Seda Q. Gasparyan-Doctor of Philological Sciences
The article aims at presenting the results of the main conclusions of our investigation directly connected with the “infamous” Article 301 which, in essence, is an evil for the Turkish society. According to the specialists of the International law, the given article is a serious threat meant to endanger the fundamental right of humans to Freedom of Expression.

The topic of concern is viewed from the perspective of the interconnection and intersection of linguistics and law. The author concentrates on the organization of linguistic units in the versions of 2005 and 2008 of Article 301 and provides theoretical and practical linguistic interpretation of the language data. An attempt is also made to offer an insightful account of the legal aspect of those documents. The special emphasis laid on the analysis of the manipulative strategies exerted in the document in question reveals that the basic function of law to communicate the truth and express clear-cut, accurate and understandable ideas has been violated here for they are meant to control people and manipulate their perception and interpretation through the abuse of language to achieve practical goals.

The investigation reveals that verbal manipulation preconditions the usage of ambiguous expressions and all sorts of double-speak. It implies a beginning in smaller and more discrete segments of linguistic forms that connect to larger linguistic entities. The latter undergoing some transformations turn out to be relatively unexpected by the addressee.

Manipulation is directly connected with domination, control and demagogic language, and manipulators are experts in using manipulative tools, among which of prime importance are a great command of language and the rhetoric of persuasion.

Thus, by applying the comparative-contrastive method of research the present article reveals linguistic facts, the investigation of which exposes the manipulative strategies implemented in Article 301 to the readers and unveils the dangers arising as a result of these implementations.

Leave a Reply

Your email address will not be published. Required fields are marked *