1 |
ADL (2016). Ecoterrorism: Extremism in the animal rights and environmentalist movements., 2016–5–15
|
2 |
AFB (2015). The ever-evolving cyber threat to planes. Security Week,, 2016–2–05
|
3 |
U SArmy (2014). Field Manual FM 3–09 Field Artillery Operations and Fire Support. United Sates Government. Washington DC: Department of the Army
|
4 |
JArquilla (1999). Can information warfare ever be just? Ethics and Information Technology, 1(3): 203–212
https://doi.org/10.1023/A:1010066528521
|
5 |
ABakalaki (2016). Chemtrails, crisis, and loss in an interconnected world. Visual Anthropology Review, 32(1): 12–23
https://doi.org/10.1111/var.12089
|
6 |
D W MBarker (2013). Oligarchy or elite democracy? Aristotle and modern representative government. New Political Science, 4: 547–566
https://doi.org/10.1080%2F07393148.2013.848701
|
7 |
M ABaum (2013). The Iraq coalition of the willing and (politically) able: Party systems, the press, and public influence on foreign policy. American Journal of Political Science, 57(2): 442–458
https://doi.org/10.1111/j.1540-5907.2012.00627.x
|
8 |
BBC (2008). On this day- April 1, 1983: Human chain links nuclear sites., 2016–2–05
|
9 |
BBC News (2000). Animal rights, terror tactics., 2016–15–05
|
10 |
BBC News (2007). Estonia hit by 'Moscow Cyber War’., 2016–2–05
|
11 |
KBichou, M Bell, AEvans (2013). Risk Management in Port Operations, Logistics and Supply Chain Security. New York: CRC Press
|
12 |
KBichou, J S Szyliowicz, L Zamparini (2014). Maritime Transport Security: Issues, Challenges and National Policies. Cheltenham and Massachusetts: Edward Elgar Publishing
|
13 |
Biography.com Editors (2014). Anders Behring Breivik biography. A&E Television Networks,, 2016–15–05
|
14 |
Biography.com Editors (2017). Ted Kaczynski biography. A&E Television Networks,, 2016–15–05
|
15 |
RCairns (2016). Climates of suspicion: ‘Chemtrail’ conspiracy narratives and the international politics of geoengineering. Geographical Journal, 182(1): 70–84
https://doi.org/10.1111/geoj.12116
|
16 |
FCaselli, M Morelli, DRohner (2015). The geography of interstate resource wars. Quarterly Journal of Economics, 130(1): 267–315
https://doi.org/10.1093/qje/qju038
|
17 |
S MChristiansen (2016). Climate Conflicts – A Case of International Environmental and Humanitarian Law. Cham: Springer
|
18 |
R AClarke (2010). Cyber War: The Next Threat to National Security and What to Do About It. New York: HarperCollins
|
19 |
Climate Geoengineering Governance (CGG) (2016). What are the security implications of solar geoengineering?, 2018–9–15
|
20 |
GCrile (2007). Charlie Wilson’s War: The Extraordinary Story of the Largest Covert Operation in History. New York: Grove Atlantic
|
21 |
SDalby (2015). Geoengineering: The next era of geopolitics? Geography Compass, 9(4): 190–201
https://doi.org/10.1111/gec3.12195
|
22 |
W JDaugherty (2010). Covert action: Strengths and weaknesses. In: Johnson L K, eds. The Oxford Handbook of National Security Intelligence. Oxford: Oxford University Press
https://doi.org/0.1093/oxfordhb/ 9780195375886.003.0037
|
23 |
A BDownes, M L Lilley (2010). Overt peace, covert war? Covert intervention and the democratic peace. Security Studies, 19(2): 266–306
https://doi.org/10.1080/09636411003795756
|
24 |
J FDunnigan (2003). How to Make War. New York: HarperCollins
|
25 |
REvans (2015). Lisa Jones, girlfriend of undercover policeman Mark Kennedy: ‘I thought I knew him better than anyone’. The Guardian,, 2016–2–05
|
26 |
MFenster (2014). The implausibility of secrecy. Hastings Law Journal, 65(2): 309–360
|
27 |
J RFleming (2012). Will geoengineering bring security and peace? What does history tell us? Sicherheit und Frieden/Security and Peace, 30(4): 200–204
|
28 |
