Security of solar radiation management geoengineering

Andrew LOCKLEY

PDF(205 KB)
PDF(205 KB)
Front. Eng ›› 2019, Vol. 6 ›› Issue (1) : 102-116. DOI: 10.1007/s42524-019-0008-5
RESEARCH ARTICLE
RESEARCH ARTICLE

Security of solar radiation management geoengineering

Author information +
History +

Abstract

Solar Radiation Management (SRM) geoengineering is a proposed response to anthropogenic global warming (AGW) (National Academy of Sciences, 2015). There may be profound – even violent – disagreement on preferred temperature. SRM disruption risks dangerous temperature rise (termination shock). Concentrating on aircraft-delivered Stratospheric Aerosol Injection (SAI), we appraise threats to SRM and defense methodologies. Civil protest and minor cyberattacks are almost inevitable but are manageable (unless state-sponsored). Overt military attacks are more disruptive, but unlikely – although superpowers’ symbolic overt attacks may deter SRM. Unattributable attacks are likely, and mandate use of widely-available weapons. Risks from unsophisticated weapons are therefore higher. An extended supply chain is more vulnerable than a secure airbase – necessitating supply-chain hardening. Recommendations to improve SRM resilience include heterogeneous operations from diverse, secure, well-stocked bases (possibly ocean islands or aircraft carriers); and avoidance of single-point-of-failure risks (e.g. balloons). A distributed, civilian-operated system offers an alternative strategy. A multilateral, consensual SRM approach reduces likely attack triggers.

Keywords

security / geoengineering / solar radiation ma-nagement / SRM

Cite this article

Download citation ▾
Andrew LOCKLEY. Security of solar radiation management geoengineering. Front. Eng, 2019, 6(1): 102‒116 https://doi.org/10.1007/s42524-019-0008-5

