Security of solar radiation management geoengineering
Andrew LOCKLEY
Security of solar radiation management geoengineering
Solar Radiation Management (SRM) geoengineering is a proposed response to anthropogenic global warming (AGW) (National Academy of Sciences, 2015). There may be profound – even violent – disagreement on preferred temperature. SRM disruption risks dangerous temperature rise (termination shock). Concentrating on aircraft-delivered Stratospheric Aerosol Injection (SAI), we appraise threats to SRM and defense methodologies. Civil protest and minor cyberattacks are almost inevitable but are manageable (unless state-sponsored). Overt military attacks are more disruptive, but unlikely – although superpowers’ symbolic overt attacks may deter SRM. Unattributable attacks are likely, and mandate use of widely-available weapons. Risks from unsophisticated weapons are therefore higher. An extended supply chain is more vulnerable than a secure airbase – necessitating supply-chain hardening. Recommendations to improve SRM resilience include heterogeneous operations from diverse, secure, well-stocked bases (possibly ocean islands or aircraft carriers); and avoidance of single-point-of-failure risks (e.g. balloons). A distributed, civilian-operated system offers an alternative strategy. A multilateral, consensual SRM approach reduces likely attack triggers.
security / geoengineering / solar radiation ma-nagement / SRM
[1] |
ADL (2016). Ecoterrorism: Extremism in the animal rights and environmentalist movements. https://www.adl.org/education/resources/reports/ecoterrorism, 2016–5–15
|
[2] |
AFB (2015). The ever-evolving cyber threat to planes. Security Week,https://www.securityweek.com/ever-evolving-cyber-threat-planes, 2016–2–05
|
[3] |
Army U S (2014). Field Manual FM 3–09 Field Artillery Operations and Fire Support. United Sates Government. Washington DC: Department of the Army
|
[4] |
Arquilla J (1999). Can information warfare ever be just? Ethics and Information Technology, 1(3): 203–212
CrossRef
Google scholar
|
[5] |
Bakalaki A (2016). Chemtrails, crisis, and loss in an interconnected world. Visual Anthropology Review, 32(1): 12–23
CrossRef
Google scholar
|
[6] |
Barker D W M (2013). Oligarchy or elite democracy? Aristotle and modern representative government. New Political Science, 4: 547–566
CrossRef
Google scholar
|
[7] |
Baum M A (2013). The Iraq coalition of the willing and (politically) able: Party systems, the press, and public influence on foreign policy. American Journal of Political Science, 57(2): 442–458
CrossRef
Google scholar
|
[8] |
BBC (2008). On this day- April 1, 1983: Human chain links nuclear sites. http://news.bbc.co.uk/onthisday/hi/dates/stories/april/1/newsid_ 2520000/2520753.stm, 2016–2–05
|
[9] |
BBC News (2000). Animal rights, terror tactics. http://news.bbc.co.uk/2/hi/uk_news /902751.stm, 2016–15–05
|
[10] |
BBC News (2007). Estonia hit by 'Moscow Cyber War’. http://news.bbc.co.uk/2/hi/europe/6665145.stm, 2016–2–05
|
[11] |
Bichou K, Bell M, Evans A (2013). Risk Management in Port Operations, Logistics and Supply Chain Security. New York: CRC Press
|
[12] |
Bichou K, Szyliowicz J S, Zamparini L (2014). Maritime Transport Security: Issues, Challenges and National Policies. Cheltenham and Massachusetts: Edward Elgar Publishing
|
[13] |
Biography.com Editors (2014). Anders Behring Breivik biography. A&E Television Networks, https://www.biography.com/people/anders-behring-breivik-20617893, 2016–15–05
|
[14] |