Geoengineering Monitor (2017). Resistance to geoengineering: A timeline, , 2018–18–09
|
29 |
PGleick (2014). Water, drought, climate change, and conflict in Syria. Weather, Climate, and Society, 6(3): 331–340
https://doi.org/10.1175/WCAS-D-13-00059.1
|
30 |
AGreene (2017). Defining terrorism: One size fits all? International and Comparative Law Quarterly, 66(2): 411–440
https://doi.org/10.1017/S0020589317000070
|
31 |
A RHall, C J Coyne (2013). The militarization of U.S. domestic policing. The Independent Review, 17(4): 485–504
|
32 |
Highways England (1998). A34 Newbury Bypass Opens. Highways England Press Release, NB 348/98, 2016–15–05
|
33 |
J BHorton, J L Reynolds (2016). The international politics of climate engineering: A review and prospectus for international relations. International Studies Review, 18(3): 438–461
https://doi.org/10.1093/isr/viv013
|
34 |
MHough, J Jackson, BBradford (2013). Legitimacy, trust and compliance: An empirical test of procedural justice theory using the European social survey. In: Tankebe J, Liebling A, eds. Legitimacy and Criminal Justice: An International Exploration. Oxford: Oxford University Press
|
35 |
S MHsiang, E Burke, EMiguel (2013). Quantifying the influence of climate on human conflict. Science, 341(6151): 1235367
https://doi.org/10.1126/science.1235367
|
36 |
Instrumentation.co.za (2007). Resist cyber attack: Securing integrated SCADA systems. South African Instrumentation & Control., 2016–2–05
|
37 |
Intergovernmental Panel on Climate Change (2013). Summary for Policymakers. In: Stocker T F, Qin D, Plattner G K, Tignor M, Allen S K, Boschung J, Nauels A, Xia Y, Bex V, Midgley P M, eds. Climate Change 2013: The Physical Science Basis. Contribution of Working Group I to the Fifth Assessment Report of the Intergovernmental Panel on Climate Change. Cambridge and New York: Cambridge University Press
|
38 |
Intergovernmental Panel on Climate Change (2018). Global Warming of 1.5°C. In: Masson-Delmotte V, Zhai P, Pörtner H O, Roberts D, Skea J, Shukla P R, Pirani A, Moufouma-Okia W, Péan C, Pidcock R, Connors S, Matthews J B R, Chen Y, Zhou X, Gomis M I, Lonnoy E, Maycock T, Tignor M, Waterfield T, eds. An IPCC special report on the impacts of global warming of 1.5°C above pre-industrial levels and related global greenhouse gas emission pathways, in the context of strengthening the global response to the threat of climate change, sustainable development, and efforts to eradicate poverty
|
39 |
PIrvine (2015). Initial climate response to a termination shock. EGU General Assembly Conference Abstracts, 17
|
40 |
RJohns, F A M Davies (2014). Coalitions of the willing? International backing and British public support for military action. Journal of Peace Research, 51(6): 767–781
https://doi.org/10.1177/0022343314544779
|
41 |
MKahler (1992). Multilateralism with small and large numbers. International Organization, 46(3): 681
https://doi.org/10.1017/S0020818300027867
|
42 |
JKeegan (2003). Intelligence in War. New York: Knopf
|
43 |
MKelley (2013). The Stuxnet attack on Iran’s nuclear plant was ‘far more dangerous’ than previously thought. Business Insider, , 2016–2–05
|
44 |
J DKibbe (2007). Covert action and the Pentagon. Intelligence and National Security, 22(1): 57–74
https://doi.org/10.1080/02684520701200806
|
45 |
J DKibbe (2012). Conducting shadow wars. Journal of National Security. Law & Policy, 5(2): 373–392
|
46 |
BKidron (2013). The women of Greenham Common taught a generation how to protest. The Guardian,, 2016–3–05
|
47 |
B SKiruthika Devi, TSubbulakshmi (2016). A comparative analysis of security methods for DDoS attacks in the cloud computing environment. Indian Journal of Science and Technology, 9(34)
https://doi.org/10.17485/ijst/2016/v9i34/93175
