The Practice of Ritual Defamation

“Everyone has the right to freedom of opinion and expression; this right includes freedom to hold opinions without interference and to seek, receive and impart information and ideas through any media and regardless of frontiers.” – Article 19 of the United Nations Declaration of Human Rights, 1948

Back in the late 90’s and early 2000’s I used to closely track Laird Wilcox – an expert on extremist groups. I loved his even-handedness and commitment to free speech. I even called him once to ask him something, at about 5 am his time. Luckily he was up already and forgiving of my lack of consideration. I used to have a copy of his book on Free Speech, “Be Reasonable”, but seem to have lost it.

Wilcox’s essay on the eight elements of Ritual Defamation is a classic.

Defamation is the destruction or attempted destruction of the reputation, status, character or standing in the community of a person or group of persons by unfair, wrongful, or malicious speech or publication. For the purposes of this essay, the central element is defamation in retaliation for the real or imagined attitudes, opinions or beliefs of the victim, with the intention of silencing or neutralizing his or her influence, and/or making an example of them so as to discourage similar independence and “insensitivity” or non-observance of taboos. It is different in nature and degree from simple criticism or disagreement in that it is aggressive, organized and skillfully applied, often by an organization or representative of a special interest group, and in that it consists of several characteristic elements.

Ritual Defamation is not ritualistic because it follows any prescribed religious or mystical doctrine, nor is it embraced in any particular document or scripture. Rather, it is ritualistic because it follows a predictable, stereotyped pattern which embraces a number of elements, as in a ritual.

The elements of Ritual Defamation are spookily recognizable in our era of manufactured moral panics, altruistic punishment and social media shaming:

  1. In a ritual defamation the victim must have violated a particular taboo in some way, usually by expressing or identifying with a forbidden attitude, opinion or belief. It is not necessary that he “do” anything about it or undertake any particular course of action, only that he engage in some form of communication or expression.

The countermeasure is to robustly defend free speech and freedom of thought, with a particular focus on guarding against social tyranny.

2. The method of attack in a ritual defamation is to assail the character of the victim, and never to offer more than a perfunctory challenge to the particular attitudes, opinions or beliefs expressed or implied. Character assassination is its primary tool.

Again, ad hominem attacks and character assassination need to become intellectually embarrassing and shameful themselves.

3. An important rule in ritual defamation is to avoid engaging in any kind of debate over the truthfulness or reasonableness of what has been expressed, only condemn it. To debate opens the issue up for examination and discussion of its merits, and to consider the evidence that may support it, which is just what the ritual defamer is trying to avoid. The primary goal of a ritual defamation is censorship and repression.

This is a call to yet more speech. In the face of people trying to shut down a discussion, train them to recognize it is counter-productive.  Dive deep. Really explore the topic. Let attempts at taboo-making be markers for increased investigation. Ritualize the Streisand Effect.

4. The victim is often somebody in the public eye – someone who is vulnerable to public opinion – although perhaps in a very modest way. It could be a schoolteacher, writer, businessman, minor official, or merely an outspoken citizen. Visibility enhances vulnerability to ritual defamation

One of the oldest problems human’s face in our social societies is how to reveal and conceal our alliances. The silence of political elites in England about large-scale child rape and the widespread conspiracy of silence protecting Harvey Weinstein and other powerful sex pests shows that people are so fearful retaliation that they will not speak out even about things they know to be factually true and utterly morally repulsive. So it is no surprise people are easily intimidated into silence on intellectual or policy topics where one might be wrong anyway, and the consequences of even defending certain positions – not even espousing or supporting – may be ruinous. We need to find ways to create true intellectual safe spaces where any and all ideas can be openly discussed without fear of retaliation.

One solution is offered by the authors of Zero Hedge,  Pseudonymous speech responsibly used:

Anonymity is a shield from the tyranny of the majority. it thus exemplifies the purpose behind the bill of rights, and of the first amendment in particular: to protect unpopular individuals from retaliation– and their ideas from suppression– at the hand of an intolerant society.

The right to remain anonymous may be abused when it shields fraudulent conduct. But political speech by its nature will sometimes have unpalatable consequences, and, in general, our society accords greater weight to the value of free speech than to the dangers of its misuse.”
Mcintyre v. Ohio elections commission 514 u.s. 334 (1995) Justice Stevens writing for the majority

Hopefully, the rally by forces of the Enlightenment will re-establish norms around genuine tolerance for heterodoxy and dissent.