Biography.com Editors (2017). Ted Kaczynski biography. A&E Television Networks, https://www.biography.com/people/ted-kaczynski-578450, 2016–15–05
|
[15] |
Cairns R (2016). Climates of suspicion: ‘Chemtrail’ conspiracy narratives and the international politics of geoengineering. Geographical Journal, 182(1): 70–84
CrossRef
Google scholar
|
[16] |
Caselli F, Morelli M, Rohner D (2015). The geography of interstate resource wars. Quarterly Journal of Economics, 130(1): 267–315
CrossRef
Google scholar
|
[17] |
Christiansen S M (2016). Climate Conflicts – A Case of International Environmental and Humanitarian Law. Cham: Springer
|
[18] |
Clarke R A (2010). Cyber War: The Next Threat to National Security and What to Do About It. New York: HarperCollins
|
[19] |
Climate Geoengineering Governance (CGG) (2016). What are the security implications of solar geoengineering? http://www.insis.ox.ac.uk/fileadmin/images/staff/Briefing_note_3.pdf, 2018–9–15
|
[20] |
Crile G (2007). Charlie Wilson’s War: The Extraordinary Story of the Largest Covert Operation in History. New York: Grove Atlantic
|
[21] |
Dalby S (2015). Geoengineering: The next era of geopolitics? Geography Compass, 9(4): 190–201
CrossRef
Google scholar
|
[22] |
Daugherty W J (2010). Covert action: Strengths and weaknesses. In: Johnson L K, eds. The Oxford Handbook of National Security Intelligence. Oxford: Oxford University Press
CrossRef
Google scholar
|
[23] |
Downes A B, Lilley M L (2010). Overt peace, covert war? Covert intervention and the democratic peace. Security Studies, 19(2): 266–306
CrossRef
Google scholar
|
[24] |
Dunnigan J F (2003). How to Make War. New York: HarperCollins
|
[25] |
Evans R (2015). Lisa Jones, girlfriend of undercover policeman Mark Kennedy: ‘I thought I knew him better than anyone’. The Guardian,https://www.theguardian.com/uk-news/2015/nov/20/lisa-jones-girlfriend-of-undercover-police-office-mark-kennedy-interview, 2016–2–05
|
[26] |
Fenster M (2014). The implausibility of secrecy. Hastings Law Journal, 65(2): 309–360
|
[27] |
Fleming J R (2012). Will geoengineering bring security and peace? What does history tell us? Sicherheit und Frieden/Security and Peace, 30(4): 200–204
|
[28] |
Geoengineering Monitor (2017). Resistance to geoengineering: A timeline, http://www.geoengineeringmonitor.org/resistance/, 2018–18–09
|
[29] |
Gleick P (2014). Water, drought, climate change, and conflict in Syria. Weather, Climate, and Society, 6(3): 331–340
CrossRef
Google scholar
|
[30] |
Greene A (2017). Defining terrorism: One size fits all? International and Comparative Law Quarterly, 66(2): 411–440
CrossRef
Google scholar
|
[31] |
Hall A R, Coyne C J (2013). The militarization of U.S. domestic policing. The Independent Review, 17(4): 485–504
|
[32] |
Highways England (1998). A34 Newbury Bypass Opens. Highways England Press Release, NB 348/98, 2016–15–05
|
[33] |
Horton J B, Reynolds J L (2016). The international politics of climate engineering: A review and prospectus for international relations. International Studies Review, 18(3): 438–461
CrossRef
Google scholar
|
[34] |
Hough M, Jackson J, Bradford B (2013). Legitimacy, trust and compliance: An empirical test of procedural justice theory using the European social survey. In: Tankebe J, Liebling A, eds. Legitimacy and Criminal Justice: An International Exploration. Oxford: Oxford University Press
|
[35] |
Hsiang S M, Burke E, Miguel E (2013). Quantifying the influence of climate on human conflict. Science, 341(6151): 1235367
CrossRef