|
48 |
CKleinschmitt, O Boucher, UPlatt (2018). Sensitivity of the radiative forcing by stratospheric sulfur geoengineering to the amount and strategy of the SO2 injection studied with the LMDZ-S3A model. Atmospheric Chemistry and Physics, 18(4): 2769–2786
https://doi.org/10.5194/acp-18-2769-2018
|
49 |
AKohnke, D Shoemaker, K ESigler (2016). The Complete Guide to Cybersecurity Risks and Controls. Florida: CRC Press
|
50 |
JKornneef, P Can Breevoort, CHendricks, MHoogwijk, KKoops, MKoper (2011). Potential for biomass and carbon dioxide capture and storage. International Journal of Greenhouse Gas Control, 11(2012): 117–132
|
51 |
BKravitz, D MacMartin, MMills, JRichter, STilmes, JLamarque, JTribbia, FVitt (2017). First simulations of designing stratospheric sulfate aerosol geoengineering to meet multiple simultaneous climate objectives. Journal of Geophysical Research, D, Atmospheres, 122(23): 12616–12634
https://doi.org/10.1002/2017JD026874
|
52 |
JKuypers, M Young, MLauner (1994). Of mighty mice and meek men: Contextual reconstruction of the Iranian airbus shootdown. Southern Journal of Communication, 59(4): 294–306
https://doi.org/10.1080/10417949409372949
|
53 |
ALaakso, A I Partanen, H Kokkola, ALaaksonen, K E JLehtinen, HKorhonen (2012). Stratospheric passenger flights are likely an inefficient geoengineering strategy. Environmental Research Letters, 7(3): 034021
https://doi.org/10.1088/1748-9326/7/3/034021
|
54 |
J S LLam, JDai (2015). Developing supply chain security design of logistics service providers: An analytical network process-quality function deployment approach. International Journal of Physical Distribution & Logistics Management, 45(7): 674–690
https://doi.org/10.1108/IJPDLM-12-2013-0293
|
55 |
LLancaster, G Mulaudzi (2016). You only listen when I’m violent. Institute for Security Studies,, 2018–3–09
|
56 |
SLewis (2016). The dirty secret of the Paris climate deal. Foreign Policy,, 2016–3–13
|
57 |
P MLink, M Brzoska, AMaas, GNeuneck, JScheffran (2013). Possible implications of climate engineering for peace and security. Bulletin of the American Meteorological Society, 94(2): ES13–ES16
https://doi.org/10.1175/BAMS-D-12-00022.1
|
58 |
YLiu, H Z Huang, Z Wang, YLi, YYang (2013). A Joint redundancy and imperfect maintenance strategy optimization for multi-state systems. IEEE Transactions on Reliability, 62(2): 368–378
https://doi.org/10.1109/TR.2013.2259193
|
59 |
ALockley (2016a). Licence to chill: Building a legitimate authorisation process for commercial SRM operations. Environmental Law Review, 18(1): 25–40
https://doi.org/10.1177/1461452916630082
|
60 |
ALockley (2016b). Geoengineering: A war on climate change? Journal of Evolution and Technology / WTA, 26(1): 26–49
|
61 |
GLomax, M Workman, TLenton, NShah (2015). Reframing the Policy Approach to Greenhouse Gas Removal Technologies. Energy Policy, 78: 125–136
https://doi.org/10.1016/j.enpol.2014.10.002
|
62 |
D JLyons (2014). The impact of inventory leanness and slack resources on supply chain resilience: An empirical study. Georgia State University,, 2018–9–26
|
63 |
AMaas, B Bodó, IComardicea, RRoffey (2013). Global Environmental Change: New Drivers for Resistance, Crime and Terrorism? Baden-Baden: Nomos
|
64 |
AMaas, J Scheffran (2012). Climate conflicts 2.0? Climate engineering as a challenge for international peace and security. Sicherheit und Frieden / Security and Peace, 30(4): 193–200
|
65 |
TMacaulay, B L Singer (2011). Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS. New York: CRC Press
|
66 |
DMacMartin, K Caldeira, DKeith (2014). Solar geoengineering to limit the rate of temperature change. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences, 372(2031): 20140134
