Security of solar radiation management geoengineering

Andrew LOCKLEY

Front. Eng ›› 2019, Vol. 6 ›› Issue (1) : 102 -116.

PDF (205KB)
Front. Eng ›› 2019, Vol. 6 ›› Issue (1) : 102 -116. DOI: 10.1007/s42524-019-0008-5
RESEARCH ARTICLE
RESEARCH ARTICLE

Security of solar radiation management geoengineering

Author information +
History +
PDF (205KB)

Abstract

Solar Radiation Management (SRM) geoengineering is a proposed response to anthropogenic global warming (AGW) (National Academy of Sciences, 2015). There may be profound – even violent – disagreement on preferred temperature. SRM disruption risks dangerous temperature rise (termination shock). Concentrating on aircraft-delivered Stratospheric Aerosol Injection (SAI), we appraise threats to SRM and defense methodologies. Civil protest and minor cyberattacks are almost inevitable but are manageable (unless state-sponsored). Overt military attacks are more disruptive, but unlikely – although superpowers’ symbolic overt attacks may deter SRM. Unattributable attacks are likely, and mandate use of widely-available weapons. Risks from unsophisticated weapons are therefore higher. An extended supply chain is more vulnerable than a secure airbase – necessitating supply-chain hardening. Recommendations to improve SRM resilience include heterogeneous operations from diverse, secure, well-stocked bases (possibly ocean islands or aircraft carriers); and avoidance of single-point-of-failure risks (e.g. balloons). A distributed, civilian-operated system offers an alternative strategy. A multilateral, consensual SRM approach reduces likely attack triggers.

Keywords

security / geoengineering / solar radiation ma-nagement / SRM

Cite this article

Download citation ▾
Andrew LOCKLEY. Security of solar radiation management geoengineering. Front. Eng, 2019, 6(1): 102-116 DOI:10.1007/s42524-019-0008-5

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

ADL (2016). Ecoterrorism: Extremism in the animal rights and environmentalist movements.2016–5–15

[2]

AFB (2015). The ever-evolving cyber threat to planes. Security Week,2016–2–05

[3]

Army U S (2014). Field Manual FM 3–09 Field Artillery Operations and Fire Support. United Sates Government. Washington DC: Department of the Army

[4]

Arquilla J (1999). Can information warfare ever be just? Ethics and Information Technology, 1(3): 203–212

[5]

Bakalaki A (2016). Chemtrails, crisis, and loss in an interconnected world. Visual Anthropology Review, 32(1): 12–23

[6]

Barker D W M (2013). Oligarchy or elite democracy? Aristotle and modern representative government. New Political Science, 4: 547–566

[7]

Baum M A (2013). The Iraq coalition of the willing and (politically) able: Party systems, the press, and public influence on foreign policy. American Journal of Political Science, 57(2): 442–458

[8]

BBC (2008). On this day- April 1, 1983: Human chain links nuclear sites.2016–2–05

[9]

BBC News (2000). Animal rights, terror tactics.2016–15–05

[10]

BBC News (2007). Estonia hit by 'Moscow Cyber War’.2016–2–05

[11]

Bichou K, Bell M, Evans A (2013). Risk Management in Port Operations, Logistics and Supply Chain Security. New York: CRC Press

[12]

Bichou K, Szyliowicz J S, Zamparini L (2014). Maritime Transport Security: Issues, Challenges and National Policies. Cheltenham and Massachusetts: Edward Elgar Publishing

[13]

Biography.com Editors (2014). Anders Behring Breivik biography. A&E Television Networks,2016–15–05

[14]

Biography.com Editors (2017). Ted Kaczynski biography. A&E Television Networks,2016–15–05

[15]

Cairns R (2016). Climates of suspicion: ‘Chemtrail’ conspiracy narratives and the international politics of geoengineering. Geographical Journal, 182(1): 70–84

[16]

Caselli F, Morelli M, Rohner D (2015). The geography of interstate resource wars. Quarterly Journal of Economics, 130(1): 267–315

[17]

Christiansen S M (2016). Climate Conflicts – A Case of International Environmental and Humanitarian Law. Cham: Springer

[18]

Clarke R A (2010). Cyber War: The Next Threat to National Security and What to Do About It. New York: HarperCollins

[19]

