
SecurityFocus.com. http://www.securityfocus.com/news/6589.
Sandwell, B. (2006). Monsters in cyberspace: cyberphobia and cultural panic in
the information age. Information, Communication & Society, 9, 39–61.
Schwartau, W. (1994). Information warfare: Cyberterrorism - Protecting your
personal security in the electronic age. New York: Thunder’s Mouth Press.
Semino, E. (2008). Metaphor in discourse. Cambridge: Cambridge University Press.
Sherif, M. & C. Hovland. (1961). Social judgment: Assimilation and contrast effects
in communication and attitude change. New Haven, CT: Yale University Press.
Silberstein, S. (2004). War of words. London: Routledge.
Sontag, S. (1978). Illness as metaphor. New York: Farrar, Straus and Giroux.
Specter, M. (2001, 28 May). The doomsday click: how easily could a hacker bring
the world to a standstill? The New Yorker.
Sperber, D. (2000). Metarepresentations in an evolutionary perspective. In D.Sperber
(Ed.), Metarepresentation: A multidisciplinary perspective (pp. 117–138). New
York: Oxford University Press.
Stibbe, A. (2014). An ecolinguistic approach to Critical Discourse Studies.
Critical Discourse Studies, 11, 117–128.
The Sun. (2013a, 6 January). Psst, Dave . . . hurry up! The Sun.
The Sun. (2013b, 17 January). Border alert. The Sun.
The Times. (2013a, 24 January). In or out. The Times.
The Times. (2013b, 23 November). Boundaries of welfare. The Times.
Todd, J. (2015). The British self and continental other: A discourse analysis of the
United Kingdom’s relationship with Europe. Oslo: Arena.
Van Eemeren, F. & R. Grootendorst. (2004). A systematic theory of argumenta-
tion. Cambridge: Cambridge University Press.
Van Leeuwen, T. & R. Wodak. (1999). Legitimizing immigration control:
a discourse-historical analysis. Discourse Studies, 10, 83–118.
Van Rijn-van Tongeren, G. (1997). Metaphors in medical texts. Amsterdam:
Rodopi.
Vegh, S. (2012). Disrupting the status quo: non-traditional uses of the Internet as a
political force, Ph.D. thesis, University of Maryland.
Verton, D. (2003). Black ice: The invisible threat of cyberterrorism. New York:
McGraw Hill.
88 BIBLIOGRAPHY
H O
H1N1 virus (swine flu), 35, 36 Other/ Othering, 3, 4, 5, 9, 10, 12,
Health discourse, 29–39, 41, 51, 52, 13, 15, 17, 23, 31, 32, 42, 46, 47,
57, 65 49, 51, 68, 71, 82
Historical flashbacks, 22, 57, 65, 71 Out-group, 15, 17
Outside-deictic-center (ODC), 16,
17, 18, 23, 31, 32, 33, 34, 35–36,
I 38, 39, 42, 46, 47, 51, 52, 56, 61,
Ideological distance, 13 62, 78
Immigration, 67–79, 82
Implicature, 11, 23
In-group, 17, 78 P
Inside-deictic-center (IDC), 16, 17, Physical distance, 4
18, 20, 23, 24, 31, 32, 33, 36, 38, Proximization, 15–27, 42–46,
39, 46, 47, 56, 65, 78 47, 77–79
Interventionist discourse, 3, 11, 19, Proximization Theory (PT), 16–20,
29, 30, 31, 34, 37, 46 26, 29, 30, 32, 34, 37, 41, 51, 54,
Iraq, 11, 20, 21, 22, 23, 24, 25 57, 60, 82
Islamic State (ISIS), 3, 9
R
K Rasmussen A.F., 43, 44–45,
Kosovo, 6, 8, 9 46, 51
Rhetorical Structure Theory
(RST), 50, 51
L
Latitude of acceptance theory, 10
Legitimization, 2–3, 9, 10, 11, 12, 13, S
16, 18, 22, 24, 26, 27, 34, 36, 37, Saddam Hussein, 21, 23, 24
49, 79 Schwarzenegger, A., 47, 48,
50, 51
Self, 2, 3, 4, 5, 15, 16, 31, 32, 39, 46,
M 47, 49, 65, 82
Metaphor, 23, 30, 33, 36, 39, 75 Source-tagging, 13
Spatial proximization, 17, 19, 23, 57,
78, 79
N Spatial proximization framework, 18,
NATO, 43 19, 20, 45
9/11 (September 11), 9, 16, 21, 23, STA model (of proximization), 18
54, 57, 59, 65 The Sun, 68, 73, 74, 75, 76,
Nixon, R.M., 30 77, 78
INDEX 91
T W
Technological discourse, 53–66 War on cancer, 3, 29–39
Temporal proximization, 17, 34, War on terror, 20, 21, 33,
42, 46, 49, 57 46, 56
Text World Theory, 4 Weapons of mass
The Times, 68, 72, 73, 74 destruction (WMD), 11,
24, 60
U Weapons of mass
UK referendum (2016), 67 disruption, 59–60