Skip to main content

Conspiracy theories on the basis of the evidence

Abstract

Conspiracy theories are often portrayed as unwarranted beliefs, typically supported by suspicious kinds of evidence. Yet contemporary work in Philosophy argues provisional belief in conspiracy theories is—at the very—least understandable (because conspiracies occur) and if we take an evidential approach—judging individual conspiracy theories on their particular merits—belief in such theories turns out to be warranted in a range of cases. Drawing on this work, I examine the kinds of evidence typically associated with conspiracy theories, showing that the evidential problems typically associated with conspiracy theories are not unique to such theories. As such, if there is a problem with the conspiracy theorist’s use of evidence, it is one of principle: is the principle which guides their use of evidence somehow in error? I argue that whatever we might think about conspiracy theories generally, there is no prima facie case for a scepticism of conspiracy theories based purely on their use of evidence.

This is a preview of subscription content, access via your institution.

Notes

  1. 1.

    Whilst Cassam seems willing to admit that conspiracies occur (see Warburton and Cassam 2015), he uses the terms ‘conspiracy theory’ and ‘conspiracy theory’ in the pejorative sense in the works discussed here.

  2. 2.

    For another analysis of Cassam’s work, see Pigden (2016).

  3. 3.

    For further criticism of Cassam’s argument see Dentith (in press).

  4. 4.

    This issue will be addressed in more depth come Sect. 8.

  5. 5.

    There is a common species of selective evidence in detective fiction: evidence so easily obtained it becomes obvious something has been removed/deleted/redacted in order to avoid awkward questions. Arguably this kind of evidence manipulation was central to the rationale as to the necessity of the invasion of Iraq in 2003; evidence of those pesky weapons of mass destruction was so easily found, yet when investigated the evidence had the hallmarks of having been curated/manipulated.

  6. 6.

    The obvious retort here would be to find examples of unprincipled citation of evidence by conspiracy theorists. However, we will find similar examples in the seemingly non-conspiratorial works of historians, scientists and politicians. Indeed, the existence of these examples are often fodder for the conspiracy theorist and her theory.

  7. 7.

    For an analysis of the arguments as to whether conspiracy theories are in some sense unofficial, and thus rival to official theories, see Dentith (2014, ch. 7) and Dentith (2016).

  8. 8.

    The corollary of this is that explanations in these domains which are not fuzzy—and thus take into account all the evidence—are likely post facto in nature.

  9. 9.

    A point pressed by Coady (2006).

  10. 10.

    As Sissela Bok defines it: ‘[A] neologism that stands for the spreading of false information to hurt adversaries’ (Bok 1982, p. 187).

  11. 11.

    This point has also been discussed by both Steve Clarke (2002), and Basham (2011).

  12. 12.

    For further discussion of this, see Basham (2011) and Dentith (2016).

  13. 13.

    Such judgments will differ from country to country, or culture to culture. We might, for example, suspect Aotearoa (New Zealand) to be a relatively benign polity compared to Romania. As such, New Zealanders might think of their country as unconspired because whilst conspiracies do occur, they occur infrequently compared to other nation states.

  14. 14.

    For further discussion on prior probabilities and allegations of conspiracy now see Basham (2011) and Dentith (2016).

  15. 15.

    The most remarked upon (and only alleged) false flag operation was the Reichstag Fire of 1933, which was used by the Chancellor of Germany, Adolf Hitler, to enable emergency legislation which suspended civil liberties and allow him to round up the suspected arsonists, the Communists. This curious and convenient fact has led some to argue that the fire was a false flag event, designed to bolster the power of the Nazis in the German parliament.

  16. 16.

    It is possible in such a situation that weak evidence is treated as being strong due to effects like confirmation bias and the like; we do not have to necessarily assume a conspiracy in such cases.

  17. 17.

    Barkun is no sceptic of conspiracies, and he accepts that some conspiracy theories have turned out to be warranted; here we are simply speaking about one aspect of his work.

  18. 18.

    This kind of size criterion can also be found in the work of Juha Rikk, who distinguishes between local, global and total conspiracy theories (Räikkä 2009); Martha Lee, who also talks about superconspiracies (Lee 2011); and Volker Heins, who also makes a similar distinction between types of conspiracies (Heins 2007).

  19. 19.