Google scholar
|
[36] |
Instrumentation.co.za (2007). Resist cyber attack: Securing integrated SCADA systems. South African Instrumentation & Control. http://www.instrumentation.co.za/article.aspx?pklarticleid=4736, 2016–2–05
|
[37] |
Intergovernmental Panel on Climate Change (2013). Summary for Policymakers. In: Stocker T F, Qin D, Plattner G K, Tignor M, Allen S K, Boschung J, Nauels A, Xia Y, Bex V, Midgley P M, eds. Climate Change 2013: The Physical Science Basis. Contribution of Working Group I to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge and New York: Cambridge University Press
|
[38] |
Intergovernmental Panel on Climate Change (2018). Global Warming of 1.5°C. In: Masson-Delmotte V, Zhai P, Pörtner H O, Roberts D, Skea J, Shukla P R, Pirani A, Moufouma-Okia W, Péan C, Pidcock R, Connors S, Matthews J B R, Chen Y, Zhou X, Gomis M I, Lonnoy E, Maycock T, Tignor M, Waterfield T, eds. An IPCC special report on the impacts of global warming of 1.5°C above pre-industrial levels and related global greenhouse gas emission pathways, in the context of strengthening the global response to the threat of climate change, sustainable development, and efforts to eradicate poverty
|
[39] |
Irvine P (2015). Initial climate response to a termination shock. EGU General Assembly Conference Abstracts, 17
|
[40] |
Johns R, Davies F A M (2014). Coalitions of the willing? International backing and British public support for military action. Journal of Peace Research, 51(6): 767–781
CrossRef
Google scholar
|
[41] |
Kahler M (1992). Multilateralism with small and large numbers. International Organization, 46(3): 681
CrossRef
Google scholar
|
[42] |
Keegan J (2003). Intelligence in War. New York: Knopf
|
[43] |
Kelley M (2013). The Stuxnet attack on Iran’s nuclear plant was ‘far more dangerous’ than previously thought. Business Insider, https://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previous-thought-2013-11, 2016–2–05
|
[44] |
Kibbe J D (2007). Covert action and the Pentagon. Intelligence and National Security, 22(1): 57–74
CrossRef
Google scholar
|
[45] |
Kibbe J D (2012). Conducting shadow wars. Journal of National Security. Law & Policy, 5(2): 373–392
|
[46] |
Kidron B (2013). The women of Greenham Common taught a generation how to protest. The Guardian, https://www.theguardian.com/uk-news/2013/sep/02/greenham-common-women-taught-generation-protest, 2016–3–05
|
[47] |
Kiruthika Devi B S, Subbulakshmi T (2016). A comparative analysis of security methods for DDoS attacks in the cloud computing environment. Indian Journal of Science and Technology, 9(34)
CrossRef
Google scholar
|
[48] |
Kleinschmitt C, Boucher O, Platt U (2018). Sensitivity of the radiative forcing by stratospheric sulfur geoengineering to the amount and strategy of the SO2 injection studied with the LMDZ-S3A model. Atmospheric Chemistry and Physics, 18(4): 2769–2786
CrossRef
Google scholar
|
[49] |
Kohnke A, Shoemaker D, Sigler K E (2016). The Complete Guide to Cybersecurity Risks and Controls. Florida: CRC Press
|
[50] |
Kornneef J, Can Breevoort P, Hendricks C, Hoogwijk M, Koops K, Koper M (2011). Potential for biomass and carbon dioxide capture and storage. International Journal of Greenhouse Gas Control, 11(2012): 117–132
|
[51] |
Kravitz B, MacMartin D, Mills M, Richter J, Tilmes S, Lamarque J, Tribbia J, Vitt F (2017). First simulations of designing stratospheric sulfate aerosol geoengineering to meet multiple simultaneous climate objectives. Journal of Geophysical Research, D, Atmospheres, 122(23): 12616–12634