References

[1]
ADL (2016). Ecoterrorism: Extremism in the animal rights and environmentalist movements. https://www.adl.org/education/resources/reports/ecoterrorism, 2016–5–15
[2]
AFB (2015). The ever-evolving cyber threat to planes. Security Week,https://www.securityweek.com/ever-evolving-cyber-threat-planes, 2016–2–05
[3]
Army U S (2014). Field Manual FM 3–09 Field Artillery Operations and Fire Support. United Sates Government. Washington DC: Department of the Army
[4]
Arquilla J (1999). Can information warfare ever be just? Ethics and Information Technology, 1(3): 203–212
CrossRef Google scholar
[5]
Bakalaki A (2016). Chemtrails, crisis, and loss in an interconnected world. Visual Anthropology Review, 32(1): 12–23
CrossRef Google scholar
[6]
Barker D W M (2013). Oligarchy or elite democracy? Aristotle and modern representative government. New Political Science, 4: 547–566
CrossRef Google scholar
[7]
Baum M A (2013). The Iraq coalition of the willing and (politically) able: Party systems, the press, and public influence on foreign policy. American Journal of Political Science, 57(2): 442–458
CrossRef Google scholar
[8]
BBC (2008). On this day- April 1, 1983: Human chain links nuclear sites. http://news.bbc.co.uk/onthisday/hi/dates/stories/april/1/newsid_ 2520000/2520753.stm, 2016–2–05
[9]
BBC News (2000). Animal rights, terror tactics. http://news.bbc.co.uk/2/hi/uk_news /902751.stm, 2016–15–05
[10]
BBC News (2007). Estonia hit by 'Moscow Cyber War’. http://news.bbc.co.uk/2/hi/europe/6665145.stm, 2016–2–05
[11]
Bichou K, Bell M, Evans A (2013). Risk Management in Port Operations, Logistics and Supply Chain Security. New York: CRC Press
[12]
Bichou K, Szyliowicz J S, Zamparini L (2014). Maritime Transport Security: Issues, Challenges and National Policies. Cheltenham and Massachusetts: Edward Elgar Publishing
[13]
Biography.com Editors (2014). Anders Behring Breivik biography. A&E Television Networks, https://www.biography.com/people/anders-behring-breivik-20617893, 2016–15–05
[14]
Biography.com Editors (2017). Ted Kaczynski biography. A&E Television Networks, https://www.biography.com/people/ted-kaczynski-578450, 2016–15–05
[15]
Cairns R (2016). Climates of suspicion: ‘Chemtrail’ conspiracy narratives and the international politics of geoengineering. Geographical Journal, 182(1): 70–84
CrossRef Google scholar
[16]
Caselli F, Morelli M, Rohner D (2015). The geography of interstate resource wars. Quarterly Journal of Economics, 130(1): 267–315
CrossRef Google scholar
[17]
Christiansen S M (2016). Climate Conflicts – A Case of International Environmental and Humanitarian Law. Cham: Springer
[18]
Clarke R A (2010). Cyber War: The Next Threat to National Security and What to Do About It. New York: HarperCollins
[19]
Climate Geoengineering Governance (CGG) (2016). What are the security implications of solar geoengineering? http://www.insis.ox.ac.uk/fileadmin/images/staff/Briefing_note_3.pdf, 2018–9–15
[20]
Crile G (2007). Charlie Wilson’s War: The Extraordinary Story of the Largest Covert Operation in History. New York: Grove Atlantic
[21]
Dalby S (2015). Geoengineering: The next era of geopolitics? Geography Compass, 9(4): 190–201
CrossRef Google scholar
[22]
Daugherty W J (2010). Covert action: Strengths and weaknesses. In: Johnson L K, eds. The Oxford Handbook of National Security Intelligence. Oxford: Oxford University Press
CrossRef Google scholar
[23]
Downes A B, Lilley M L (2010). Overt peace, covert war? Covert intervention and the democratic peace. Security Studies, 19(2): 266–306
CrossRef Google scholar
[24]
Dunnigan J F (2003). How to Make War. New York: HarperCollins
[25]
Evans R (2015). Lisa Jones, girlfriend of undercover policeman Mark Kennedy: ‘I thought I knew him better than anyone’. The Guardian,https://www.theguardian.com/uk-news/2015/nov/20/lisa-jones-girlfriend-of-undercover-police-office-mark-kennedy-interview, 2016–2–05