Climate Geoengineering Governance (CGG) (2016). What are the security implications of solar geoengineering?2018–9–15

[20]

Crile G (2007). Charlie Wilson’s War: The Extraordinary Story of the Largest Covert Operation in History. New York: Grove Atlantic

[21]

Dalby S (2015). Geoengineering: The next era of geopolitics? Geography Compass, 9(4): 190–201

[22]

Daugherty W J (2010). Covert action: Strengths and weaknesses. In: Johnson L K, eds. The Oxford Handbook of National Security Intelligence. Oxford: Oxford University Press

[23]

Downes A B, Lilley M L (2010). Overt peace, covert war? Covert intervention and the democratic peace. Security Studies, 19(2): 266–306

[24]

Dunnigan J F (2003). How to Make War. New York: HarperCollins

[25]

Evans R (2015). Lisa Jones, girlfriend of undercover policeman Mark Kennedy: ‘I thought I knew him better than anyone’. The Guardian,2016–2–05

[26]

Fenster M (2014). The implausibility of secrecy. Hastings Law Journal, 65(2): 309–360

[27]

Fleming J R (2012). Will geoengineering bring security and peace? What does history tell us? Sicherheit und Frieden/Security and Peace, 30(4): 200–204

[28]

Geoengineering Monitor (2017). Resistance to geoengineering: A timeline, 2018–18–09

[29]

Gleick P (2014). Water, drought, climate change, and conflict in Syria. Weather, Climate, and Society, 6(3): 331–340

[30]

Greene A (2017). Defining terrorism: One size fits all? International and Comparative Law Quarterly, 66(2): 411–440

[31]

Hall A R, Coyne C J (2013). The militarization of U.S. domestic policing. The Independent Review, 17(4): 485–504

[32]

Highways England (1998). A34 Newbury Bypass Opens. Highways England Press Release, NB 348/98, 2016–15–05

[33]

Horton J B, Reynolds J L (2016). The international politics of climate engineering: A review and prospectus for international relations. International Studies Review, 18(3): 438–461

[34]

Hough M, Jackson J, Bradford B (2013). Legitimacy, trust and compliance: An empirical test of procedural justice theory using the European social survey. In: Tankebe J, Liebling A, eds. Legitimacy and Criminal Justice: An International Exploration. Oxford: Oxford University Press

[35]

Hsiang S M, Burke E, Miguel E (2013). Quantifying the influence of climate on human conflict. Science, 341(6151): 1235367

[36]

Instrumentation.co.za (2007). Resist cyber attack: Securing integrated SCADA systems. South African Instrumentation & Control.2016–2–05

[37]

Intergovernmental Panel on Climate Change (2013). Summary for Policymakers. In: Stocker T F, Qin D, Plattner G K, Tignor M, Allen S K, Boschung J, Nauels A, Xia Y, Bex V, Midgley P M, eds. Climate Change 2013: The Physical Science Basis. Contribution of Working Group I to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge and New York: Cambridge University Press

[38]

Intergovernmental Panel on Climate Change (2018). Global Warming of 1.5°C. In: Masson-Delmotte V, Zhai P, Pörtner H O, Roberts D, Skea J, Shukla P R, Pirani A, Moufouma-Okia W, Péan C, Pidcock R, Connors S, Matthews J B R, Chen Y, Zhou X, Gomis M I, Lonnoy E, Maycock T, Tignor M, Waterfield T, eds. An IPCC special report on the impacts of global warming of 1.5°C above pre-industrial levels and related global greenhouse gas emission pathways, in the context of strengthening the global response to the threat of climate change, sustainable development, and efforts to eradicate poverty

[39]

Irvine P (2015). Initial climate response to a termination shock. EGU General Assembly Conference Abstracts, 17

[40]

Johns R, Davies F A M (2014). Coalitions of the willing? International backing and British public support for military action. Journal of Peace Research, 51(6): 767–781

[41]

Kahler M (1992). Multilateralism with small and large numbers. International Organization, 46(3): 681

[42]

Keegan J (2003). Intelligence in War. New York: Knopf

[43]

Kelley M (2013). The Stuxnet attack on Iran’s nuclear plant was ‘far more dangerous’ than previously thought. Business Insider, 2016–2–05

[44]

Kibbe J D (2007). Covert action and the Pentagon. Intelligence and National Security, 22(1): 57–74