CrossRef
Google scholar
|
[52] |
Kuypers J, Young M, Launer M (1994). Of mighty mice and meek men: Contextual reconstruction of the Iranian airbus shootdown. Southern Journal of Communication, 59(4): 294–306
CrossRef
Google scholar
|
[53] |
Laakso A, Partanen A I, Kokkola H, Laaksonen A, Lehtinen K E J, Korhonen H (2012). Stratospheric passenger flights are likely an inefficient geoengineering strategy. Environmental Research Letters, 7(3): 034021
CrossRef
Google scholar
|
[54] |
Lam J S L, Dai J (2015). Developing supply chain security design of logistics service providers: An analytical network process-quality function deployment approach. International Journal of Physical Distribution & Logistics Management, 45(7): 674–690
CrossRef
Google scholar
|
[55] |
Lancaster L, Mulaudzi G (2016). You only listen when I’m violent. Institute for Security Studies, https://issafrica.org/iss-today/you-only-listen-when-im-violent, 2018–3–09
|
[56] |
Lewis S (2016). The dirty secret of the Paris climate deal. Foreign Policy,https://foreignpolicy.com/2015/12/17/the-dirty-secret-of-the-paris-climate-deal-carbon-capture-negative-emissions-global-warming, 2016–3–13
|
[57] |
Link P M, Brzoska M, Maas A, Neuneck G, Scheffran J (2013). Possible implications of climate engineering for peace and security. Bulletin of the American Meteorological Society, 94(2): ES13–ES16
CrossRef
Google scholar
|
[58] |
Liu Y, Huang H Z, Wang Z, Li Y, Yang Y (2013). A Joint redundancy and imperfect maintenance strategy optimization for multi-state systems. IEEE Transactions on Reliability, 62(2): 368–378
CrossRef
Google scholar
|
[59] |
Lockley A (2016a). Licence to chill: Building a legitimate authorisation process for commercial SRM operations. Environmental Law Review, 18(1): 25–40
CrossRef
Google scholar
|
[60] |
Lockley A (2016b). Geoengineering: A war on climate change? Journal of Evolution and Technology / WTA, 26(1): 26–49
|
[61] |
Lomax G, Workman M, Lenton T, Shah N (2015). Reframing the Policy Approach to Greenhouse Gas Removal Technologies. Energy Policy, 78: 125–136
CrossRef
Google scholar
|
[62] |
Lyons D J (2014). The impact of inventory leanness and slack resources on supply chain resilience: An empirical study. Georgia State University, https://scholarworks.gsu.edu/cgi/viewcontent.cgi?article=1048&context=bus_admin_diss, 2018–9–26
|
[63] |
Maas A, Bodó B, Comardicea I, Roffey R (2013). Global Environmental Change: New Drivers for Resistance, Crime and Terrorism? Baden-Baden: Nomos
|
[64] |
Maas A, Scheffran J (2012). Climate conflicts 2.0? Climate engineering as a challenge for international peace and security. Sicherheit und Frieden / Security and Peace, 30(4): 193–200
|
[65] |
Macaulay T, Singer B L (2011). Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS. New York: CRC Press
|
[66] |
MacMartin D, Caldeira K, Keith D (2014). Solar geoengineering to limit the rate of temperature change. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 372(2031): 20140134
CrossRef
Google scholar
|
[67] |
Manadhata P, Wing J (2004). Measuring a system’s attack surface. Carnegie Mellon University, School of Computer Science, https://www.cs.cmu.edu/wing/publications/tr04-102.pdf, 2018–3–09
|
[68] |
Marsh L L C (2018). Marsh & McLennan Companies. http://www.marsh.com, 2018–9–18
|
[69] |
Maystadt J F, Ecker O (2014). Extreme weather and civil war: Does drought fuel conflict in Somalia through livestock price shocks? American Journal of Agricultural Economics, 96(4): 1157–1182