[26]
Fenster M (2014). The implausibility of secrecy. Hastings Law Journal, 65(2): 309–360
[27]
Fleming J R (2012). Will geoengineering bring security and peace? What does history tell us? Sicherheit und Frieden/Security and Peace, 30(4): 200–204
[28]
Geoengineering Monitor (2017). Resistance to geoengineering: A timeline, http://www.geoengineeringmonitor.org/resistance/, 2018–18–09
[29]
Gleick P (2014). Water, drought, climate change, and conflict in Syria. Weather, Climate, and Society, 6(3): 331–340
CrossRef Google scholar
[30]
Greene A (2017). Defining terrorism: One size fits all? International and Comparative Law Quarterly, 66(2): 411–440
CrossRef Google scholar
[31]
Hall A R, Coyne C J (2013). The militarization of U.S. domestic policing. The Independent Review, 17(4): 485–504
[32]
Highways England (1998). A34 Newbury Bypass Opens. Highways England Press Release, NB 348/98, 2016–15–05
[33]
Horton J B, Reynolds J L (2016). The international politics of climate engineering: A review and prospectus for international relations. International Studies Review, 18(3): 438–461
CrossRef Google scholar
[34]
Hough M, Jackson J, Bradford B (2013). Legitimacy, trust and compliance: An empirical test of procedural justice theory using the European social survey. In: Tankebe J, Liebling A, eds. Legitimacy and Criminal Justice: An International Exploration. Oxford: Oxford University Press
[35]
Hsiang S M, Burke E, Miguel E (2013). Quantifying the influence of climate on human conflict. Science, 341(6151): 1235367
CrossRef Google scholar
[36]
Instrumentation.co.za (2007). Resist cyber attack: Securing integrated SCADA systems. South African Instrumentation & Control. http://www.instrumentation.co.za/article.aspx?pklarticleid=4736, 2016–2–05
[37]
Intergovernmental Panel on Climate Change (2013). Summary for Policymakers. In: Stocker T F, Qin D, Plattner G K, Tignor M, Allen S K, Boschung J, Nauels A, Xia Y, Bex V, Midgley P M, eds. Climate Change 2013: The Physical Science Basis. Contribution of Working Group I to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge and New York: Cambridge University Press
[38]
Intergovernmental Panel on Climate Change (2018). Global Warming of 1.5°C. In: Masson-Delmotte V, Zhai P, Pörtner H O, Roberts D, Skea J, Shukla P R, Pirani A, Moufouma-Okia W, Péan C, Pidcock R, Connors S, Matthews J B R, Chen Y, Zhou X, Gomis M I, Lonnoy E, Maycock T, Tignor M, Waterfield T, eds. An IPCC special report on the impacts of global warming of 1.5°C above pre-industrial levels and related global greenhouse gas emission pathways, in the context of strengthening the global response to the threat of climate change, sustainable development, and efforts to eradicate poverty
[39]
Irvine P (2015). Initial climate response to a termination shock. EGU General Assembly Conference Abstracts, 17
[40]
Johns R, Davies F A M (2014). Coalitions of the willing? International backing and British public support for military action. Journal of Peace Research, 51(6): 767–781
CrossRef Google scholar
[41]
Kahler M (1992). Multilateralism with small and large numbers. International Organization, 46(3): 681
CrossRef Google scholar
[42]
Keegan J (2003). Intelligence in War. New York: Knopf
[43]
Kelley M (2013). The Stuxnet attack on Iran’s nuclear plant was ‘far more dangerous’ than previously thought. Business Insider, https://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11, 2016–2–05
[44]
Kibbe J D (2007). Covert action and the Pentagon. Intelligence and National Security, 22(1): 57–74
CrossRef Google scholar
[45]
Kibbe J D (2012). Conducting shadow wars. Journal of National Security. Law & Policy, 5(2): 373–392
[46]
