Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Climate Change and Hybrid Warfare Strategies

2020, Journal of Strategic Security

Concepts of hybrid warfare and climate security are contested on their own, and are rarely considered as connected in planning for future security risks. Yet climate change presents new hazards for national security, and opportunities for those looking to foment instability and uncertainty in traditional institutions. This article examines the connections between climate change risks and hybrid war strategies, and focuses on concepts of resilience targeting, information warfare, and geoengineering, illustrating that ‘full spectrum’ analyses of security are necessary in developing future security strategies.

Journal of Strategic Security Volume 13 Number 4 Vol. 13, No. 4 Climate Change and Global Security Article 4 Climate Change and Hybrid Warfare Strategies Chad M. Briggs University of Alaska, Anchorage, cbriggs6@alaska.edu Follow this and additional works at: https://scholarcommons.usf.edu/jss pp. 45-57 Recommended Citation Briggs, Chad M.. "Climate Change and Hybrid Warfare Strategies." Journal of Strategic Security 13, no. 4 (2020) : 45-57. DOI: https://doi.org/10.5038/1944-0472.13.4.1864 Available at: https://scholarcommons.usf.edu/jss/vol13/iss4/4 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact scholarcommons@usf.edu. Climate Change and Hybrid Warfare Strategies Abstract Concepts of hybrid warfare and climate security are contested on their own, and are rarely considered as connected in planning for future security risks. Yet climate change presents new hazards for national security, and opportunities for those looking to foment instability and uncertainty in traditional institutions. This article examines the connections between climate change risks and hybrid war strategies, and focuses on concepts of resilience targeting, information warfare, and geoengineering, illustrating that ‘full spectrum’ analyses of security are necessary in developing future security strategies. Acknowledgements My thanks to four anonymous reviewers and the editors for their comments and suggestions, and to Tracy Walstrom Briggs for her editing. This article is available in Journal of Strategic Security: https://scholarcommons.usf.edu/jss/vol13/ iss4/4 Briggs: Climate Change and Hybrid Warfare Strategies Introduction National security discussions of climate change and hybrid warfare have barely intersected, despite both being highly visible in discussions of the changing nature of conflict and security. When climate changes are referenced it is typically in the context of how shifting environmental conditions can accelerate certain components of hybrid warfare, such as terrorism, a watered down version of the original conception of climate security as a threat multiplier in security foresight.1 Yet despite the lack of obvious connections between the concepts, climate security and hybrid warfare are linked in key areas. The difficulty in seeing these links leaves security organizations vulnerable to the associated risks. This article briefly outlines relevant concepts of climate security and hybrid warfare, and discusses connections between climate change and information warfare, attempts to control resources, and geoengineering technologies. In contrast to traditional conceptions of strategic security in terms of military action, climate change highlights the ways in which not only human security is put at risk, but also how actors can take advantage of or force environmental changes in order to undermine adversaries. While Sun Tzu wrote that creating vulnerabilities in one’s opponent is too costly, he made an exception with exploitation of environmental factors.2 In the twenty-first century, we likewise see opportunities for asymmetric action against opponents by opening environmental vulnerabilities. One of the important contributions that hybrid warfare theorists have made is to widen the concepts of security beyond the standard images of violence and conflict (for example, kinetic warfare), and to argue that increasingly one witnesses coordinated actions across a spectrum of activities, from traditional military actions to cyberattacks, criminal networks, disinformation campaigns, and terrorism. Some analysts argue that hybrid conflicts are not necessarily new, that asymmetric and irregular warfare have existed for ages, while others point out the increased coordination across different spaces, including leveraging cyber technologies and social media.3 Despite these differences, there is wide agreement that the United States and NATO-centric political concepts of conflict fail to capture the wide range of potential threats and risks inherent in contemporary security.4 The formal definitions of hybrid 45 Produced by The Berkeley Electronic Press, 2020 Journal of Strategic Security, Vol. 13, No. 4 warfare in the US took place at the same time that intelligence analysts called for full spectrum analyses to reflect the complexity of conflict in areas like Iraq and Afghanistan, but also in many