CrossRef
Google scholar
|
[70] |
McClellan J, Keith D W, Apt J (2012). Cost analysis of stratospheric albedo modification delivery systems. Environmental Research Letters, 7(3): 034019
CrossRef
Google scholar
|
[71] |
McCusker K E, Armour K C, Bitz C M, Battisti D S (2014). Rapid and extensive warming following cessation of solar radiation management. Environmental Research Letters, 9(2): 024005
CrossRef
Google scholar
|
[72] |
Mian Z (2016). Kashmir, climate change, and nuclear war. Bulletin of the Atomic Scientists. http://thebulletin.org/kashmir-climate-change-and-nuclear-war10261, 2017–7–10
|
[73] |
Millar S (2003). Heathrow a soft target for missile attack. The Guardian,https://www.theguardian.com/uk/2003/feb/12/terrorism.world1, 2016–2–05
|
[74] |
Miller N (2016). Malaysia airlines flight MH17 was shot down from pro-Russian rebel controlled territory, investigation finds. Sydney Morning Herald
|
[75] |
Moore D M, Antill P D (2011). The use of contractors on deployed operations (CONDO) in the age of austerity. RUSI Defence Systems, 14: 32–34
|
[76] |
Morrow D R (2014). Why geoengineering is a public good, even if it is bad. Climatic Change, 123(2): 95–100
CrossRef
Google scholar
|
[77] |
New Line Cinema (1997–2002). Austin Powers franchise
|
[78] |
Nightingale P, Cairns R (2014). The security implications of geoengineering: Blame, imposed agreement and the security of critical infrastructure. Climate Geoengineering Governance Working Paper Series: 018, http://www.geoengineering-governance-research.org/perch/resources/workingpaper18nightingalecairnssecurityimplications.pdf
|
[79] |
Norman J (2011). Iran shows intact drone, boasts of cyberattack. CBS News, https://www.cbsnews.com/news/iran-shows-intact-drone-boasts-of-cyberattack/, 2016–5–15
|
[80] |
O’Shaughnessy H (1996). £1.5M hawk attack women freed. The Independent, http://www.independent.co.uk/news/pounds-15m-hawk-attack-women-freed-1331285.html, 2018–03–09
|
[81] |
Organisation for the Prohibition of Chemical Weapons (2016). Destruction of declared Syrian chemical weapons completed. Destruction of Syrian chemical weapons completed, 2016–2–05
|
[82] |
Pantucci R, Ellis C, Chaplai L (2015). Countering lone-actor terrorism series no. 1: Lone act literature review. Royal United Services Institute for Defence and Security Studies, https://rusi.org/sites/default/files/201512_clat_literature_review_0.pdf
|
[83] |
Prunckun H (2012). Counterintelligence Theory and Practice. Plymouth UK: Rowman & Littlefield
|
[84] |
Quodling A (2015). Doxxing, swatting and the new trends in online harassment. The Conversation, http://theconversation.com/doxxing-swatting-and-the-new-trends-in-online-harassment-40234, 2016–2–05
|
[85] |
Raza A (2016). 8 most awesome hacks conducted by Anonymous hackers. HackRead, https://www.hackread.com/8-most-awesome-hacks-conducted-by-anonymous-hackers/, 2016–2–05
|
[86] |
Ricke K L, Moreno-Cruz J B, Caldeira K (2013). Strategic incentives for climate geoengineering coalitions to exclude broad participation. Environmental Research Letters, 8(1): 014021
CrossRef
Google scholar
|
[87] |
Ricke K L, Morgan M G, Allen M R (2010). Regional climate response to solar-radiation management. Nature Geoscience, 3(8): 537–541
CrossRef
Google scholar
|
[88] |
Robock A (2015). Cloud control: Climatologist Alan Robock on the effects of geoengineering and nuclear war. Bulletin of the Atomic Scientists, 71(3): 1–7
CrossRef
Google scholar
|
[89] |
