Clutter

Civil American, Volume 2, Article 3 (September 16, 2017), https://goo.gl/38wd1m.

| By John Lachs |

Adobe logo, to serve as a link to the Adobe PDF version of the essay.

When our ancestors lived in caves, every tool was a prized possession. Furs for comfort and drawings to decorate the cave were difficult to come by. They were passed down from generation to generation.

Storage units.

Photo courtesy of Paul Brennan, CC0.

Later, when human productivity made the goods of the world readily available, our grandparents became collectors. Growing control over nature enabled them to stockpile everything imaginable, converting their homes into storage units.

Some claim this was in response to the tough times of the Great Depression. Others attribute it to smart shopping:  buying on sale is a great saving, even if you never use the item.

Photo of clutter.

Photo courtesy of Pixabay.com, CCO.
Photo of a water tower made to look like a "catsup" bottle.

Photo courtesy of Andrew Keith, CC0.

The important idea is that the twenty-eighth sweater and the 5-pound Ketchup bottle are there, ready to be used…if, that is, they can be found. “You never know when it’ll come in handy” is a great justification if what you look for is not lost in the clutter.

We feel it impossible to discard perfectly usable clothing even if we have no intention of ever using it. Surely, there is nothing wrong with keeping food that is only a few months past the expiration date. And though we have no interest in the second treadmill a friend wants to give away, we’ll manage to find a place for it.

Packed closet.

Courtesy of Flickr, CCO, some rights reserved.

There is always room for the next coffee table and, after a good sale, the clothes in the closets just have to be compressed a little more.  Eventually, the stuff we collect invades all rooms and peaks out from under the beds.

The moment of truth comes when we have to move. The death of a loved one or a divorce reveals the momentousness of the collection.  Every item has memories attached, everything cries to be preserved. Discarding anything feels like losing a friend.

Photo of a Goodwill location.

Photo courtesy of Dwight Burdette, CCO.

Is there a solution? Only one as radical as surgery is for cancer. Take ten items you cannot live without. Leave everything in place and get a couple of friends to bring their friends to carry away whatever they want. What is left can go to charity.

What we value says a lot about who we are. Look over the ten objects you kept. What do they say about you?

 

Dr. John LachsDr. John Lachs is Centennial Professor of Philosophy at Vanderbilt University and is Chairman of the Board of Trustees of The Society of Philosophers in America (SOPHIA).

 

Journal Archive

Call for Papers – UPDATED

CivilAmerican.com

UPDATE: The Society of Philosophers in America (SOPHIA) recently launched Civil American, our newest venue for public philosophical engagement, as a peer-reviewed digital journal on our Web site. We are now announcing also a benefit to the authors of our first 20 articles, beginning in September of 2017: for each of the next 20 articles published in the journal, author(s) of accepted pieces will be paid an honorarium of $100 per essay (co-authors will split it).

Logo for Civil American.

Adobe logo, to serve as a link to the Adobe PDF version of the transcript.

Adobe PDF version of this call for papers.

SOPHIA Trustees Dr. John Shook and Dr. Eric Thomas Weber first envisioned Civil American as a journal targeting general-audiences, a philosophical equivalent to Scientific American. The United States have a rich intellectual tradition, yet much public discourse tends to be sensationalist, rather than civil and philosophical.

Civil American is a place for scholars in philosophy or other fields, students, and SOPHIA members to submit short essays, between 700 and 3,000 words, on topics of importance for living and policy-making, as individuals and communities.

In addition to single essays, we welcome proposals for panels of submissions from groups interested in writing on topics in common. Each piece will be released individually and will then be archived in a yearly volume.

We welcome submissions under 3,000 words (though longer pieces will be considered) and sent by email to: shanecourtland@gmail.com as an MS Word file.