ways mirror strategic doctrines developed by the Russian Federation and People’s Republic of China (PRC).5 Specifically, the Russian Federation has long used concepts of maskirovka in operations and strategy, meaning the masking of identity and goal of using proxies when available, and not admitting attribution even in cases where actions are linked to the government.6 The Russian military occupation of the Crimean peninsula of Ukraine in 2014 was the clearest example of these approaches, but they have continued in its cyber, military, and counter-intelligence operations in the region and abroad.7 Similarly, though with a slightly different emphasis from Russia’s maskirovka or Gerimasov Doctrine, is the PRC’s concept of unrestricted warfare. Based on insurgency experiences of the Chinese Communist forces in the 1940s and codified more recently in 1999, unrestricted warfare is a strategy of using all possible tools to engage an opponent asymmetrically, from political and legal warfare to traditional kinetic operations.8 American concepts of wider warfare, such as multi-domain operations (MDO), still tend to focus on military operations and not the broader array of potential actors or actions. Discussions over climate change as a security risk have encountered similar issues, namely that the concept of climate security often is defined in terms of how much climate-induced environmental changes increase the risks of violent conflict.9 While the focus on violent conflict in climate security is common in academia, in contrast the applied military definitions of climate security tend to focus more on human security, and try to identify areas in which environmental changes affect operational or strategic goals. In this sense, climate as a cause of conflict is not viewed as a primary factor, but it remains vitally important for understanding a wide variety of logistical and intelligence risks, from future humanitarian assistance and disaster response (HA/DR) operations, to infrastructure risks, force protection (for example, extreme heat events, emerging diseases), search-and-rescue (SAR), and energy supplies.10 Where extreme environmental changes do threaten social stability, such as a major famine or shifting monsoon rains, the military planning view has been that 46 https://scholarcommons.usf.edu/jss/vol13/iss4/4 DOI: https://doi.org/10.5038/1944-0472.13.4.1864 Briggs: Climate Change and Hybrid Warfare Strategies responding to complex disasters is a severe drain on resources, and that other agencies heading off such futures is the best course of action, not preparing for additional kinetic scenarios.11 While the logistical and humanitarian risks that fall under human security concepts may not appear as salient as violent conflict to some, this is the same criticism made by hybrid warfare analysts. Essentially, focusing primarily on violent conflict and traditional kinetic warfare, and ignoring coordinated actions in the grey zones of activity that fall under the threshold of military response, leaves vulnerable many societies and communities to impacts that fall under the wider concepts of human, energy or cyber security. These vulnerable areas are where security may be most at risk, and yet analysts risk ignoring events that fall outside of traditional definitions of security. Climate-induced environmental changes can pose hazards from massive wildfires to flooding, from crop failure to energy blackouts, from pandemic disease to increased risks of tsunamis.12 Not only do climatic changes pose risks to security on these more fundamental levels, they are also the areas, which are leveraged as tools for entities employing hybrid warfare strategies. Environmental changes also overlap with strategies that can widen insurgency and conflict potential, from forced migration of refugees, resource capture (including food), destruction of infrastructure (urbicide), and other actions that undermine community well-being and cohesiveness.13 Resilience Targeting In conducting assessments of post-conflict regions and reconstruction, a pattern emerged that suggested many actions taken during a conflict were designed not to target military units, or even civilians directly, but were intended to prevent communities from being able to recover from the conflict. By attacking or blocking access to critical nodes in essential systems, aggressors could exploit key vulnerabilities and actively target those factors that constituted resilience and the ability of systems to recover following a conflict. The specific tactics could vary, from sowing landmines in agricultural areas, destroying environmental or health infrastructure (for example, wastewater treatment facilities), or undercutting livelihoods, this practice of resilience targeting often 47 Produced by The Berkeley Electronic Press, 2020 Journal of Strategic Security, Vol. 13, No. 4 occurred in civil wars and was tied to policies of ethnic cleansing. 