Robock A, Marquardt A, Kravitz B, Stenchikov G (2009). Benefits, risks, and costs of stratospheric geoengineering. Geophysical Research Letters, 36(19): L19703
CrossRef
Google scholar
|
[90] |
Sawer P (2015). Andreas Lubitz: Everything we know about Germanwings plane crash co-pilot. The Telegraph, https://www.telegraph.co.uk/news/worldnews/europe/france/ 11496066/Andreas-Lubitz-Everything-we-know-about-Germanwings-plane-crash-co-pilot.html, 2016–2–05
|
[91] |
Sayne A (2011). Climate change adaptation and conflict in Nigeria. United States Institute of Peace. https://www.usip.org/sites/default/files/Climate_Change_Nigeria.pdf
|
[92] |
Scheffran J (2015). Climate change as a risk multiplier in a world of complex crises. Planetary security conference, The Hague, https://www.researchgate.net/publication/284284909_Climate_Change_as_a_Risk_Multiplier_in_a_World_of_Complex_
|
[93] |
Scheffran J, Burroughs J, Leidreiter A, Van Riet R, Ware A (2016). The climate-nuclear nexus: Exploring the linkages between climate change and nuclear threats. World Future Council, https://www.worldfuturecouncil.org/wp-content/uploads/2016/01/WFC_2015 _The_Climate-Nuclear_Nexus.pdf, 2018–18–09
|
[94] |
Scheffran J, Cannaday T (2013). Resistance to climate change policies: The conflict potential of non-fossil energy paths and climate engineering. In: Maas A, Bodó B, Burnley C, Comardicea I, Roffey, R, eds. Global Environmental Change. Auflage: Nomos, 261–292
|
[95] |
Schlembach R (2011). How do radical climate movements negotiate their environmental and their social agendas? A study of debates within the Camp for Climate Action (UK). Critical Social Policy, 31(2): 194–215
CrossRef
Google scholar
|
[96] |
Schlosser E (2015). Nuns and nuclear security. The New Yorker, https://www.newyorker.com/magazine/2015/03/09/break-in-at-y-12, 2016–2–05
|
[97] |
Schock K (2013). The practice and study of civil resistance. Journal of Peace Research, 50(3): 277–290
CrossRef
Google scholar
|
[98] |
Selby J, Dahi O S, Fröhlich C, Hulme M (2017). Climate change and the Syrian civil war revisited. Political Geography, 60: 232–244
CrossRef
Google scholar
|
[99] |
Serck L (2016). Did the Newbury bypass tree-huggers change anything? BBC News, https://www.bbc.com/news/uk-england-berkshire-35132815, 2016–2–05
|
[100] |
Sheikh A, Guled A (2009). U.S. Navy rescues captain, kills Somali pirates. Reuters, https://www.reuters.com/article/us-somalia-piracy/u-s-navy-rescues-captain-kills-somali-pirates-idUSTRE53A1LP200 90412, 2016–2–05
|
[101] |
Shepherd J G (2009). Geoengineering the Climate: Science, Governance and Uncertainty. London: The Royal Society
|
[102] |
Shevchenko V (2014). “Little Green Men” or “Russian Invaders”? BBC News, https://www.bbc.com/news/world-europe-26532154, 2016–2–05
|
[103] |
Singer P (2015). Stuxnet and its hidden lessons on the ethics of cyberweapons. Case Western Reserve Journal of International Law, 47(1): 79–86, http://heinonline.org/HOL/LandingPage?handle=hein.journals/cwrint47&div=11&id=&page=, 2018–9–15
|
[104] |
Smith G (2015). The day the troop trains came to Berkeley (first person). The Berkeley Daily Planet, http://www.berkeleydailyplanet.com/issue/2015-08-07/article/43569, 2016–5–15
|
[105] |
Staff T (2015). Eilat-bound jets get anti-missile defense pods. The Times of Israel, https://www.timesofisrael.com/eilat-bound-jets-get-anti-missile-defense-pods/, 2016–2–05
|
[106] |
Stern N (2006). Executive summary. In: Stern N, eds. Stern Review: The Economics of Climate Change. Cambridge: Cambridge University Press