https://doi.org/10.1098/rsta.2014.0134
|
67 |
PManadhata, J Wing (2004). Measuring a system’s attack surface. Carnegie Mellon University, School of Computer Science,, 2018–3–09
|
68 |
L L CMarsh (2018). Marsh & McLennan Companies., 2018–9–18
|
69 |
J FMaystadt, O Ecker (2014). Extreme weather and civil war: Does drought fuel conflict in Somalia through livestock price shocks? American Journal of Agricultural Economics, 96(4): 1157–1182
https://doi.org/10.1093/ajae/aau010
|
70 |
JMcClellan, D W Keith, J Apt (2012). Cost analysis of stratospheric albedo modification delivery systems. Environmental Research Letters, 7(3): 034019
https://doi.org/10.1088/1748-9326/7/3/034019
|
71 |
K EMcCusker, K C Armour, C M Bitz, D S Battisti (2014). Rapid and extensive warming following cessation of solar radiation management. Environmental Research Letters, 9(2): 024005
https://doi.org/10.1088/1748-9326/9/2/024005
|
72 |
ZMian (2016). Kashmir, climate change, and nuclear war. Bulletin of the Atomic Scientists., 2017–7–10
|
73 |
SMillar (2003). Heathrow a soft target for missile attack. The Guardian,, 2016–2–05
|
74 |
NMiller (2016). Malaysia airlines flight MH17 was shot down from pro-Russian rebel controlled territory, investigation finds. Sydney Morning Herald
|
75 |
D MMoore, P D Antill (2011). The use of contractors on deployed operations (CONDO) in the age of austerity. RUSI Defence Systems, 14: 32–34
|
76 |
D RMorrow (2014). Why geoengineering is a public good, even if it is bad. Climatic Change, 123(2): 95–100
https://doi.org/10.1007/s10584-013-0967-1
|
77 |
New Line Cinema (1997–2002). Austin Powers franchise
|
78 |
PNightingale, R Cairns (2014). The security implications of geoengineering: Blame, imposed agreement and the security of critical infrastructure. Climate Geoengineering Governance Working Paper Series: 018,
|
79 |
JNorman (2011). Iran shows intact drone, boasts of cyberattack. CBS News, , 2016–5–15
|
80 |
HO’Shaughnessy (1996). £1.5M hawk attack women freed. The Independent,, 2018–03–09
|
81 |
Organisation for the Prohibition of Chemical Weapons (2016). Destruction of declared Syrian chemical weapons completed. Destruction of Syrian chemical weapons completed, 2016–2–05
|
82 |
RPantucci, C Ellis, LChaplai (2015). Countering lone-actor terrorism series no. 1: Lone act literature review. Royal United Services Institute for Defence and Security Studies,
|
83 |
HPrunckun (2012). Counterintelligence Theory and Practice. Plymouth UK: Rowman & Littlefield
|
84 |
AQuodling (2015). Doxxing, swatting and the new trends in online harassment. The Conversation,, 2016–2–05
|
85 |
ARaza (2016). 8 most awesome hacks conducted by Anonymous hackers. HackRead,, 2016–2–05
|
86 |
K LRicke, J B Moreno-Cruz, K Caldeira (2013). Strategic incentives for climate geoengineering coalitions to exclude broad participation. Environmental Research Letters, 8(1): 014021
https://doi.org/10.1088/1748-9326/8/1/014021
|
87 |
K LRicke, M G Morgan, M R Allen (2010). Regional climate response to solar-radiation management. Nature Geoscience, 3(8): 537–541
https://doi.org/10.1038/ngeo915
|
88 |
ARobock (2015). Cloud control: Climatologist Alan Robock on the effects of geoengineering and nuclear war. Bulletin of the Atomic Scientists, 71(3): 1–7
https://doi.org/10.1177/0096340215581353
|
89 |
ARobock, A Marquardt, BKravitz, GStenchikov (2009). Benefits, risks, and costs of stratospheric geoengineering. Geophysical Research Letters, 36(19): L19703
https://doi.org/10.1029/2009GL039209
|
90 |
PSawer (2015). Andreas Lubitz: Everything we know about Germanwings plane crash co-pilot. The Telegraph,, 2016–2–05
|
91 |
ASayne (2011). Climate change adaptation and conflict in Nigeria. United States Institute of Peace.