Kidron B (2013). The women of Greenham Common taught a generation how to protest. The Guardian, https://www.theguardian.com/uk-news/2013/sep/02/greenham-common-women-taught-generation-protest, 2016–3–05
[47]
Kiruthika Devi B S, Subbulakshmi T (2016). A comparative analysis of security methods for DDoS attacks in the cloud computing environment. Indian Journal of Science and Technology, 9(34)
CrossRef Google scholar
[48]
Kleinschmitt C, Boucher O, Platt U (2018). Sensitivity of the radiative forcing by stratospheric sulfur geoengineering to the amount and strategy of the SO2 injection studied with the LMDZ-S3A model. Atmospheric Chemistry and Physics, 18(4): 2769–2786
CrossRef Google scholar
[49]
Kohnke A, Shoemaker D, Sigler K E (2016). The Complete Guide to Cybersecurity Risks and Controls. Florida: CRC Press
[50]
Kornneef J, Can Breevoort P, Hendricks C, Hoogwijk M, Koops K, Koper M (2011). Potential for biomass and carbon dioxide capture and storage. International Journal of Greenhouse Gas Control, 11(2012): 117–132
[51]
Kravitz B, MacMartin D, Mills M, Richter J, Tilmes S, Lamarque J, Tribbia J, Vitt F (2017). First simulations of designing stratospheric sulfate aerosol geoengineering to meet multiple simultaneous climate objectives. Journal of Geophysical Research, D, Atmospheres, 122(23): 12616–12634
CrossRef Google scholar
[52]
Kuypers J, Young M, Launer M (1994). Of mighty mice and meek men: Contextual reconstruction of the Iranian airbus shootdown. Southern Journal of Communication, 59(4): 294–306
CrossRef Google scholar
[53]
Laakso A, Partanen A I, Kokkola H, Laaksonen A, Lehtinen K E J, Korhonen H (2012). Stratospheric passenger flights are likely an inefficient geoengineering strategy. Environmental Research Letters, 7(3): 034021
CrossRef Google scholar
[54]
Lam J S L, Dai J (2015). Developing supply chain security design of logistics service providers: An analytical network process-quality function deployment approach. International Journal of Physical Distribution & Logistics Management, 45(7): 674–690
CrossRef Google scholar
[55]
Lancaster L, Mulaudzi G (2016). You only listen when I’m violent. Institute for Security Studies, https://issafrica.org/iss-today/you-only-listen-when-im-violent, 2018–3–09
[56]
Lewis S (2016). The dirty secret of the Paris climate deal. Foreign Policy,https://foreignpolicy.com/2015/12/17/the-dirty-secret-of-the-paris-climate-deal-carbon-capture-negative-emissions-global-warming, 2016–3–13
[57]
Link P M, Brzoska M, Maas A, Neuneck G, Scheffran J (2013). Possible implications of climate engineering for peace and security. Bulletin of the American Meteorological Society, 94(2): ES13–ES16
CrossRef Google scholar
[58]
Liu Y, Huang H Z, Wang Z, Li Y, Yang Y (2013). A Joint redundancy and imperfect maintenance strategy optimization for multi-state systems. IEEE Transactions on Reliability, 62(2): 368–378
CrossRef Google scholar
[59]
Lockley A (2016a). Licence to chill: Building a legitimate authorisation process for commercial SRM operations. Environmental Law Review, 18(1): 25–40
CrossRef Google scholar
[60]
Lockley A (2016b). Geoengineering: A war on climate change? Journal of Evolution and Technology / WTA, 26(1): 26–49
[61]
Lomax G, Workman M, Lenton T, Shah N (2015). Reframing the Policy Approach to Greenhouse Gas Removal Technologies. Energy Policy, 78: 125–136
CrossRef Google scholar
[62]
Lyons D J (2014). The impact of inventory leanness and slack resources on supply chain resilience: An empirical study. Georgia State University, https://scholarworks.gsu.edu/cgi/viewcontent.cgi?article=1048&context=bus_admin_diss, 2018–9–26
[63]
Maas A, Bodó B, Comardicea I, Roffey R (2013). Global Environmental Change: New Drivers for Resistance, Crime and Terrorism? Baden-Baden: Nomos
[64]
Maas A, Scheffran J (2012). Climate conflicts 2.0? Climate engineering as a challenge for international peace and security. Sicherheit und Frieden / Security and Peace, 30(4): 193–200
