Jump to ContentJump to Main Navigation
Creating Language CrimesHow Law Enforcement Uses (and Misuses) Language$

Roger W. Shuy

Print publication date: 2005

Print ISBN-13: 9780195181661

Published to Oxford Scholarship Online: September 2007

DOI: 10.1093/acprof:oso/9780195181661.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2020. All Rights Reserved. An individual user may print out a PDF of a single chapter of a monograph in OSO for personal use.  Subscriber: null; date: 18 January 2020

(p.191) INDEX

(p.191) INDEX

Source:
Creating Language Crimes
Publisher:
Oxford University Press
Adams, Abagail, 17
agenda, 14, 22, 32, 36, 140–141, 182
agreement, 44
Ainsworth-Vaugh, Nancy, 33
aligning, 20
alternative understandings, 15
ambiguity, conversational strategy of, 6, 8–9, 10, 15–16, 34–35, 37, 38, 43, 54, 69–80, 111, 121, 124, 126, 132, 140–41, 144, 146, 148–49, 150–52, 157, 168, 169, 171, 172, 174
apologies, 103
arranged marriages in Muslim culture, 137–38
Arshad, Mohammed. 137–57, 171
bait and switch, 24
Bateson, Gegory, 35
Bok, Sissila, 176
Bollinger, Dwight, 38
Brown, Penelope and Stephen Levinson, 18, 178
Burbules, Nicholas, 32
Cameron, Deborah, 36
camouflaging, conversational strategy of, xi, 24, 34, 37, 60, 64–65, 110, 113, 116, 120–27, 132, 168, 169, 170, 173, 175, 177
Ceci, Stephen J. and Maggie Bruck, 29
changing the subject. See also hit and run 6, 34
Clayton, Representative Billy Clayton, 28
coaching, 21, 29, 53, 83
Cochrane, Johnny, viii
Coleman, Linda and Paul Kay, 176
conditionals, 126, 145, 170
conflict talk, 145
Conley, John and William O'Barr, 36
contamination, conversational strategy of. 22–24, 25, 27, 34, 37, 79, 89–98, 172
context, 16, 46, 48, 104, 123, 125, 144, 168
contextualization clues, 15
conversational strategies, 9, 11, 12, 13–15
cooerced confession, 130, 159–64
cooperating witnesses, 10–11, 15, 16, 20, 22, 23, 25, 27, 48, 59, 60–61, 69, 80, 89, 90, 96, 98, 167, 168, 169, 173, 184
cooperative principle, 13
(p.192) Cotterill, Janet, 38
courtroom language, 36
Craig, Robert and Karen Tracy, 13
creating static on tape, 17
Davis, T. Cullen. 41–49, 118
deception, 4, 24, 28, 127, 172, 173
definite article, 161
deKlerk, Vivian, 36
DeLorean, John Z. 3, 16
directives, 142–57
discourse markers, 48, 97, 115
Driscoll, Amy and Manny Garcia, 163
dummy noun, 62
dummy verb, 15, 43–44, 61–62
Ekman, Paul and Maurine O'Sullivan, 176
electronic recording, 3–4
event structure, underlying, 16
evidence of speaker's presence, 92–93
false confessions, 4
FBI Guidelines, 8–9, 140
“fishing” technique, 83, 113
Foreign Military Financing Program (FMF), 81–88
Forrester, Hugo, 25
Foucalt, M, 31
four step undercover procedure, 7–9
frame of reference, 34, 140–43, 148
framing devices, 35
Frank, Larra and John Hanchette, ix
Fraser, Bruce, 115
Galasinski, Dariuz, 176
Goffman, Erving, 18, 35
Goldstein, Gerald, 91
Goodwin, Charles, viii, ix
grammatical referencing, 105, 145, 146, 150
Green, Doris, 129, 132
greeting and closing routines, 25
Grice, H.P., 13, 178
Gumperz, John, 13
Hansell, Mark and Cheryl S. Ajirotutu, 13
Harris, Sandra, 36
Hatfield, Senator Mark O., 23
Haynes, Richard “Racehorse,” 43, 45
Heritage, J. Maxwell, 115
Heymann, Philip, 140
hinting, law enforcement undercover step of, 8, 21, 35, 69–80, 83, 85–86, 87, 111, 113, 144
hit and run, conversational strategy of, 21–22, 37, 49, 79, 94, 115, 152–53, 157, 168, 170, 171, 172, 174, 179
Honneth, Axel, 32
Houston, Daniel, 59–68, 169
ignoring the targets when they say “no,” conversational strategy of, 26, 34, 37, 60, 65–68, 127, 132, 134, 139, 153–55, 157, 168–72, 174, 176
implicatures, 178
inaccurate restatement, conversational strategy of, 26–27, 34, 37, 132, 164, 175
Inbau, Fred E., Joseph P. Buckley and John E. Reid, 27
indexicals, 19
inference, 27, 77–78, 80, 112–13, 182
intelligence, gathering and analysis, 10, 11, 16, 29, 88, 179