[45]

Kibbe J D (2012). Conducting shadow wars. Journal of National Security. Law & Policy, 5(2): 373–392

[46]

Kidron B (2013). The women of Greenham Common taught a generation how to protest. The Guardian,2016–3–05

[47]

Kiruthika Devi B S, Subbulakshmi T (2016). A comparative analysis of security methods for DDoS attacks in the cloud computing environment. Indian Journal of Science and Technology, 9(34)

[48]

Kleinschmitt C, Boucher O, Platt U (2018). Sensitivity of the radiative forcing by stratospheric sulfur geoengineering to the amount and strategy of the SO2 injection studied with the LMDZ-S3A model. Atmospheric Chemistry and Physics, 18(4): 2769–2786

[49]

Kohnke A, Shoemaker D, Sigler K E (2016). The Complete Guide to Cybersecurity Risks and Controls. Florida: CRC Press

[50]

Kornneef J, Can Breevoort P, Hendricks C, Hoogwijk M, Koops K, Koper M (2011). Potential for biomass and carbon dioxide capture and storage. International Journal of Greenhouse Gas Control, 11(2012): 117–132

[51]

Kravitz B, MacMartin D, Mills M, Richter J, Tilmes S, Lamarque J, Tribbia J, Vitt F (2017). First simulations of designing stratospheric sulfate aerosol geoengineering to meet multiple simultaneous climate objectives. Journal of Geophysical Research, D, Atmospheres, 122(23): 12616–12634

[52]

Kuypers J, Young M, Launer M (1994). Of mighty mice and meek men: Contextual reconstruction of the Iranian airbus shootdown. Southern Journal of Communication, 59(4): 294–306

[53]

Laakso A, Partanen A I, Kokkola H, Laaksonen A, Lehtinen K E J, Korhonen H (2012). Stratospheric passenger flights are likely an inefficient geoengineering strategy. Environmental Research Letters, 7(3): 034021

[54]

Lam J S L, Dai J (2015). Developing supply chain security design of logistics service providers: An analytical network process-quality function deployment approach. International Journal of Physical Distribution & Logistics Management, 45(7): 674–690

[55]

Lancaster L, Mulaudzi G (2016). You only listen when I’m violent. Institute for Security Studies,2018–3–09

[56]

Lewis S (2016). The dirty secret of the Paris climate deal. Foreign Policy,2016–3–13

[57]

Link P M, Brzoska M, Maas A, Neuneck G, Scheffran J (2013). Possible implications of climate engineering for peace and security. Bulletin of the American Meteorological Society, 94(2): ES13–ES16

[58]

Liu Y, Huang H Z, Wang Z, Li Y, Yang Y (2013). A Joint redundancy and imperfect maintenance strategy optimization for multi-state systems. IEEE Transactions on Reliability, 62(2): 368–378

[59]

Lockley A (2016a). Licence to chill: Building a legitimate authorisation process for commercial SRM operations. Environmental Law Review, 18(1): 25–40

[60]

Lockley A (2016b). Geoengineering: A war on climate change? Journal of Evolution and Technology / WTA, 26(1): 26–49

[61]

Lomax G, Workman M, Lenton T, Shah N (2015). Reframing the Policy Approach to Greenhouse Gas Removal Technologies. Energy Policy, 78: 125–136

[62]

Lyons D J (2014). The impact of inventory leanness and slack resources on supply chain resilience: An empirical study. Georgia State University,2018–9–26

[63]

Maas A, Bodó B, Comardicea I, Roffey R (2013). Global Environmental Change: New Drivers for Resistance, Crime and Terrorism? Baden-Baden: Nomos

[64]

Maas A, Scheffran J (2012). Climate conflicts 2.0? Climate engineering as a challenge for international peace and security. Sicherheit und Frieden / Security and Peace, 30(4): 193–200

[65]

Macaulay T, Singer B L (2011). Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS. New York: CRC Press

[66]

MacMartin D, Caldeira K, Keith D (2014). Solar geoengineering to limit the rate of temperature change. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 372(2031): 20140134

[67]

Manadhata P, Wing J (2004). Measuring a system’s attack surface. Carnegie Mellon University, School of Computer Science,2018–3–09

[68]

Marsh L L C (2018). Marsh & McLennan Companies.2018–9–18

[69]

