5 Two kinds of ad hominem attack

In the following section I make a suggestion in order to disarm the problem of the ad hominem argument with regard to the positive reason component. Does an ad hominem attack always include fallacious reasoning? Walton (2008, p. 170) claims that “the argumentum ad hominem is not always fallacious, for in some instances questions of personal conduct, character, motives, etc., are legitimate and relevant to the issue.” Even though cases of ad hominem arguments might sometimes be informally fallacious, there are some highly relevant cases in which a particular ad hominem attack could be committed in order to remain epistemic vigilant. Since you, as a hearer, have a set of positive reasons—for instance being aware of the usual verbal espousals of politicians during an election campaign—you are forced to commit a personal attack. Did your reliability assessment rely on fallacious reasoning? In the literature there is a common distinction between three types of the ad hominem argument: the abusive, the circumstantial, and the tu quouqe argument (Groarke 2011; Walton 1998, 2008).[11] These kinds of personal attacks describe various pragma-dialectical reasoning in interpersonal communicative relationships. Below (cf. section 5.1, 5.2) I want to draw a further distinction between two kinds of ad hominem attack that are closely connected to communicative situations explicitly involving knowledge transmission. Hence I want to provide a framework that fits well with social epistemological dualism.

Before this, I want to address the Bayesian argumentation model, which is presupposed by the following account of ad hominem arguments. Few things have been said about the inductive reasoning model which is the underlying mechanism of an ad hominem attack. Roughly, one has to consider past experiences with regard to reliability, constituted by contexts and speaker properties, to adjust this experience for future communication. Harris et al. (2012) provide an account that fits well with an inductive model of reasoning, because, potentially evidence is not provided by deductive reasoning. They claim that the evaluation of a proposition or a given testimony is based on an individual’s probabilities, which could be described formally using Bayes’ Theorem. A big advantage of this account is that it describes our subjective evaluations in daily experiences very well. Often, when we are asked “do you believe S?” we are inclined to say something like “I am not sure. I guess not”. This could be well explained with the Bayesian model, where an individual’s belief does not have a truth-value of 0 or 1. The relevant belief is instead estimated in one’s subjective degree of that belief, as a probability between 0 and 1. Let us embed this in our current considerations. The utterance type of the politician is already embedded in a kind of bias or in posterior beliefs about politicians in general: this is called the hypothesis h, and has a particular probability P(h) in isolation from evidence e. Evidence e in this particular case is constituted by personal characteristics, properties, and circumstances of the utterance. The receiving of the new evidence e should update P(h), the probability of the hypothesis. Individuals ought, according to the normative stipulation, if they receive any evidence, to let it influence the probability of the proposition: “[this] normative procedure by which individuals should update their degree of belief in a hypothesis h upon receipt of an item of evidence e is given by Bayes’ Theorem:

image”(Harris et al. 2012, p. 316)

P(h|e) describes the conditional probability of a hypothesis being true after one has received evidence e. P(e|h) terms the conditional probability of receiving evidence e, given hypothesis h. P(e) just describes the evidence in isolation from the truth-values of the hypothesis h (cf. Harris et al. 2012).

5.1 Local ad hominem attack

I am now able to distinguish two kinds of ad hominem attack, a local and a global one. I will thus sketch out some considerations with regard to the presented Bayesian framework.

The positive reason component describes the practice of a speaker’s credibility assessment. This process of credibility assessing could lead to what I will call a local ad hominem attack. Roughly, one commits a local ad hominem argument if one acknowledges someone to be trustworthy in general, but with some exceptions in particular cases. If you ask the politician what time it is or the straightest way to the subway station, it is very unlikely that she would have the intention of deceiving you (Sperber 2001). Hence, one would count her as a trustworthy person. Nonetheless, given the particular information about her party and the reduction of taxes, you might find it unlikely that she is telling the truth. As long as you do not dismiss her in general as an eligible bearer of knowledge, it is vigilant in a rational way to distrust her in this case. This view could be described as a subclass of epistemic vigilance, because it is an evolved tool that minimizes the risks of deception which is—according to Sperber et al. (2010)—a condition for cooperative communicators.