    This view on the rationality of what Barkun calls ‘event conspiracies’ can be found in earlier works by Pigden (1995), Keeley (1999), Knight (2000), and Basham (2001).

  20. 20.

    Such as taking control of a nation state or subverting existing institutions.

  21. 21.

    Superconspiracies, citing ever larger conspiracies, cast into doubt any evidence for the conspiracy, since the conspirators are considered to be in the position to control and subvert the evidential record.

  22. 22.

    Barkun’s stipulation about the irrationality of belief in systemic and superconspiracies is close in kind to Popper’s stipulation about the irrationality of belief in what he calls the ‘conspiracy theory of society,’ (Popper 1969); both Barkun and Popper ascribe to the kind of people who believe in all-embracing conspiracy theories a kind of mental pathology.

  23. 23.

    ‘Quickly’ here is measured in five year chunks.

  24. 24.

    Grimes does suggest that as time passes, conspirators are likely to start panicking about potential exposure, and thus leak regardless.

  25. 25.

    It is useful to note that Grimes labels Moon landing hoax theories as ‘fringe,’ climate change conspiracy theories as ‘utterly negated by the sheer wealth of evidence against such a proposition’ (Grimes 2016, p. 3), and anti-vaccination beliefs as ‘scare-mongering (Grimes 2016, p. 3).’ As such, Grimes starts out by assuming that which he wants to prove; these putative conspiracies are unviable.

  26. 26.

    For further discussion on this topic, see Dentith and Orr (2017).

  27. 27.

    For example, institutionalised racism and sexism, historically, has been brought to the public’s attention but not acted upon/been politely ignored. For the victims of such discrimination, at least, this can look very much like a society trying to cover things up and act as if everything is normal.

  28. 28.

    This, at least, was the rationale behind the cover-up of the ‘Unfortunate Experiment’ in Aotearoa (New Zealand), where women who had been diagnosed with cervical cancer were not informed that they were taking part in a clinical trial and being deliberately under-treated. The whistleblowers were ignored by the authorities because to act upon that information would have lead to a loss of trust by the public in the medical profession.

  29. 29.

    As previously mentioned, see Dentith (2016).

  30. 30.

    Indeed, many of the activities we suspect ground our belief in the existence of conspiracies are open secrets, some of which we just politely ignore, or downplay (see Dentith and Orr 2017).

References

  1. Barkun, M. (2003). A culture of conspiracy: Apocalyptic visions in contemporary America. Berkeley, CA: University of California Press.

    Book  Google Scholar 

  2. Basham, L. (2001). Living with the conspiracy. The Philosophical Forum, 32(3), 265–280.

    Article  Google Scholar 

  3. Basham, L. (2011). Conspiracy theory and rationality. In C. Jensen & R. Harré (Eds.), Beyond rationality (pp. 49–87). Newcastle on Tyne: Cambridge Scholars Publishing. (chap 4).

    Google Scholar 

  4. Basham, L. (in press). Joining the conspiracy. Argumenta.

  5. Bok, S. (1982). Secrets. New York: Pantheon Books.

    Google Scholar 

  6. Buenting, J., & Taylor, J. (2010). Conspiracy theories and fortuitous data. Philosophy of the Social Sciences, 40(4), 567–578. doi:10.1177/0048393109350750.

    Article  Google Scholar 

  7. Cassam, Q. (2015). Bad thinkers. http://aeon.co/magazine/philosophy/intellectual-character-of-conspiracy-theorists/.

  8. Cassam, Q. (2016). Vice epistemology. The Monist, 99, 159–180. doi:10.1093/monist/onv034.

    Article  Google Scholar 

  9. Clarke, S. (2002). Conspiracy theories and conspiracy theorizing. Philosophy of the Social Sciences, 32(2), 131–150.

    Article  Google Scholar 

  10. Coady, D. (2006). Conspiracy theories and official stories. In D. Coady (Ed.), Conspiracy theories: The philosophical debate (pp. 115–128). Hampshire: Ashgate. (chap 9).

    Google Scholar 

  11. Coady, D. (2012). What to believe now : Applying epistemology to contemporary issues. Chichester, West Sussex: Wiley-Blackwell.