Maystadt J F, Ecker O (2014). Extreme weather and civil war: Does drought fuel conflict in Somalia through livestock price shocks? American Journal of Agricultural Economics, 96(4): 1157–1182

[70]

McClellan J, Keith D W, Apt J (2012). Cost analysis of stratospheric albedo modification delivery systems. Environmental Research Letters, 7(3): 034019

[71]

McCusker K E, Armour K C, Bitz C M, Battisti D S (2014). Rapid and extensive warming following cessation of solar radiation management. Environmental Research Letters, 9(2): 024005

[72]

Mian Z (2016). Kashmir, climate change, and nuclear war. Bulletin of the Atomic Scientists.2017–7–10

[73]

Millar S (2003). Heathrow a soft target for missile attack. The Guardian,2016–2–05

[74]

Miller N (2016). Malaysia airlines flight MH17 was shot down from pro-Russian rebel controlled territory, investigation finds. Sydney Morning Herald

[75]

Moore D M, Antill P D (2011). The use of contractors on deployed operations (CONDO) in the age of austerity. RUSI Defence Systems, 14: 32–34

[76]

Morrow D R (2014). Why geoengineering is a public good, even if it is bad. Climatic Change, 123(2): 95–100

[77]

New Line Cinema (1997–2002). Austin Powers franchise

[78]

Nightingale P, Cairns R (2014). The security implications of geoengineering: Blame, imposed agreement and the security of critical infrastructure. Climate Geoengineering Governance Working Paper Series: 018,

[79]

Norman J (2011). Iran shows intact drone, boasts of cyberattack. CBS News, 2016–5–15

[80]

O’Shaughnessy H (1996). £1.5M hawk attack women freed. The Independent,2018–03–09

[81]

Organisation for the Prohibition of Chemical Weapons (2016). Destruction of declared Syrian chemical weapons completed. Destruction of Syrian chemical weapons completed, 2016–2–05

[82]

Pantucci R, Ellis C, Chaplai L (2015). Countering lone-actor terrorism series no. 1: Lone act literature review. Royal United Services Institute for Defence and Security Studies,

[83]

Prunckun H (2012). Counterintelligence Theory and Practice. Plymouth UK: Rowman & Littlefield

[84]

Quodling A (2015). Doxxing, swatting and the new trends in online harassment. The Conversation,2016–2–05

[85]

Raza A (2016). 8 most awesome hacks conducted by Anonymous hackers. HackRead,2016–2–05

[86]

Ricke K L, Moreno-Cruz J B, Caldeira K (2013). Strategic incentives for climate geoengineering coalitions to exclude broad participation. Environmental Research Letters, 8(1): 014021

[87]

Ricke K L, Morgan M G, Allen M R (2010). Regional climate response to solar-radiation management. Nature Geoscience, 3(8): 537–541

[88]

Robock A (2015). Cloud control: Climatologist Alan Robock on the effects of geoengineering and nuclear war. Bulletin of the Atomic Scientists, 71(3): 1–7

[89]

Robock A, Marquardt A, Kravitz B, Stenchikov G (2009). Benefits, risks, and costs of stratospheric geoengineering. Geophysical Research Letters, 36(19): L19703

[90]

Sawer P (2015). Andreas Lubitz: Everything we know about Germanwings plane crash co-pilot. The Telegraph,2016–2–05

[91]

Sayne A (2011). Climate change adaptation and conflict in Nigeria. United States Institute of Peace.

[92]

Scheffran J (2015). Climate change as a risk multiplier in a world of complex crises. Planetary security conference, The Hague,

[93]

Scheffran J, Burroughs J, Leidreiter A, Van Riet R, Ware A (2016). The climate-nuclear nexus: Exploring the linkages between climate change and nuclear threats. World Future Council,2018–18–09

[94]

Scheffran J, Cannaday T (2013). Resistance to climate change policies: The conflict potential of non-fossil energy paths and climate engineering. In: Maas A, Bodó B, Burnley C, Comardicea I, Roffey, R, eds. Global Environmental Change. Auflage: Nomos, 261–292

[95]

Schlembach R (2011). How do radical climate movements negotiate their environmental and their social agendas? A study of debates within the Camp for Climate Action (UK). Critical Social Policy, 31(2): 194–215

[96]