[65]
Macaulay T, Singer B L (2011). Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS. New York: CRC Press
[66]
MacMartin D, Caldeira K, Keith D (2014). Solar geoengineering to limit the rate of temperature change. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 372(2031): 20140134
CrossRef Google scholar
[67]
Manadhata P, Wing J (2004). Measuring a system’s attack surface. Carnegie Mellon University, School of Computer Science, https://www.cs.cmu.edu/wing/publications/tr04-102.pdf, 2018–3–09
[68]
Marsh L L C (2018). Marsh & McLennan Companies. http://www.marsh.com, 2018–9–18
[69]
Maystadt J F, Ecker O (2014). Extreme weather and civil war: Does drought fuel conflict in Somalia through livestock price shocks? American Journal of Agricultural Economics, 96(4): 1157–1182
CrossRef Google scholar
[70]
McClellan J, Keith D W, Apt J (2012). Cost analysis of stratospheric albedo modification delivery systems. Environmental Research Letters, 7(3): 034019
CrossRef Google scholar
[71]
McCusker K E, Armour K C, Bitz C M, Battisti D S (2014). Rapid and extensive warming following cessation of solar radiation management. Environmental Research Letters, 9(2): 024005
CrossRef Google scholar
[72]
Mian Z (2016). Kashmir, climate change, and nuclear war. Bulletin of the Atomic Scientists. http://thebulletin.org/kashmir-climate-change-and-nuclear-war10261, 2017–7–10
[73]
Millar S (2003). Heathrow a soft target for missile attack. The Guardian,https://www.theguardian.com/uk/2003/feb/12/terrorism.world1, 2016–2–05
[74]
Miller N (2016). Malaysia airlines flight MH17 was shot down from pro-Russian rebel controlled territory, investigation finds. Sydney Morning Herald
[75]
Moore D M, Antill P D (2011). The use of contractors on deployed operations (CONDO) in the age of austerity. RUSI Defence Systems, 14: 32–34
[76]
Morrow D R (2014). Why geoengineering is a public good, even if it is bad. Climatic Change, 123(2): 95–100
CrossRef Google scholar
[77]
New Line Cinema (1997–2002). Austin Powers franchise
[78]
Nightingale P, Cairns R (2014). The security implications of geoengineering: Blame, imposed agreement and the security of critical infrastructure. Climate Geoengineering Governance Working Paper Series: 018, http://www.geoengineering-governance-research.org/perch/resources/workingpaper18nightingalecairnssecurityimplications.pdf
[79]
Norman J (2011). Iran shows intact drone, boasts of cyberattack. CBS News, https://www.cbsnews.com/news/iran-shows-intact-drone-boasts-of-cyberattack/, 2016–5–15
[80]
O’Shaughnessy H (1996). £1.5M hawk attack women freed. The Independent, http://www.independent.co.uk/news/pounds-15m-hawk-attack-women-freed-1331285.html, 2018–03–09
[81]
Organisation for the Prohibition of Chemical Weapons (2016). Destruction of declared Syrian chemical weapons completed. Destruction of Syrian chemical weapons completed, 2016–2–05
[82]
Pantucci R, Ellis C, Chaplai L (2015). Countering lone-actor terrorism series no. 1: Lone act literature review. Royal United Services Institute for Defence and Security Studies, https://rusi.org/sites/default/files/201512_clat_literature_review_0.pdf
[83]
Prunckun H (2012). Counterintelligence Theory and Practice. Plymouth UK: Rowman & Littlefield
[84]
Quodling A (2015). Doxxing, swatting and the new trends in online harassment. The Conversation, http://theconversation.com/doxxing-swatting-and-the-new-trends-in-online-harassment-40234, 2016–2–05
[85]
Raza A (2016). 8 most awesome hacks conducted by Anonymous hackers. HackRead, https://www.hackread.com/8-most-awesome-hacks-conducted-by-anonymous-hackers/, 2016–2–05
[86]
Ricke K L, Moreno-Cruz J B, Caldeira K (2013). Strategic incentives for climate geoengineering coalitions to exclude broad participation. Environmental Research Letters, 8(1): 014021