5. An attempt, often successful, is made to involve others in the defamation. In the case of a public official, other public officials will be urged to denounce the offender. In the case of a student, other students will be called upon, and so on.

The best defense here lies in preparation. Agree in advance with colleagues and fellows what you will do when they come for one of you. Agree to the conditions for speaking out in unison. Isolation of the victim is key to the success of ritual defamation, so prepare to act in concert. Do not be picked-off.

6. In order for a ritual defamation to be effective, the victim must be dehumanized to the extent that he becomes identical with the offending attitude, opinion or belief, and in a manner which distorts it to the point where it appears at its most extreme. For example, a victim who is defamed as a “subversive” will be identified with the worst images of subversion, such as espionage, terrorism or treason. A victim defamed as a “pervert” will be identified with the worst images of perversion, including child molestation and rape. A victim defamed as a “racist” or “anti-Semitic” will be identified with the worst images of racism or anti-Semitism, such as lynchings or gas chambers.

Humanize everyone. As Hunter S. Thompson observed, “Even a werewolf deserves a lawyer”.  Find and accentuate the human in the story. Lampoon the labels. Subvert them. Look at how Jewish public figures cleverly embraced the anti-semite practice of identifying Jewish people by surrounding their names with brackets e.g.  {{{Sam Harris}}}. Or how Republicans enthusiastically self-identified as “deplorables”. 

7. Also to be successful, ritual defamation must bring pressure and humiliation on the victim from every quarter, including family and friends. If the victim has school children, they may be taunted and ridiculed as a consequence of adverse publicity. If they are employed, they may be fired from their job. If the victim belongs to clubs or associations, other members may be urged to expel them.

So this is Maoist/Stalinism 101targetingargting people through their innocent loved ones, but also show trials and denunciations by colleagues and children. With us or against us. These reductionist theatrics are the core of exercise: Demoralize your opponents and signal your allies. Humiliation is the salt that flavors the defamation. As a countermeasure, we ought to hit back in the defense of freedom of speech and thought by raising the costs for those who are disloyal to the defamed and act to punish without reasonable due process.

9. Any explanation the victim may offer, including the claim of being misunderstood, is considered irrelevant. To claim truth as a defense for a politically incorrect value, opinion or belief is interpreted as defiance and only compounds the problem. Ritual defamation is often not necessarily an issue of being wrong or incorrect but rather of “insensitivity” and failing to observe social taboos.

Big Brothers’ dictum was never right “Who controls the past controls the future. Who controls the present controls the past.” should have been “Who controls the norms, controls the future. Who controls the present, controls the norms”. Norms and their enforcement are foundations of human society. They are inescapable realities for all socially cooperative creatures. The question is how do we create, update, maintain and enforce norms fairly and with optimal outcomes for humanity? Any attempts to lock them down now, to declare the debate over and the matter settled is usually an attempt by the currently powerful to pull up the ladders after them. To cement their gains and freeze arrangements as maximally advantageous to themselves. Even if they are wise and norms fitting for the age and environment, it will lead to the stultification major religions experience due to being trapped trying to navigate a world with guidance thousands of ýears out of date.

Let’s go full Bayesian. Let us destroy the sanctity of “sensitivity” and anything else that prevents reassessment and reform.Mere ignorance and error must never be a crime, their recognition is a prerequisite for learning and development. The truth must always be an inviolable ultimate defense against any defamation.

Source: The Practice of Ritual Defamation – How values, opinions and beliefs are
controlled in democratic societies by Laird Wilcox

Read More

http://www.un.org/en/universal-declaration-human-rights/

https://en.wikipedia.org/wiki/Freedom_of_speech

https://en.wikipedia.org/wiki/Freedom_of_thought

https://en.wikipedia.org/wiki/Civil_liberties , especially:

Political philosopher John Gray identified the common strands in liberal thought as being individualist, egalitarian, meliorist and universalist. The individualist element avers the ethical primacy of the human being against the pressures of social collectivism, the egalitarian element assigns the same moral worth and status to all individuals, the meliorist element asserts that successive generations can improve their sociopolitical arrangements, and the universalist element affirms the moral unity of the human species and marginalises local cultural differences.

