Abstract
This article articulates a framework for normatively assessing influence operations, undertaken by national security institutions. Section I categorizes the vast field of possible types of influence operations according to the communication’s content, its attribution, the rights of the target audience, the communication’s purpose, and its secondary effects. Section II populates these categories with historical examples and section III evaluates these cases with a moral framework. I argue that deceptive or manipulative communications directed at non-liable audiences are presumptively immoral and illegitimate for liberal states, as are deceptive operations aimed at an unjust end, or even operations aimed at a just end where secondary effects are forecast to be disproportionate to the proximate end.
Publisher
National Documentation Centre (EKT)
Reference39 articles.
1. Andrew, Christopher. The Defense of the Realm: The Authorized History of MI5. New York: Penguin Books, 2019.
2. Benbaji, Yitzhak, and Daniel Statman. War by Agreement. Oxford: Oxford University Press, 2019.
3. Blumenthal-Barby, Jennifer, and Hadley Burroughs. “Seeking Better Health Care Outcomes: The Ethics of Using the “Nudge.” The American Journal of Bioethics 12, no. 2 (2012): 1-10.
4. Blumenthal-Barby, Jennifer. “Between Reason and Coercion: Ethically Permissible Influence in Healthcare and Health Policy Contexts.” Kennedy Institute of Ethics Journal 22, no. 4 (2012): 345-366.
5. Bok, Sissela. Lying: Moral Choice in Public and Private Life. New York: Vintage, 1999.