Authored

16 records found

Cognitive warfare

An ethical analysis

This article characterises the nature of cognitive warfare and its use of disinformation and computational propaganda and its political and military purposes in war and in conflict short of war. It discusses both defensive and offensive measures to counter cognitive warfare and, ...

Rethinking the Just Intelligence Theory of National Security Intelligence Collection and Analysis

The Principles of Discrimination, Necessity, Proportionality and Reciprocity

In this article, it is argued that the constitutive principles of Just War Theory and the jus ad bellum/jus in bello duality do not transfer all that well to national security intelligence activity. Accordingly, while Just Intelligence Theory–comprising jus ad intelligentiam and ...

Joint epistemic action

Some applications

The notion of a joint action is a familiar one in the philosophical literature. Moreover, the notion of epistemic action has recently been discussed in the literature. Elsewhere I have suggested that these two notions can be brought together to yield the notion of joint epistemic ...
This article provides philosophical analyses of some of the key notions involved in national security intelligence collection, analysis and dissemination. In Section 1, and relying on the intelligence studies literature, the notion of intelligence is characterized by means of an ...

Shooting to Kill

The Ethics of Police and Military Use of Lethal Force

Terrorism, the use of military force in Afghanistan, Iraq and Syria, and the fatal police shootings of unarmed persons have all contributed to renewed interest in the ethics of police and military use of lethal force and its moral justification. In this book, philosopher Seumas M ...

The Global Banking Sector

Corruption, Institutional Purpose, and Economic Justice

Corrupt, unethical and imprudent practices in the global banking sector have been identified as among the causes of the Global Financial Crisis (GFC). In this paper I (1) provide an analysis of institutional corruption that enables institutional corruption within the global banki ...

Jus ad vim

The Morality of Military and Police Use of Force in Armed Conflicts Short of War

Michael Walzer introduced the term jus ad vim – the just use of force short of war – in contrast with, or perhaps to complement, the well-established notion of the just war, jus ad bellum and its correlative notion, jus in bello (Walzer 2006). The intuitive idea is that there are ...

The ‘human’ right to self-defence

Natural, institutional or political right?

This chapter focuses on the moral right to self-defence and, in particular, on the question as to whether this moral right is a natural, institutional or political right. Some moral rights, such as the right to life, right not to be tortured, right to (clean) air and water, and t ...

Security and Privacy

Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States

This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study i ...

Security and Privacy

Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States

This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study i ...

Security and Privacy

Global Standards for Ethical Identity Management in Contemporary Liberal Democratic States

This study is principally concerned with the ethical dimensions of identity management technology – electronic surveillance, the mining of personal data, and profiling – in the context of transnational crime and global terrorism. The ethical challenge at the heart of this study i ...

Epistemic institutions

A joint epistemic action-based account

The Corruption of Financial Benchmarks

Individual and Collective Responsibility in the Global Banking Sector

The aim is to provide a synoptic view of the epistemic landscape in respect of epistemic actions, abilities and knowing how. The resulting view consists of the following propositions: (1) knowledge-by-acquaintance cannot be reduced to propositional knowledge or to knowing-how or ...
Biometric facial recognition is an artificial intelligence technology involving the automated comparison of facial features, used by law enforcement to identify unknown suspects from photographs and closed circuit television. Its capability is expanding rapidly in association wit ...
Genomic data is growing in importance as scientific knowledge and technology develop, and in availability, as direct-to-consumer genomic health testing and recreational genealogy services become more widely utilized. Access to genomic data needs to be considered in light of indiv ...

Contributed

4 records found

Global Jihadist Terrorism

Terrorist Groups, Zones of Armed Conflict and National Counter-Terrorism Strategies

This insightful book provides a unified repository of information on jihadist terrorism. Offering an integrated treatment of terrorist groups, zones of armed conflict and counter-terrorism responses from liberal democratic states, it presents fresh empirical perspectives on the o ...

Counter-Terrorism

The Ethical Issues

This insightful book provides an analysis of the central ethical issues that have arisen in combatting global terrorism and, in particular, jihadist terrorist groups, notably Al Qaeda, Islamic State and their affiliates. Chapters explore the theoretical problems that arise in rel ...

Machine Learning and Counter-Terrorism

Ethics, Efficacy, and Meaningful Human Control

Machine Learning (ML) is reaching the peak of a hype cycle. If you can think of a personal or grand societal challenge – then ML is being proposed to solve it. For example, ML is purported to be able to assist in the current global pandemic by predicting COVID-19 outbreaks and id ...

CBRN Threats, Counter-Terrorism, and Collective Moral Responsibility

Partnerships in preventing and preparing for terrorist attacks using common-use toxic and radiological substances as weapons

The terrorist use of chemical, biological, radiological, and nuclear (CBRN) weapons is a worst-case scenario for most security agencies. Yet traditionally, the risk of CBRN-terrorism is characterized as a so-called “high impact – low probability” threat. Academics and analysts co ...