SM
Authored
16 records found
Cognitive warfare
An ethical analysis
This article characterises the nature of cognitive warfare and its use of disinformation and computational propaganda and its political and military purposes in war and in conflict short of war. It discusses both defensive and offensive measures to counter cognitive warfare and,
...
Rethinking the Just Intelligence Theory of National Security Intelligence Collection and Analysis
The Principles of Discrimination, Necessity, Proportionality and Reciprocity
In this article, it is argued that the constitutive principles of Just War Theory and the jus ad bellum/jus in bello duality do not transfer all that well to national security intelligence activity. Accordingly, while Just Intelligence Theory–comprising jus ad intelligentiam and
...
Joint epistemic action
Some applications
The notion of a joint action is a familiar one in the philosophical literature. Moreover, the notion of epistemic action has recently been discussed in the literature. Elsewhere I have suggested that these two notions can be brought together to yield the notion of joint epistemic
...
National security intelligence activity
A Philosophical analysis
This article provides philosophical analyses of some of the key notions involved in national security intelligence collection, analysis and dissemination. In Section 1, and relying on the intelligence studies literature, the notion of intelligence is characterized by means of an
...
Shooting to Kill
The Ethics of Police and Military Use of Lethal Force
Terrorism, the use of military force in Afghanistan, Iraq and Syria, and the fatal police shootings of unarmed persons have all contributed to renewed interest in the ethics of police and military use of lethal force and its moral justification.
In this book, philosopher Seumas M
...
The Global Banking Sector
Corruption, Institutional Purpose, and Economic Justice
Corrupt, unethical and imprudent practices in the global banking sector have been identified as among the causes of the Global Financial Crisis (GFC). In this paper I (1) provide an analysis of institutional corruption that enables institutional corruption within the global banki
...
Jus ad vim
The Morality of Military and Police Use of Force in Armed Conflicts Short of War
Michael Walzer introduced the term jus ad vim – the just use of force short of war – in contrast with, or perhaps to complement, the well-established notion of the just war, jus ad bellum and its correlative notion, jus in bello (Walzer 2006). The intuitive idea is that there are
...
The ‘human’ right to self-defence
Natural, institutional or political right?
This chapter focuses on the moral right to self-defence and, in particular, on the question as to whether this moral right is a natural, institutional or political right. Some moral rights, such as the right to life, right not to be tortured, right to (clean) air and water, and t
...
Security and Privacy
Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States
This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study i
...
Security and Privacy
Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States
This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study i
...
Security and Privacy
Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States
This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study i
...
The Corruption of Financial Benchmarks
Individual and Collective Responsibility in the Global Banking Sector
The aim is to provide a synoptic view of the epistemic landscape in respect of epistemic actions, abilities and knowing how. The resulting view consists of the following propositions: (1) knowledge-by-acquaintance cannot be reduced to propositional knowledge or to knowing-how or
...
Biometric facial recognition is an artificial intelligence technology involving the automated comparison of facial features, used by law enforcement to identify unknown suspects from photographs and closed circuit television. Its capability is expanding rapidly in association wit
...
Genomic data is growing in importance as scientific knowledge and technology develop, and in availability, as direct-to-consumer genomic health testing and recreational genealogy services become more widely utilized. Access to genomic data needs to be considered in light of indiv
...
Contributed
4 records found
Global Jihadist Terrorism
Terrorist Groups, Zones of Armed Conflict and National Counter-Terrorism Strategies
This insightful book provides a unified repository of information on jihadist terrorism. Offering an integrated treatment of terrorist groups, zones of armed conflict and counter-terrorism responses from liberal democratic states, it presents fresh empirical perspectives on the o
...
Counter-Terrorism
The Ethical Issues
This insightful book provides an analysis of the central ethical issues that have arisen in combatting global terrorism and, in particular, jihadist terrorist groups, notably Al Qaeda, Islamic State and their affiliates. Chapters explore the theoretical problems that arise in rel
...
Machine Learning and Counter-Terrorism
Ethics, Efficacy, and Meaningful Human Control
Machine Learning (ML) is reaching the peak of a hype cycle. If you can think of a personal or grand societal challenge – then ML is being proposed to solve it. For example, ML is purported to be able to assist in the current global pandemic by predicting COVID-19 outbreaks and id
...
CBRN Threats, Counter-Terrorism, and Collective Moral Responsibility
Partnerships in preventing and preparing for terrorist attacks using common-use toxic and radiological substances as weapons
The terrorist use of chemical, biological, radiological, and nuclear (CBRN) weapons is a worst-case scenario for most security agencies. Yet traditionally, the risk of CBRN-terrorism is characterized as a so-called “high impact – low probability” threat. Academics and analysts co
...