At this stage, subjective Bayesian probability comes into play. The general bias of your past experiences with regard to politicians, which enters the stage before you have received the evidence, could be described with (h). The probability of the hypothesis P(h) is the probability of your believing her without having received evidence e. Given (1), evidence e describes that the person is a politician during a campaign, which also has a particular probability, termed P(e). The evidence condition is the part that divides the local ad hominem attack from the global, because the evidence is able to influence one’s subjective degree of probability. The personal traits of the speaker as well as the context of utterance-use serve as evidence e. P(h|e) is then the conditional probability of h, if the hearer H receives evidence e. Given the hypothesis h, the probability of receiving evidence e is described by P(e|h). As presented above, this could be calculated within Bayes’ Theorem (cf. Harris et al. 2012).

As you can see, the content and the source of information, which serve as evidence e, are both similarly relevant for a testimony (cf. Sperber et al. 2010). Buenting (2005) calls this kind of reasoning relevance-based with regard to the relevant circumstances that could invoke ad hominem attacks. The context and content of the utterance or proposition in question is important for assessment. Walton (1998) calls such a context and content-related ad hominem attack a credibility function. The proposition in question undergoes an ethotic rating, a kind of evaluation of a person’s epistemic input value (of her testimony), which can go up or down. When committing a local ad hominem attack, the rating goes down. Hence the credibility of the speaker is undermined in a specific case that affects the proposition, which fits with the account of Bayesian argumentation. The local ad hominem argument is an example of a non-fallacious ad hominem attack because it is content as well as context-related and epistemically equitable. The normative stipulation of the Bayesian account that a hearer “should update [her] probabilistic degrees of belief in a hypothesis in accordance with the prescriptions of Bayes’ Theorem” (Harris et al. 2012, p. 316) is fulfilled in the local version. The take home message of this passage could be presented in a more simplified way:

Local ad hominem attack (non-fallacious)

(1) Speaker S gives a testimony t.

(2) Speaker’s S property φ is a negative property with regard to trustworthiness.

(3)Speaker S has a negative propertyφthat is relevant evidenceefor a hypothesishwith regard to the content of the particular testimony t by hearerH.

(C) The testimony t, uttered by speaker S, is probably false as assessed by hearer h. [12]

5.2 Global ad hominem attack

I call the opposite kind of reasoning the global ad hominem argument, which I claim, is fallacious. The hearer commits a global attack if she does not believe the speaker in general. The hearer discredits her any kind of trustworthiness. Consider some stereotypes and prejudices that could suffice for such a radical conclusion.[13] This behavior is clearly irrational, since it undermines any testimony of a speaker in every situation. As you can see, this kind of fallacy is neither a content-related nor context-related ad hominem argument. In distinction from the global attack, here the content does not play any role in the evaluation of the speaker’s reliability. First, the evidence e only includes personal traits and not the circumstances of the utterance. Second, the evidence e does not influence the degree of belief that the hypothesis h is true. This is the reason why the belief, formed via the process of a global ad hominem fallacy, could not be calculated in Bayes’ Theorem. The normative stipulation that evidence e should affect the probability of a hypothesis h is not satisfied.

Another reason why this type of personal attack is fallacious is because it includes irrelevant circumstances and personal traits as the basis of the speaker’s evaluation (Buenting 2005). The speaker, as she is assessed, is not in any way disposed to maximizing the hearer’s set of true beliefs.[14] In other words, the hearer undermines any potential benefit she may gain through any of the speaker’s testimony (Sperber 2001), which could be described as a paradigmatic case of epistemic injustice (Fricker 2007). Hence, a general assessment of the speaker’s credibility has nothing to do with the process of positive reason formation. In other words, the global ad hominem attack is not an epistemic tool, because it lacks any credibility function, because the speaker assesses the testimony as necessarily false, because of her personal properties. Since it is not an epistemic tool, this kind of reasoning is not epistemically vigilant (Sperber et al. 2010). To summarize:

Global ad hominem attack (fallacious)

(1) Speaker S gives a testimony t.

(2) Speaker’s S property φ is a negative property with regard to trustworthiness.

(3) Speaker S has a negative property φ that is ascribed as relevant for every testimony t by hearer H.

(C) The testimony t, uttered by speaker S, is necessarily false as assessed by hearer H.