569 research outputs found

    A Two Level Account of Executive Authority

    Get PDF
    The suite of secretive national security programs initiated in the US since 9/11 has created debate not only about the merits of targeted killing, torture, secret detention, cyberwar, global signals intercepts, and data-mining, but about the very secrecy in which these programs were conceived, debated by government officials, and implemented. Law must be revealed to those who are expected to comply with its demands. Law is a mere pretext for coercion if the laws permitting the government to coerce people for non-compliance are concealed. The purpose of this essay is to determine whether inhabitants of a liberal state—a type of state tracing the legitimacy of its coercive actions to the consent of the governed—also need to know the internal protocols and legal findings of the government agencies ostensibly serving them. To put this question another way, what, if anything, may government agencies in liberal states keep secret

    Individual Responsibility for Collective Actions

    Get PDF
    This chapter will develop standards for assessing individual moral responsibility for collective action. In some cases, these standards expand a person’s responsibility beyond what she or he would be responsible for if performing the same physical behavior outside of a group setting. I will argue that structural differences between two ideal types of groups— organizations and goal- oriented collectives— largely determine the baseline moral responsibility of group members for the group’s collective action. (Group members can be more or less responsible for collective action beyond that baseline due to personal qualities like knowledge of the intended collective outcome.) The same individual physical behavior can make the member of a goal-oriented collective responsible for the entire collective action to an equal degree with her fellow group members, whereas the typical organization member is only responsible for his contributory action

    Nussbaum's Capabilities Approach and Religion

    Get PDF
    An assessment of Martha Nussbaum's capabilities approach with respect to religion. I contend that her contribution to John Rawls's project of political-liberalism would be less accommodating of religion, specifically illiberal religions, than it desires to be. This feature weakens the capabilities approach as a foundation for inclusive and stable political institutions in pluralistic societies

    The Rights of Foreign Intelligence Targets

    Get PDF
    I develop a contractualist theory of just intelligence collection based on the collective moral responsibility to deliver security to a community and use the theory to justify certain kinds of signals interception. I also consider the rights of various intelligence targets like intelligence officers, service personnel, government employees, militants, and family members of all of these groups in order to consider how targets' waivers or forfeitures might create the moral space for just surveillance. Even people who are not doing anything prejudicial to other states' security can be modeled as ceding rights against diagnostic collection--light touch collection limited to ascertaining if someone is likely an intelligence threat--as part of their duty to support just foreign institutions. Foreign intelligence officers could not perform the same job potential targets can reasonably demand their intelligence agencies perform on their behalf without this ceding of rights. More invasive forms of collection can only be justified if officers can reasonably model their citizens consenting to being the target of the same sort of collection by adversary states

    The Ethics of Military Influence Operations

    Get PDF
    This article articulates a framework for normatively assessing influence operations, undertaken by national security institutions. Section I categorizes the vast field of possible types of influence operations according to the communication’s content, its attribution, the rights of the target audience, the communication’s purpose, and its secondary effects. Section II populates these categories with historical examples and section III evaluates these cases with a moral framework. I argue that deceptive or manipulative communications directed at non-liable audiences are presumptively immoral and illegitimate for liberal states, as are deceptive operations aimed at an unjust end, or even operations aimed at a just end where secondary effects are forecast to be disproportionate to the proximate end

    Military Virtues

    Get PDF

    Evolution, ecology and the engineered organism: lessons for synthetic biology

    Get PDF
    An understanding of evolution and ecology will be critical to the success of synthetic biology
    corecore