9.9: Faulty Appeals to Trust
- Page ID
- 32470
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)Listen to an audio version of this page (12 min, 18 sec):
Just as we saw with appeals to emotion, appeals to trust and connection may or may not work. But apart from the question of whether or not they work is the question of whether or not they are legitimate. Here are three questions to ask about the legitimacy of any appeal to trust:
- Does the attempt to get the reader to trust suggest an idea that is not logical or not true?
- To what extent is the appeal to trust really relevant to the trustworthiness of the argument?
- Is the argument asking for more trust than is really warranted? Even if the attempt to gain our trust is logical and relevant, we should ask whether its importance has been exaggerated. Our decision to trust should be based on many different factors. Often appeals to trust imply that we should accept or reject a claim outright when in reality more caution is called for.
We will see answers to the above questions in each of the following faulty appeals to trust:
Insincere appeals to shared identity or values
Obviously, lying about who we are or what we believe in is not a valid way to build trust. An appeal to a shared identity that is not really shared or an appeal to a shared value that the writer does not really hold is certainly a breach of trust.
However, referring to an identity that the writer doesn't share can be a legitimate gesture of goodwill, as long as the writer doesn't misrepresent their own background. A white politician who interjects Spanish words into a speech to a largely Latinx audience is signaling that they want to appear friendly and empathetic to a Latinx identity. Of course, the politician's accent may undermine this to some extent by reminding the audience of their different background. Will the audience be glad that the politician is trying? Will they be put off by a sense that the politician is presuming too much or encroaching on an identity that doesn't belong to them? Writers will often try to signal respect and familiarity if they do refer to another group's identity, as in "I know from talking to transgender friends that using a single-gender restroom can feel stressful and dangerous."
Appeal to popularity (bandwagon)
An extremely common technique is to suggest that a claim is true because it is widely accepted. Of course, we do legitimately need to refer to other people's opinions as guides to our own at times. An idea's popularity may be a legitimate reason to investigate it further. It might be a reason to consider it influential and thus important to address in a discussion. But it's popularity does not prove its validity. Popularity may be due to the correctness of the idea but it may be due to many other reasons as well.
Appeals to popularity encourage readers to base their decisions too much on their underlying desire to fit in, to be hip to what everybody else is doing, not to be considered crazy. Imagine that a talk show host introduces a guest as the author of a #1 New York Times bestseller about climate change and the coming apocalypse. But this is a fallacy. We’ve all known it’s a fallacy since we were little kids, the first time we did something wrong because all of our friends were doing it, too, and our mom or dad asked us, “If all of your friends jumped off a bridge, would you do that too?”
Personal attacks
We commit this fallacy when, instead of attacking an opponent’s views, we attack the opponent. What makes this a fallacy is the disconnect between the reason and the claim. Logicians call this an ad hominem fallacy, which means "to the person." The opponent may have bad qualities, but these qualities do not make their argument incorrect. They may give legitimate reason to trust the argument less, but they do not invalidate it.
This fallacy comes in various forms; there are a lot of different ways to attack a person while ignoring (or downplaying) their actual arguments. Abusive attacks are the most straightforward. The simplest version is simply calling your opponent names instead of debating them. Donald Trump has mastered this technique. During the 2016 Republican presidential primary, he came up with catchy nicknames for his opponents, which he used just about every time he referred to them: “Lyin’ Ted” Cruz, “Little Marco” Rubio, “Low-Energy Jeb” Bush. If you pepper your descriptions of your opponent with tendentious, unflattering, politically charged language, you can get a rhetorical leg-up.
Another abusive attack is guilt by association. Here, you tarnish your opponent by associating them or his views with someone or something that your audience despises. Consider the following:
Former Vice President Dick Cheney was an advocate of a strong version of the so-called Unitary Executive interpretation of the Constitution, according to which the president’s control over the executive branch of government is quite firm and far-reaching. The effect of this is to concentrate a tremendous amount of power in the Chief Executive, such that those powers arguably eclipse those of the supposedly co-equal Legislative and Judicial branches of government. You know who else was in favor of a very strong, powerful Chief Executive? That’s right, Hitler.
The argument just compared Dick Cheney to Hitler with only the tiniest shred of evidence. That evidence is not sufficient to make a legitimate comparison: if it were, then any person who favored giving most government power to one leader could be compared to Hitler. Clearly, consolidating power was not the most significant thing Hitler did, nor, in itself, is it the reason we have such negative associations with his name. Those powerful negative associations make comparisons to Hitler and the Nazis a powerful rhetorical strategy which is often used when it isn't justified. There is even a fake-Latin term for the tactic: Argumentum ad Nazium (cf. the real Latin phrase, ad nauseum—to the point of nausea.