    Google Scholar 

  12. Dentith, M. R. X. (2014). The philosophy of conspiracy theories. Palgrave Macmillan,. doi:10.1057/9781137363169.

    Google Scholar 

  13. Dentith, M. R. X. (2016). When inferring to a conspiracy might be the best explanation. Social Epistemology, 30, 572–591. doi:10.1080/02691728.2016.1172362.

    Article  Google Scholar 

  14. Dentith, M. R. X. (in press). The problem of conspiracism. Argumenta.

  15. Dentith, M. R. X., & Orr, M. (2017). Secrecy and conspiracy. Episteme,. doi:10.1017/epi.2017.9.

    Google Scholar 

  16. Feldman, S. (2011). Counterfact conspiracy theories. International Journal of Applied Philosophy, 25(1), 15–24.

    Article  Google Scholar 

  17. Franceschi-Bicchierai, L. (2016). ‘guccifer 2.0’ is likely a russian government attempt to cover up its own hack. https://motherboard.vice.com/en_us/article/guccifer-20-is-likely-a-russian-government-attempt-to-cover-up-their-own-hack.

  18. Gale, S. L. (2016). Cia ’mistakenly’ destroys copy of 6700-page us torture report. http://www.independent.co.uk/news/world/americas/cia-mistakenly-destroys-copy-of-6700-page-us-torture-report-feinstein-a7034096.html.

  19. Grimes, D. R. (2016). On the viability of conspiratorial beliefs. PloS One,. doi:10.1371/journal.pone.0147905.

    Google Scholar 

  20. Heins, V. (2007). Critical theory and the traps of conspiracy thinking. Philosophy Social Criticism, 33(7), 787–801. doi:10.1177/0191453707081675.

    Article  Google Scholar 

  21. Keeley, B. L. (1999). Of conspiracy theories. The Journal of Philosophy, 96(3), 109–126.

    Article  Google Scholar 

  22. Keeley, B. L. (2007). God as the ultimate conspiracy theorist. Episteme, 4(2), 135–49.

    Article  Google Scholar 

  23. Knight, P. (2000). Conspiracy culture: From the Kennedy assassination to the X-files. London: Routledge.

    Google Scholar 

  24. Lee, M. F. (2011). Conspiracy rising: Conspiracy thinking and American public life. Santa Barbara, CA: Praegar.

    Google Scholar 

  25. Pigden, C. (1995). Popper revisited, or What is wrong with conspiracy theories? Philosophy of the Social Sciences, 25(1), 3–34. doi:10.1177/004839319502500101.

    Article  Google Scholar 

  26. Pigden, C. R. (2016). Are conspiracy theorists epistemically vicious? (pp. 120–132). Hoboken: Wiley-Blackwell. doi:10.1002/9781118869109.ch9. (chap 9).

    Google Scholar 

  27. Pigden, C. R. (in press). Conspiracy theories and the conventional wisdom revisited. In O. Loukola (Ed.), Secrets and conspiracies. Rodopi. https://philpapers.org/rec/PIGCTA-2.

  28. Popper, K. R. (1969). The open society and its enemies (5th ed., Vol. 2). London, Henley: Routledge and Kegan Paul.

    Google Scholar 

  29. Räikkä, J. (2009). The ethics of conspiracy theorizing. The Journal of Value Inquiry, 43, 457–468. doi:10.1007/s10790-009-9189-1.

    Article  Google Scholar 

  30. Warburton, N., & Cassam, Q. (2015). Quassim cassam on conspiracy theories. http://philosophybites.com/2015/05/quassim-cassam-on-conspiracy-theories.html.

Download references

Acknowledgements

Thanks to Daniel Wilson, Lee Basham, Martin Orr, Richard Viskovic, and Tiddy Smith for feedback on an early draft of this paper, as well as the participants and audience at the SCIENCONS conference and workshop (November 2016) at the University of Padova for feedback on elements which made it into this paper.

Author information

Affiliations

Authors

Corresponding author

Correspondence to M R. X. Dentith.

Additional information

M R. X. Dentith was supported by a fellowship at the Research Institute of the University of Bucharest (ICUB).

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Dentith, M.R.X. Conspiracy theories on the basis of the evidence. Synthese 196, 2243–2261 (2019). https://doi.org/10.1007/s11229-017-1532-7

Download citation

Keywords

  • Conspiracy
  • Conspiracy theory
  • Evidence
  • Disinformation
  • Errant data
  • Prior probabilities