|
[107] |
Stratospheric Particle Injection for Climate Engineering (2018). The Spice Project, http://www.spice.ac.uk, 2018–9–15
|
[108] |
Sweet K M (2009). Aviation and Airport Security: Terrorism and Safety Concerns. New York: CRC Press
|
[109] |
The CNA Corporation (2007). National security and the threat of climate change. https://www.cna.org/cna_files/pdf/national%20security%20and%20the%20threat%20of%20 climate%20change.pdf, 2018–9–18
|
[110] |
The World Bank (2015). Political stability- country rankings. The Global Economy, https://www.theglobaleconomy.com/rankings/wb_political_stability/, 2018–9–18
|
[111] |
Thomas D G (1999). The Recognition of States: Law and Practice in Debate and Evolution. Westport, Connecticut: Praeger
|
[112] |
Ugorji B (2017). Combating terrorism: A literature review. International Center for Ethno-Religious Mediation, https://www.icermediation.org/publications/combating-terrorism-a-literature-review/, 2018–9–18
|
[113] |
United Nations Environment Programme (2007). Sudan post-conflict environmental assessment. http://postconflict.unep.ch/publications/sudan/00_fwd.pdf, 2018–9–15
|
[114] |
United Nations Framework Convention on Climate Change (2014). Report of the conference of the parties on its twentieth session, held in Lima from 1 to 14 December 2014. http://unfccc.int/resource/docs/2014/cop20/eng/10.pdf, 2018–9–15
|
[115] |
U.S. Department of State (2016). Chapter 3: State sponsors of terrorism overview. In: Country Reports on Terrorism 2016, https://www.state.gov/j/ct/rls/crt/2016/272235.htm, 2018–9–18
|
[116] |
Victor D G (2008). On the regulation of geoengineering. Oxford Review of Economic Policy, 24(2): 322–336
CrossRef
Google scholar
|
[117] |
Ward D, Morris S (2006). Jail for animal rights extremists who stole body of elderly woman from her grave. The Guardian, https://www.theguardian.com/uk/2006/may/ 12/animalwelfare.topstories3, 2018–3–09
|
[118] |
Weitzman M L (2015). A voting architecture for the governance of free-driver externalities, with application to geoengineering. Scandinavian Journal of Economics, 117(4): 1049–1068
CrossRef
Google scholar
|
[119] |
Whyte K P (2012). Now this! Indigenous sovereignty, political obliviousness and governance models for SRM research. Ethics, Policy & Environment, 15(2): 172–187
CrossRef
Google scholar
|
[120] |
Wilson L (2010). Fifteen years since live exports divided Brightlingsea. BBC News, http://news.bbc.co.uk/local/essex/hi/people_and_places/history/newsid_8506000/8506735.stm, 2016–5–15
|
[121] |
Winterman D (2011). SAS War Diary: the SAS secret hidden since World War II. BBC News, https://www.bbc.com/news/magazine-14952939, 2016–2–05
|
[122] |
Yang P, Yao Y, Mi Z, Cao Y, Liao H, Yu B, Liang Q, Coffman D, Wei Y (2018). Social cost of carbon under shared socioeconomic pathways. Global Environmental Change, 53: 225–232
CrossRef
Google scholar
|
[123] |
Yusoff K (2013). The geoengine: Geoengineering and the geopolitics of planetary modification. Environment & Planning A, 45(12): 2799–2808
CrossRef
Google scholar
|
[124] |
Zetter K (2014). Hacker lexicon: what is an air gap? Wired.com, https://www.wired.com/2014/12/hacker-lexicon-air-gap/, 2018–9–18
|
[125] |
Zhang D D, Brecke P, Lee H F, He Y Q, Zhang J (2007). Global climate change, war, and population decline in recent human history. Proceedings of the National Academy of Sciences of the United States of America, 104(49): 19214–19219
CrossRef
Google scholar
|
/
〈 | 〉 |