CrossRef Google scholar
[87]
Ricke K L, Morgan M G, Allen M R (2010). Regional climate response to solar-radiation management. Nature Geoscience, 3(8): 537–541
CrossRef Google scholar
[88]
Robock A (2015). Cloud control: Climatologist Alan Robock on the effects of geoengineering and nuclear war. Bulletin of the Atomic Scientists, 71(3): 1–7
CrossRef Google scholar
[89]
Robock A, Marquardt A, Kravitz B, Stenchikov G (2009). Benefits, risks, and costs of stratospheric geoengineering. Geophysical Research Letters, 36(19): L19703
CrossRef Google scholar
[90]
Sawer P (2015). Andreas Lubitz: Everything we know about Germanwings plane crash co-pilot. The Telegraph, https://www.telegraph.co.uk/news/worldnews/europe/france/ 11496066/Andreas-Lubitz-Everything-we-know-about-Germanwings-plane-crash-co-pilot.html, 2016–2–05
[91]
Sayne A (2011). Climate change adaptation and conflict in Nigeria. United States Institute of Peace. https://www.usip.org/sites/default/files/Climate_Change_Nigeria.pdf
[92]
Scheffran J (2015). Climate change as a risk multiplier in a world of complex crises. Planetary security conference, The Hague, https://www.researchgate.net/publication/284284909_Climate_Change_as_a_Risk_Multiplier_in_a_World_of_Complex_
[93]
Scheffran J, Burroughs J, Leidreiter A, Van Riet R, Ware A (2016). The climate-nuclear nexus: Exploring the linkages between climate change and nuclear threats. World Future Council, https://www.worldfuturecouncil.org/wp-content/uploads/2016/01/WFC_2015 _The_Climate-Nuclear_Nexus.pdf, 2018–18–09
[94]
Scheffran J, Cannaday T (2013). Resistance to climate change policies: The conflict potential of non-fossil energy paths and climate engineering. In: Maas A, Bodó B, Burnley C, Comardicea I, Roffey, R, eds. Global Environmental Change. Auflage: Nomos, 261–292
[95]
Schlembach R (2011). How do radical climate movements negotiate their environmental and their social agendas? A study of debates within the Camp for Climate Action (UK). Critical Social Policy, 31(2): 194–215
CrossRef Google scholar
[96]
Schlosser E (2015). Nuns and nuclear security. The New Yorker, https://www.newyorker.com/magazine/2015/03/09/break-in-at-y-12, 2016–2–05
[97]
Schock K (2013). The practice and study of civil resistance. Journal of Peace Research, 50(3): 277–290
CrossRef Google scholar
[98]
Selby J, Dahi O S, Fröhlich C, Hulme M (2017). Climate change and the Syrian civil war revisited. Political Geography, 60: 232–244
CrossRef Google scholar
[99]
Serck L (2016). Did the Newbury bypass tree-huggers change anything? BBC News, https://www.bbc.com/news/uk-england-berkshire-35132815, 2016–2–05
[100]
Sheikh A, Guled A (2009). U.S. Navy rescues captain, kills Somali pirates. Reuters, https://www.reuters.com/article/us-somalia-piracy/u-s-navy-rescues-captain-kills-somali-pirates-idUSTRE53A1LP200 90412, 2016–2–05
[101]
Shepherd J G (2009). Geoengineering the Climate: Science, Governance and Uncertainty. London: The Royal Society
[102]
Shevchenko V (2014). “Little Green Men” or “Russian Invaders”? BBC News, https://www.bbc.com/news/world-europe-26532154, 2016–2–05
[103]
Singer P (2015). Stuxnet and its hidden lessons on the ethics of cyberweapons. Case Western Reserve Journal of International Law, 47(1): 79–86, http://heinonline.org/HOL/LandingPage?handle=hein.journals/cwrint47&div=11&id=&page=, 2018–9–15
[104]
Smith G (2015). The day the troop trains came to Berkeley (first person). The Berkeley Daily Planet, http://www.berkeleydailyplanet.com/issue/2015-08-07/article/43569, 2016–5–15
[105]
Staff T (2015). Eilat-bound jets get anti-missile defense pods. The Times of Israel, https://www.timesofisrael.com/eilat-bound-jets-get-anti-missile-defense-pods/, 2016–2–05
[106]
Stern N (2006). Executive summary. In: Stern N, eds. Stern Review: The Economics of Climate Change. Cambridge: Cambridge University Press