Logo for Civil American.Chief Editor
Shane Courtland (West Virginia University)

Editorial Board

Elizabeth Anderson (University Michigan)
Peter Boghossian (Portland State University)
Thom Brooks (Durham University)
Daniel Brunson (Morgan State University)
Shane Courtland (West Virginia University)
Tommy Curry (Texas A&M University)
Marilyn Fischer (University of Dayton)
William Irwin (King’s College)
Jackie Kegley (California State University Bakersfield)
John Lachs (Vanderbilt University)
Jana Mohr Lone (University Washington)
Christopher P. Long (Michigan State University)
George R. Lucas (University of Notre Dame)
Michael Lynch (University of Connecticut)
Bertha Alvarez Manninen (Arizona State University)
John McDermott (Texas A&M University)
Scott Pratt (University of Oregon)
Gad Saad (Concordia University)
Michael Shermer (Chapman University)
John Shook (Bowie State University)
Peter Singer (Princeton University)
Eric Thomas Weber (University of Kentucky)

For more information and a journal archive, visit CivilAmerican.com.

State-Sponsored Hacktivism and “Soft War”

Civil American, Volume 2, Article 2 (May 25, 2017), https://goo.gl/R55J4V.

| By George R. Lucas |

A Moral and Legal Challenge in the Cyber Domain |

Adobe logo, to serve as a link to the Adobe PDF version of the essay.Skeptics (e.g., Thomas Rid, 2013) have cast doubt on the notion of authentic cyber warfare.  Cyber conflict consists, the skeptics argue, solely of activities which fall well short of full scale warfare:  e.g., crime, vandalism, “hacktivism” (political activism by individuals and organizations carried out in the cyber domain), industrial espionage, and military espionage. Talk of cyber “warfare,” they complain, is largely conceptual confusion, coupled with misplaced metaphorical exaggeration.

U.S. Air Force Cadets learning basic cyber operations.

(U.S. Air Force Photo/Raymond McCoy)

Against such criticisms, I have argued by contrast that there is a distinctive category of cyber conflict that qualifies as warfare – or, more correctly, which rises to the level of the “use, or threat of use, of force by states; or, the equivalent of an armed attack” in international law (Lucas 2017).  This new kind of warfare has thus far manifest itself in two distinctive forms:

  1. effects-based weapons (such as Stuxnet) which can be deployed to damage or destroy military targets; and
  2. weapons and attacks in the cyber domain intended to produce political effects similar to those usually sought as the goal or objective of a conventional use of force by states against one another.

Cover of Carl Von Clausewitz's book, On War.I have labeled this second class of cyber hostilities “state-sponsored hacktivism” (SSH).  SSH is one of the principle tactics of a wider phenomenon, recently dubbed “soft war,” or unarmed conflict (Gross & Meisels, 2017) [Note]. It qualifies as warfare because it is deployed to compel an adversary to yield to the political aims of the state utilizing it.  SSH is perfectly capable of achieving the equivalent of occupying an enemy’s cities, destroying his army, and breaking his will to fight.  It is fully capable of moving a political center of gravity from a given posture prior to the attack, to one more in keeping with the attacker’s own political aspirations vis á vis the victim’s in the aftermath.  In short, this form of cyber conflict satisfies the classical definition of Clausewitz (1830) regarding war as politics carried out by alternative means.

SSH is not identical to, nor can it be merely reduced to acts of vandalism, crime, or espionage, although it utilizes such components within the framework of an SSH attack.  One might say that SSH is either none of the above, or else it involves all of the above “on steroids.”  Considerations of scale and magnitude, as well as of ease of access, are important in understanding this category of warfare, much as such considerations have been, in the past, for differentiating between “private” and domestic uses of conventional lethal force (e.g., as criminal acts by individuals or organizations), and those of “public” warfare that are state-sponsored. (more…)

SOPHIA Trustee Dr Jackie Kegley Featured in CSU Profile

California State University has recently released a great profile of SOPHIA Trustee Dr. Jackie Kegley in its “Impact of the CSU” online newsletter. Jackie has been an influential leader at CSU Bakersfield for 48 years, on top of her immeasurable influence on SOPHIA.

Dr. Jackie Kegley.

Check out this great profile of Jackie and the impact she has had on a generation of students and her institution. She serves as an inspiration for many first-generation college students, furthermore, at an institution that teaches a high percentage of such students. She was the first in her family to earn a bachelor’s degree, and she kindly came on SOPHIA’s radio show and podcast, Philosophy Bakes Bread, to talk about teaching philosophy to first-gen students in episode 15.