interrupting and overlapping, conversational strategy of. See also blocking. 6, 9, 17, 19, 38, 40, 45–46, 47–48, 54, 63–64, 111, 115, 134, 151–53, 155, 157, 162, 164, 168, 171, 172, 174
intonation, 44, 145
isolating targets from important information, conversational strategy of, 24–25, 48, 173
Jones, Stephen, 60
Kelly, Congressman Richard, 26, 68
Kelly, John F. and Phillip K. Wearne, x
keys to interpret frames, 35
Krovatin, Gerald, 53
Labov, William, 16
Lakoff, Robin, 31, 33, 36, 38, 178
(p.193) language bullying, 35
language crimes, definition of, 6
leading questions, 38
legal system, adversarial nature of, 10
Leo, Richard, 4
Lett, Brian, 109–16, 170
lying, conversational strategy of, 27–28, 34, 56–57, 168, 172, 173, 176–77
Macdonald, R. S. B, 139, 156, 157
Mackerley, Alan, 51–57, 169
McCullough, David, 17
McDonald, Kenneth, 18–20
manipulating conversation, 5, 48–49, 97
manipulation of on/off switch. See also blocking. xi, 20–21, 49, 94–95, 160–62, 164, 168, 171
manipulative seduction, 32
Manziel, Paul, 89–98, 169
Martino, Joe, 69–80
Miller, Gerald R. and James B. Stiff, 176
misunderstandings, 37
money laundering, 27, 62–63
Mussina, Dr. Joseph, 99–106, 170
new information, 115, 116
Ng, Hung Sik and James J. Bradac, 33
nonlanguage clues, 25, 92–93
O'Barr, William, 33, 36
off-topic response, 43, 115, 178
Ofshe, Richard, 4
on/off signatures. See also blocking. 91, 159–60
Orr, Cynthia, 91
pace, 44
Patel, Prakesh, 59–68, 169
persuasion, 26, 31–32
Philips, Susan U., 36
Politeness, 6, 174, 178
Poole, Debra A. and Michael E. Lamb. 29
power
abuse of, 36
advantage of, 5–6, 171
awareness of, 34
claiming, 33
definition of, 31
in conversational strategies, 31–38
inequality of, 183
of police interviewers, 37
of prosecutors, 37
of subordinates, 6
of superordinates, 6, 36
of undercover agents, 36–37
structured, 33
unrecognized, 32–33
unsupervised, 20
pre-close, 154
presence/nonpresence in a conversation, 92–93
presupposition, 15, 161
professional vision, viii, x, 11
prologues and postlogues, 20
questions omitted, 134
questioning tactics, 130–31, 134
recency principle, the, 22, 32, 152, 174
reconstructed dialogue, 127, 133
referencing. 104, 105, 145, 146, 150, 152, 163
reported speech, 132
representations of illegality, 60–63, 146
requesting apologies, 102–06, 170
requesting clarification, 37, 143, 153
requesting directives, 29, 109, 113
requesting scripting, 29
response analysis, 44
retelling, law enforcement undercover step of, 8, 26–27, 51–55, 169, 172
Robinson, W. Peter, 176
Sandoval, Vincent, 9
Scheck, Barry, Peter Neufeld and Jim Dwyer, 7, 131
schema, x, 125, 140
Schiffrin, Deborah, 18, 115
scripting the target, conversational strategy of, 28–29, 34, 37, 52, 55–56, 101, 132, 134, 143, 149, 157, 162, 164, 168, 169, 171, 172, 175
(p.194) seduction, 32
self-generated guilt, law enforcement undercover step of, 7, 9, 12, 79, 83, 114, 156
Shalash, Tariq, 117–27, 170
shared knowledge, 15, 22, 25, 27
Shuy, Roger W., 4, 7, 16, 18, 23, 25, 26, 28, 176
Silverman, Richard, 26
simultaneous speech, 46–47, 64
Smith, David, 81–88, 169
Solan, Lawrence, 36
Sornig, Karl, 32
speaking for another, 19
speaking on behalf of, 19
speech acts, 7
“speed date,” 138
Strickland, Jack, 42, 43, 45
stylistic analysis, 132, 134
Stygall, Gail, 36, 131
tag questions, 115
Tannen, Deborah, 13, 18, 34
tape recording the prologue, 20
Texas Brilab investigation, 28
Tiersma, Peter, 36
Tilsen, Scott, 110
Timing, 45
topic analysis, 6, 43, 44, 46–48, 65, 111, 140, 143, 145, 152, 153, 160, 174–75
Townsend, Jerry, 21, 159–64, 171
trial transcripts, 5, 47–48, 90–96, 126, 127, 132
unabomber (Ted Kaczynski), 181
University of Washington Law School's Innocense Project, 131
Van Dijk, Teun, 35
ventreloquizing, 18
verbal quotes, 72
verbatim recall, 134
voice lowering for covertness, 126, 170
Webb, Robert. 118
Webster, Paul. 69–80
Wenatchee sex ring, 129–36
Werbner, Mark, 82
Williams, Senator Harrison A., 23, 25, 26, 28
withholding crucial information from target, conversational strategy of, 27, 28, 132, 168, 169, 172, 174, 175, 177