Schlosser E (2015). Nuns and nuclear security. The New Yorker,2016–2–05

[97]

Schock K (2013). The practice and study of civil resistance. Journal of Peace Research, 50(3): 277–290

[98]

Selby J, Dahi O S, Fröhlich C, Hulme M (2017). Climate change and the Syrian civil war revisited. Political Geography, 60: 232–244

[99]

Serck L (2016). Did the Newbury bypass tree-huggers change anything? BBC News,2016–2–05

[100]

Sheikh A, Guled A (2009). U.S. Navy rescues captain, kills Somali pirates. Reuters, 2016–2–05

[101]

Shepherd J G (2009). Geoengineering the Climate: Science, Governance and Uncertainty. London: The Royal Society

[102]

Shevchenko V (2014). “Little Green Men” or “Russian Invaders”? BBC News,2016–2–05

[103]

Singer P (2015). Stuxnet and its hidden lessons on the ethics of cyberweapons. Case Western Reserve Journal of International Law, 47(1): 79–86, 2018–9–15

[104]

Smith G (2015). The day the troop trains came to Berkeley (first person). The Berkeley Daily Planet,2016–5–15

[105]

Staff T (2015). Eilat-bound jets get anti-missile defense pods. The Times of Israel,2016–2–05

[106]

Stern N (2006). Executive summary. In: Stern N, eds. Stern Review: The Economics of Climate Change. Cambridge: Cambridge University Press

[107]

Stratospheric Particle Injection for Climate Engineering (2018). The Spice Project, 2018–9–15

[108]

Sweet K M (2009). Aviation and Airport Security: Terrorism and Safety Concerns. New York: CRC Press

[109]

The CNA Corporation (2007). National security and the threat of climate change.2018–9–18

[110]

The World Bank (2015). Political stability- country rankings. The Global Economy,2018–9–18

[111]

Thomas D G (1999). The Recognition of States: Law and Practice in Debate and Evolution. Westport, Connecticut: Praeger

[112]

Ugorji B (2017). Combating terrorism: A literature review. International Center for Ethno-Religious Mediation,2018–9–18

[113]

United Nations Environment Programme (2007). Sudan post-conflict environmental assessment. 2018–9–15

[114]

United Nations Framework Convention on Climate Change (2014). Report of the conference of the parties on its twentieth session, held in Lima from 1 to 14 December 2014.2018–9–15

[115]

U.S. Department of State (2016). Chapter 3: State sponsors of terrorism overview. In: Country Reports on Terrorism 2016,2018–9–18

[116]

Victor D G (2008). On the regulation of geoengineering. Oxford Review of Economic Policy, 24(2): 322–336

[117]

Ward D, Morris S (2006). Jail for animal rights extremists who stole body of elderly woman from her grave. The Guardian, 2018–3–09

[118]

Weitzman M L (2015). A voting architecture for the governance of free-driver externalities, with application to geoengineering. Scandinavian Journal of Economics, 117(4): 1049–1068

[119]

Whyte K P (2012). Now this! Indigenous sovereignty, political obliviousness and governance models for SRM research. Ethics, Policy & Environment, 15(2): 172–187

[120]

Wilson L (2010). Fifteen years since live exports divided Brightlingsea. BBC News,2016–5–15

[121]

Winterman D (2011). SAS War Diary: the SAS secret hidden since World War II. BBC News,2016–2–05

[122]

Yang P, Yao Y, Mi Z, Cao Y, Liao H, Yu B, Liang Q, Coffman D, Wei Y (2018). Social cost of carbon under shared socioeconomic pathways. Global Environmental Change, 53: 225–232

[123]

Yusoff K (2013). The geoengine: Geoengineering and the geopolitics of planetary modification. Environment & Planning A, 45(12): 2799–2808

[124]

Zetter K (2014). Hacker lexicon: what is an air gap? Wired.com,2018–9–18

[125]

Zhang D D, Brecke P, Lee H F, He Y Q, Zhang J (2007). Global climate change, war, and population decline in recent human history. Proceedings of the National Academy of Sciences of the United States of America, 104(49): 19214–19219

RIGHTS & PERMISSIONS

The Author(s) 2019. This article is published with open access at link.springer.com and journal.hep.com.cn

AI Summary AI Mindmap
PDF (205KB)

3418

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/