21st Century Enlightenment

 In Defence of Enlightenment 

http://liberalvaluesblog.com/about/

Moral Foundations Theory

I was just reminded of Jonathan Haidt’s Moral Foundations Theory, something I first encountered in The Righteous Mind.

Moral Foundations Theory was created by a group of social and cultural psychologists to understand why morality varies so much across cultures yet still shows so many similarities and recurrent themes. In brief, the theory proposes that several innate and universally available psychological systems are the foundations of “intuitive ethics.” Each culture then constructs virtues, narratives, and institutions on top of these foundations, thereby creating the unique moralities we see around the world, and conflicting within nations too. The five foundations for which we think the evidence is best are:

1) Care/harm: This foundation is related to our long evolution as mammals with attachment systems and an ability to feel (and dislike) the pain of others. It underlies virtues of kindness, gentleness, and nurturance.

2) Fairness/cheating: This foundation is related to the evolutionary process of reciprocal altruism. It generates ideas of justice, rights, and autonomy. [Note: In our original conception, Fairness included concerns about equality, which are more strongly endorsed by political liberals. However, as we reformulated the theory in 2011 based on new data, we emphasize proportionality, which is endorsed by everyone, but is more strongly endorsed by conservatives]

3) Loyalty/betrayal: This foundation is related to our long history as tribal creatures able to form shifting coalitions. It underlies virtues of patriotism and self-sacrifice for the group. It is active anytime people feel that it’s “one for all, and all for one.”

4) Authority/subversion: This foundation was shaped by our long primate history of hierarchical social interactions. It underlies virtues of leadership and followership, including deference to legitimate authority and respect for traditions.

5) Sanctity/degradation: This foundation was shaped by the psychology of disgust and contamination. It underlies religious notions of striving to live in an elevated, less carnal, more noble way. It underlies the widespread idea that the body is a temple which can be desecrated by immoral activities and contaminants (an idea not unique to religious traditions).

We think there are several other very good candidates for “foundationhood,” especially:

6) Liberty/oppression: This foundation is about the feelings of reactance and resentment people feel toward those who dominate them and restrict their liberty. Its intuitions are often in tension with those of the authority foundation. The hatred of bullies and dominators motivates people to come together, in solidarity, to oppose or take down the oppressor. We report some preliminary work on this potential foundation in this paper, on the psychology of libertarianism and liberty.

See also https://en.wikipedia.org/wiki/Moral_foundations_theory

Warnings: Return of The Long Emergency

warnings

James Kunstler’s 2005 book “The Long Emergency” made a huge impression on me when I read it in 2006. In fact, it was one of the reasons I found myself pursuing a career in cloud computing in 2007. Partly thanks to this book and a former boss from British Telekom, my business partner and I were convinced that peak oil and climate change would create a huge demand for energy efficient, carbon neutral compute resources, and cloud computing was the future.

The Long Emergency was primarily concerned with America’s oil addiction and ill-preparedness for what looked at the time to be the coming energy (oil) shock, but it also examined other threats to civilization:

  • Climate Change
  • Infectious diseases (microbial resistance)
  • Water scarcity
  • Habitat destruction
  • Economic instability
  • Political extremism
  • War

Every one of those is still an enormous threat.

A new book by national security veteran Richard Clarke and R.P Eddy called “Warnings: Finding Cassandras to Stop Catastrophes” updates The Long Emergency with some new features of the threat landscape.

The book starts off by asking how we can reliably spot Cassandras – people who correctly predict disasters but who were not heeded – so that we can prevent future disasters.

They examine recent disasters – like 9/11, the Challenger space shuttle disaster and Hurricane Katrina, then examine the people who predicted these events, looking or patterns. They come up with some stable characteristics that allow us to score people on their Cassandra Quotient.

The second part of the book looks at current threats, and their doomsayers, to see if any have a high Cassandra Quotient and thus should be heeded.

The threats are:

  • Artificial Intelligence
  • Pandemic Disease
  • Sea-Level Rise
  • Nuclear Ice Age
  • The Internet of Everything
  • Meteor Strike
  • Gene Editing (CRISPR)

The bad news is that they all have high Cassandra Quotients and the scenarios in the book are plausible, science-backed and terrifying.