|
92 |
JScheffran (2015). Climate change as a risk multiplier in a world of complex crises. Planetary security conference, The Hague,
|
93 |
JScheffran, J Burroughs, ALeidreiter, RVan Riet, AWare (2016). The climate-nuclear nexus: Exploring the linkages between climate change and nuclear threats. World Future Council,, 2018–18–09
|
94 |
JScheffran, T Cannaday (2013). Resistance to climate change policies: The conflict potential of non-fossil energy paths and climate engineering. In: Maas A, Bodó B, Burnley C, Comardicea I, Roffey, R, eds. Global Environmental Change. Auflage: Nomos, 261–292
|
95 |
RSchlembach (2011). How do radical climate movements negotiate their environmental and their social agendas? A study of debates within the Camp for Climate Action (UK). Critical Social Policy, 31(2): 194–215
https://doi.org/10.1177/0261018310395922
|
96 |
ESchlosser (2015). Nuns and nuclear security. The New Yorker,, 2016–2–05
|
97 |
KSchock (2013). The practice and study of civil resistance. Journal of Peace Research, 50(3): 277–290
https://doi.org/10.1177/0022343313476530
|
98 |
JSelby, O S Dahi, C Fröhlich, MHulme (2017). Climate change and the Syrian civil war revisited. Political Geography, 60: 232–244
https://doi.org/10.1016/j.polgeo.2017.05.007
|
99 |
LSerck (2016). Did the Newbury bypass tree-huggers change anything? BBC News,, 2016–2–05
|
100 |
ASheikh, A Guled (2009). U.S. Navy rescues captain, kills Somali pirates. Reuters, , 2016–2–05
|
101 |
J GShepherd (2009). Geoengineering the Climate: Science, Governance and Uncertainty. London: The Royal Society
|
102 |
VShevchenko (2014). “Little Green Men” or “Russian Invaders”? BBC News,, 2016–2–05
|
103 |
PSinger (2015). Stuxnet and its hidden lessons on the ethics of cyberweapons. Case Western Reserve Journal of International Law, 47(1): 79–86, , 2018–9–15
|
104 |
GSmith (2015). The day the troop trains came to Berkeley (first person). The Berkeley Daily Planet,, 2016–5–15
|
105 |
TStaff (2015). Eilat-bound jets get anti-missile defense pods. The Times of Israel,, 2016–2–05
|
106 |
NStern (2006). Executive summary. In: Stern N, eds. Stern Review: The Economics of Climate Change. Cambridge: Cambridge University Press
|
107 |
Stratospheric Particle Injection for Climate Engineering (2018). The Spice Project, , 2018–9–15
|
108 |
K MSweet (2009). Aviation and Airport Security: Terrorism and Safety Concerns. New York: CRC Press
|
109 |
The CNA Corporation (2007). National security and the threat of climate change., 2018–9–18
|
110 |
The World Bank (2015). Political stability- country rankings. The Global Economy,, 2018–9–18
|
111 |
D GThomas (1999). The Recognition of States: Law and Practice in Debate and Evolution. Westport, Connecticut: Praeger
|
112 |
BUgorji (2017). Combating terrorism: A literature review. International Center for Ethno-Religious Mediation,, 2018–9–18
|
113 |
United Nations Environment Programme (2007). Sudan post-conflict environmental assessment. , 2018–9–15
|
114 |
United Nations Framework Convention on Climate Change (2014). Report of the conference of the parties on its twentieth session, held in Lima from 1 to 14 December 2014., 2018–9–15
|
115 |
U.S. Department of State (2016). Chapter 3: State sponsors of terrorism overview. In: Country Reports on Terrorism 2016,, 2018–9–18
|
116 |
D GVictor (2008). On the regulation of geoengineering. Oxford Review of Economic Policy, 24(2): 322–336
https://doi.org/10.1093/oxrep/grn018
|
117 |
DWard, S Morris (2006). Jail for animal rights extremists who stole body of elderly woman from her grave. The Guardian, , 2018–3–09
|
118 |
M LWeitzman (2015). A voting architecture for the governance of free-driver externalities, with application to geoengineering. Scandinavian Journal of Economics, 117(4): 1049–1068
https://doi.org/10.1111/sjoe.12120
|
119 |
K PWhyte (2012). Now this! Indigenous sovereignty, political obliviousness and governance models for SRM research. Ethics, Policy & Environment, 15(2): 172–187
https://doi.org/10.1080/21550085.2012.685570
|
120 |
LWilson (2010). Fifteen years since live exports divided Brightlingsea. BBC News,, 2016–5–15
|
121 |
DWinterman (2011). SAS War Diary: the SAS secret hidden since World War II. BBC News,, 2016–2–05
|
122 |
PYang, Y Yao, ZMi, YCao, H Liao, BYu, QLiang, DCoffman, YWei (2018). Social cost of carbon under shared socioeconomic pathways. Global Environmental Change, 53: 225–232
https://doi.org/10.1016/j.gloenvcha.2018.10.001
|
123 |
KYusoff (2013). The geoengine: Geoengineering and the geopolitics of planetary modification. Environment & Planning A, 45(12): 2799–2808
https://doi.org/10.1068/a45645
|
124 |
KZetter (2014). Hacker lexicon: what is an air gap? Wired.com,, 2018–9–18
|
125 |
D DZhang, P Brecke, H FLee, Y QHe, JZhang (2007). Global climate change, war, and population decline in recent human history. Proceedings of the National Academy of Sciences of the United States of America, 104(49): 19214–19219
https://doi.org/10.1073/pnas.0703073104
|