Abstract
This essay draws on concepts developed by Kenneth Burke to examine how a rhetoric of national insecurity has saturated phishing research and antiphishing campaigns. In response to the widespread public dispersal of antiphishing campaigns, it calls for a new terminology that challenges the underlying racial violence that characterizes its current practices.
Notes
1Jakobsson and Myers define phishing as “[a] form of social engineering in which an attacker, also known as a phisher, attempts to fraudulently retrieve legitimate users’ confidential or sensitive credentials by mimicking electronic communications from a trustworthy or public organization in an automated fashion” (1).
2In July of 2009, Symantec observed a fifty-two percent increase in phishing attacks from the previous month.
3Robert C. Miller and Min Wu argue, “Phishing succeeds because of a gap between the user's mental model and the true implementation, so promising technical solutions should try to bridge this gap” (291). Note how the technology becomes the agent of intervention.
4See, for example, Gurak and Warnick. Later, I will discuss how phishers utilize peer networks to share components of phishing solicitations in order to make the process more efficient. This use of file-sharing technology complicates more sanguine perspectives on the role that collaboration and sharing play in digital networks (see Devoss and Porter; Moxley). I am not alone in pointing out the dangerous limitations of digital technologies such as emails and online forums (see Holdstein; Moses and Katz; Blair and Takayoshi).
5Jenkins writes, “New forms of community are emerging, however: these new communities are defined through voluntary, temporary, and tactical affiliations, reaffirmed through common intellectual enterprises and emotional investments… . Only certain things are known by all—the things the community needs to sustain its existence and fulfill its goals. Everything else is known by individuals who are on call to share what they know when the occasion arises” (27–28).
6I am grateful to RR reviewers Stephen Bernhardt and Jim Zappen for their helpful feedback on this essay. Thank you RF, MM, and MH—you are indispensable.