Artificial Intelligence as a threat hs been on my radar for a year or so thanks to Elon Musk, Bill Gates, Stephen Hawkins and Sam Harris warning of the risks of intelligent machines that can design and build ever moire intelligent machines.

Pandemic Disease has worried me since reading The Long Emergency, but I thought there had been better global awareness, especially since the world took the 2011 flu scare seriously, and Ebola and Zika.  Unfortunately, we are – as a planet – woefully ill-prepared for a global pandemic. A high fatality airborne flu could kill billions.

Sea-Level Rise genuinely surprised me, especially since the Cassandra in question – James Hansen – predicted the current melting and ice shelf break-offs we see in the Arctic today…30 years ago. I even googled how high my home is above sea level after being convinced we could see 7m rises within my lifetime.

As a child of the 70’s and 80’s, nuclear horror is deeply embedded in my psyche. But I thought the risk of a Nuclear Ice Age was a pretty low risk. It turns out you do not need a large-scale nuclear exchange between the US and Russia to cause global climate chaos. A limited exchange between India and Pakistan could be sufficient to kill billions though global starvation. I was also surprised to learn that Pakistan moves its nuclear arsenal around to thwart attacks my Indian commandos in the event of a war. This raises the risk of terrorists intercepting on of these weapons on the move, and using it for nuclear terrorism.

The book does a good job of examining the incredible fragility of out interconnected IT systems in the chapter on The Internet of Everything. As an IT professional I know the reality of how fragile these systems are and we are right to be scared of dire consequences of a serious cyber war.

I do not really think about Meteor Strikes, as there is little we can do about them and they are now part of popular culture.

The final worry in the book is about Gene Editing, especially CRISPR. CRISP has absolutely marvelous potential, but it also has many people worried. Daniel Saurez even has a new book on the topic called “Change Agent“. CRISPR is could be the mother of all second order effects. Take “off target events” for example:

Another serious concern arises from what are known as off-target events. After its discovery, researchers found that the CRISPR/Cas9 complex sometimes bonds to and cuts the target DNA at unintended locations. Particularly when dealing with human cells, they found that sometimes as many as five nucleotides were mismatched between the guide and target DNA. What might the consequences be if a DNA segment is improperly cut and put back together? What sorts of effects could this cause, both immediately and further down the road for heritable traits? Experimenting with plants or mouse bacteria in a controlled laboratory environment is one thing, but what is the acceptable level of error if and when researchers begin experimenting with a tool that cuts up a person’s DNA? If an error is in fact made, is there any potential way to fix the mistake?

So we have planet-scale problems, ingenious solutions. Instead of feeling paralysis or resignation we should accept Peter Thiel’s challenge to find the big breakthroughs, 0 to 1 intensive progress:

Progress comes in two flavors: horizontal/extensive and vertical/intensive. Horizontal or extensive progress basically means copying things that work. In one word, it means simply “globalization.” Consider what China will be like in 50 years. The safe bet is it will be a lot like the United States is now. Cities will be copied, cars will be copied, and rail systems will be copied. Maybe some steps will be skipped. But it’s copying all the same.

Vertical or intensive progress, by contrast, means doing new things. The single word for this is “technology.” Intensive progress involves going from 0 to 1 (not simply the 1 to n of globalization). We see much of our vertical progress come from places like California, and specifically Silicon Valley. But there is every reason to question whether we have enough of it. Indeed, most people seem to focus almost entirely on globalization instead of technology; speaking of “developed” versus “developing nations” is implicitly bearish about technology because it implies some convergence to the “developed” status quo. As a society, we seem to believe in a sort of technological end of history, almost by default.

It’s worth noting that globalization and technology do have some interplay; we shouldn’t falsely dichotomize them. Consider resource constraints as a 1 to n subproblem. Maybe not everyone can have a car because that would be environmentally catastrophic. If 1 to n is so blocked, only 0 to 1 solutions can help. Technological development is thus crucially important, even if all we really care about is globalization.

…Maybe we focus so much on going from 1 to because that’s easier to do. There’s little doubt that going from 0 to 1 is qualitatively different, and almost always harder, than copying something times. And even trying to achieve vertical, 0 to 1 progress presents the challenge of exceptionalism; any founder or inventor doing something new must wonder: am I sane? Or am I crazy?

From Blake Masters notes