[vc_row][vc_column width=”1/2″][vc_btn title=”Week 1″ align=”left” i_icon_fontawesome=”fa fa-chevron-left” add_icon=”true” link=”url:https%3A%2F%2Fjordanhaug.com%2Fcourses%2Fconspiracy%2Fweek1%2F|||”][/vc_column][vc_column width=”1/2″][vc_btn title=”Anthropology of Conspiracy Theory” align=”right” i_icon_fontawesome=”fa fa-home” add_icon=”true” link=”url:https%3A%2F%2Fjordanhaug.com%2Fcourses%2Fconspiracy%2F|||”][/vc_column][/vc_row][vc_row][vc_column][vc_column_text]

May 9 (W) Suggested material:

    • Sanders, T. and H.G. West. (2003). “Power Revealed and Concealed in the New World Order.” In Transparency and Conspiracy: Ethnographies of Suspicion in the New World Order, eds. H.G. West and T. Sanders, Pp. 1-37. Durham: Duke University Press.
    • Simmel, G. (2009 [1908]). “The Secret and The Secret Society.” In Inquiries into the Construction of Social Forms, Vol. I., Trans. A.J. Blasi, et al., Pp. 307-331. Leiden: Brill.
    •  Lamothe, D. (2015, Mar. 31). Why Operation Jade Helm 15 is freaking out the Internet — and why it shouldn’t be. Washington Post.

[/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][vc_btn title=”Week 1″ align=”left” i_icon_fontawesome=”fa fa-chevron-left” add_icon=”true” link=”url:https%3A%2F%2Fjordanhaug.com%2Fcourses%2Fconspiracy%2Fweek1%2F|||”][/vc_column][vc_column width=”1/2″][vc_btn title=”Anthropology of Conspiracy Theory” align=”right” i_icon_fontawesome=”fa fa-home” add_icon=”true” link=”url:https%3A%2F%2Fjordanhaug.com%2Fcourses%2Fconspiracy%2F|||”][/vc_column][/vc_row]