[107]
Stratospheric Particle Injection for Climate Engineering (2018). The Spice Project, http://www.spice.ac.uk, 2018–9–15
[108]
Sweet K M (2009). Aviation and Airport Security: Terrorism and Safety Concerns. New York: CRC Press
[109]
The CNA Corporation (2007). National security and the threat of climate change. https://www.cna.org/cna_files/pdf/national%20security%20and%20the%20threat%20of%20 climate%20change.pdf, 2018–9–18
[110]
The World Bank (2015). Political stability- country rankings. The Global Economy, https://www.theglobaleconomy.com/rankings/wb_political_stability/, 2018–9–18
[111]
Thomas D G (1999). The Recognition of States: Law and Practice in Debate and Evolution. Westport, Connecticut: Praeger
[112]
Ugorji B (2017). Combating terrorism: A literature review. International Center for Ethno-Religious Mediation, https://www.icermediation.org/publications/combating-terrorism-a-literature-review/, 2018–9–18
[113]
United Nations Environment Programme (2007). Sudan post-conflict environmental assessment. http://postconflict.unep.ch/publications/sudan/00_fwd.pdf, 2018–9–15
[114]
United Nations Framework Convention on Climate Change (2014). Report of the conference of the parties on its twentieth session, held in Lima from 1 to 14 December 2014. http://unfccc.int/resource/docs/2014/cop20/eng/10.pdf, 2018–9–15
[115]
U.S. Department of State (2016). Chapter 3: State sponsors of terrorism overview. In: Country Reports on Terrorism 2016, https://www.state.gov/j/ct/rls/crt/2016/272235.htm, 2018–9–18
[116]
Victor D G (2008). On the regulation of geoengineering. Oxford Review of Economic Policy, 24(2): 322–336
CrossRef Google scholar
[117]
Ward D, Morris S (2006). Jail for animal rights extremists who stole body of elderly woman from her grave. The Guardian, https://www.theguardian.com/uk/2006/may/ 12/animalwelfare.topstories3, 2018–3–09
[118]
Weitzman M L (2015). A voting architecture for the governance of free-driver externalities, with application to geoengineering. Scandinavian Journal of Economics, 117(4): 1049–1068
CrossRef Google scholar
[119]
Whyte K P (2012). Now this! Indigenous sovereignty, political obliviousness and governance models for SRM research. Ethics, Policy & Environment, 15(2): 172–187
CrossRef Google scholar
[120]
Wilson L (2010). Fifteen years since live exports divided Brightlingsea. BBC News, http://news.bbc.co.uk/local/essex/hi/people_and_places/history/newsid_8506000/8506735.stm, 2016–5–15
[121]
Winterman D (2011). SAS War Diary: the SAS secret hidden since World War II. BBC News, https://www.bbc.com/news/magazine-14952939, 2016–2–05
[122]
Yang P, Yao Y, Mi Z, Cao Y, Liao H, Yu B, Liang Q, Coffman D, Wei Y (2018). Social cost of carbon under shared socioeconomic pathways. Global Environmental Change, 53: 225–232
CrossRef Google scholar
[123]
Yusoff K (2013). The geoengine: Geoengineering and the geopolitics of planetary modification. Environment & Planning A, 45(12): 2799–2808
CrossRef Google scholar
[124]
Zetter K (2014). Hacker lexicon: what is an air gap? Wired.com, https://www.wired.com/2014/12/hacker-lexicon-air-gap/, 2018–9–18
[125]
Zhang D D, Brecke P, Lee H F, He Y Q, Zhang J (2007). Global climate change, war, and population decline in recent human history. Proceedings of the National Academy of Sciences of the United States of America, 104(49): 19214–19219
CrossRef Google scholar

Open Access

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the appropriate credit is given to the original author(s) and the source, and a link is provided to the Creative Commons license, indicating if changes were made.

RIGHTS & PERMISSIONS

2019 The Author(s) 2019. This article is published with open access at link.springer.com and journal.hep.com.cn
AI Summary AI Mindmap
PDF(205 KB)

Accesses

Citations

Detail

Sections
Recommended

/