A circumstantial attack is not as blunt an instrument as its abusive counterpart. It also involves attacking one’s opponent, focusing on some aspect of their person—their circumstances—as the core of the criticism. This version of the fallacy comes in many different forms, and some of the circumstantial criticisms involved raise legitimate concerns about the relationship between the arguer and his argument. They only become fallacies when these criticisms are taken to be definitive refutations, which, on their own, they cannot be.
To see what we’re talking about, consider the circumstantial attack that points out one’s opponent’s self-interest in making the argument they do. Consider:
A recent study from scientists at the University of Minnesota claims to show that glyphosate—the main active ingredient in the widely used herbicide Roundup—is safe for humans to use. But guess whose business school just got a huge donation from Monsanto, the company that produces Roundup? That’s right, the University of Minnesota. Ever hear of conflict of interest? This study is junk, just like the product it’s defending.
This argument is flawed. It doesn’t follow from the fact that the University received a grant from Monsanto that scientists working at that school faked the results of a study. But the fact of the grant does raise a red flag. There may be some conflict of interest at play. Such things have happened in the past (e.g., studies funded by Big Tobacco showing that smoking is harmless). But raising the possibility of a conflict is not enough, on its own, to show that the study in question can be dismissed out of hand. It may be appropriate to subject it to heightened scrutiny, but we cannot shirk our duty to assess its arguments on their merits.
A similar thing happens when we point to the hypocrisy of someone making a certain argument—when their actions are inconsistent with the conclusion they’re trying to convince us of. Consider the following:
The head of the local branch of the American Federation of Teachers union wrote an op-ed yesterday in which she defended public school teachers from criticism and made the case that public schools’ quality has never been higher. But guess what? She sends her own kids to private schools out in the suburbs! What a hypocrite. The public school system is a wreck and we need more accountability for teachers.
This passage makes a strong point, but then commits a fallacy. It would appear that, indeed, the AFT leader is hypocritical; her choice to send her kids to private schools suggests (but doesn’t necessarily prove) that she doesn’t believe her own assertions about the quality of public schools. Again, this raises a red flag about her arguments; it’s a reason to subject them to heightened scrutiny. But it is not a sufficient reason to reject them out of hand, and to accept the opposite of her conclusions. That’s committing a fallacy. She may have perfectly good reasons, having nothing to do with the allegedly low quality of public schools, for sending her kids to the private school in the suburbs. Or she may not. She may secretly think, deep down, that her kids would be better off not going to public schools. But none of this means her arguments in the op-ed should be dismissed; it’s beside the point. Do her reasons back up her conclusion? Are her reasons true? Even if the person arguing is hypocritical, they may still be making a sound argument. We still need to decide whether their reasoning is valid before rejecting the argument.
A very specific version of the circumstantial attack, one that involves pointing out one’s opponent’s hypocrisy, is worth highlighting, since it happens so frequently. It has its own Latin name: tu quoque, which translates roughly as “you, too.” This is the “I know you are but what am I?” fallacy; the “pot calling the kettle black”; “look who’s talking”. It’s a technique used in very specific circumstances: your opponent accuses you of doing or advocating something that’s wrong, and, instead of making an argument to defend the rightness of your actions, you simply throw the accusation back in your opponent’s face—they did it too. But that doesn’t make it right.
The final variant of the circumstantial attack is perhaps the most egregious. It’s certainly the most ambitious: it’s a preemptive attack on one’s opponent to the effect that, because of the type of person they are, nothing they say on a particular topic can be taken seriously; they are excluded entirely from debate. It’s called poisoning the well. We poison the well when we exclude someone from a debate because of who they are. Imagine an English person saying, “It seems to me that you Americans should reform your healthcare system. Costs over here are much higher than they are in England. And you have millions of people who don’t even have access to healthcare. In the UK, medical care is a basic right of every citizen.” Suppose an American responded by saying, “What you know about it? Go back to England.” That would be poisoning the well. The English person is excluded from debating American healthcare just because of who they are.
Practice Exercise \(\PageIndex{1}\)
The following short critique mentions something about the author of the argument they critique. Do you think there is a legitimate reason to make this personal reference? Does it convincingly undermine the argument that "women can have it all"?
The legendary Cosmo Girl, Helen Gurley Brown, died and with her, one hopes, a not-so-fabulous legacy. This would be the demonstrably ridiculous notion women can have it all. … The most telling line from all the tributes written about her might provide a clue. Brown said she never had children because ‘I didn't want to give up the time, the love, the money.
--Kathleen Parker, “Death of a Salesgirl,” Index-Journal 94 No. 110 (18 Aug. 2012).
Attribution
Most of the above is original content by Anna Mills, licensed CC BY-NC 4.0
The descriptions of the personal attack fallacies are adapted by Anna Mills from Matthew Knachel's chapter on "Fallacies of Distraction" in his book Fundamental Methods of Logic, licensed CC BY.