14 Similar tactics are observed in hybrid warfare environments. Hybrid warfare strategies are often employed in asymmetric conflicts, where the less powerful actor takes advantage of the adversary’s vulnerabilities to create instability and disruption. As resilience is a key component of vulnerability, actively undercutting resilience of critical systems automatically increases associated vulnerabilities, whether the ability to withstand outside attacks, maintain social, political, and economic stability, or to recover following a disaster. In a general sense, any reduction of resilience in a society or its underlying support systems increases that society’s vulnerability to emerging hazards linked to climate change. When Ukrainian society, for example, is polarized through social media and disinformation campaigns, energy utilities suffer cyberattacks, financial systems are delegitimized and fail, the country loses its ability to develop climate mitigation policies or respond to hazards such as extreme heat events. On a more specific level, however, hybrid warfare tools are employed in spaces opened by climate related stresses. One key component that Hoffman and others identified in the application of hybrid warfare has been the criminal element and this may serve as an example of the synergistic effects between climate change and deliberate efforts to destabilize a region or system.15 To take one example, as drought and desertification affect farmers in central Africa near Lake Chad, criminal and terrorist networks such as Boko Haram can take advantage of the stresses for both recruitment and human trafficking.16 Human trafficking of refugees not only creates its own crisis, it is used as a weapon to divide societies and destination countries whether in North Africa or southern Europe. This division works best when tied with a coordinated disinformation campaign that frames the existence of refugees as a national, cultural, or existential threat, rather than a humanitarian crisis. 17 Criminal networks can also destabilize regions by focusing on livelihood and environmental resources, from fisheries to illegal trade in wildlife. The Northern Triangle of Central America (including Guatemala, Honduras, and El Salvador) may be another example where criminal networks have both destabilized a region and taken advantage of unstable 48 https://scholarcommons.usf.edu/jss/vol13/iss4/4 DOI: https://doi.org/10.5038/1944-0472.13.4.1864 Briggs: Climate Change and Hybrid Warfare Strategies conditions. Research strongly suggests that climate changes have impacts on levels of crime, and that in Central America migration toward the United States is linked to both environmental changes and those taking advantage of resulting disruption.18 Deforestation and destruction of agricultural land, to take one example, links both larger environmental changes and narco-crime syndicates and local control of land by criminal networks.19 Coupled with problems of corruption, outside interference by groups (whether nation-states or corporations), and colonial legacies of power structures and economics, it is difficult for countries for develop the capacity and legitimacy to address these non-traditional security dynamics. Note that the criminalization framework can be misused, by framing adaptation strategies following stresses or disasters as threats to national security.20 The focus should remain on vulnerable populations and systems. For entities looking to destabilize the legitimacy of governing institutions, undercutting basic needs such as food, water, and livelihoods can be an effective component of a wider campaign.21 In this sense, climate change is not the cause of conflict, but drives an array of stressors that can be exploited by those looking to profit from uncertainty and instability during or prior to a conflict. An adversary that is deeply divided and unable to cope with disasters may be less formidable an opponent. With natural hazards increasing in scope and intensity in many areas, from extreme heat to flooding and/or drought, undercutting response and perhaps even sparking disasters may be an effective approach for an aggressor who either lacks traditional military capabilities, or wishes to remain hidden and attribute blame elsewhere. Such approaches, however, work best when actors attack resilience not only on a physical basis, but also in the informational space. Information A2AD The concept of anti-access and area denial (A2AD) refers to methods by which an adversary denies an opponent the ability to operate in or enter a contested territory. In modern usage, it has often referred to concerns over the Chinese military’s efforts to threaten U.S. naval forces in regions like the South China Sea, a region in which the People’s Liberation Army (PLA) and People’s Liberation Army Navy (PLAN) have used hybrid strategies 49 Produced by The Berkeley Electronic Press, 2020 Journal of Strategic Security, Vol. 13, No. 4 (for example, maritime militia) and island construction (more below) to shift the nature of control and security.22 One could also conceive of information A2AD, however, or ways in which adversaries are able to deny the usual access to and control of informational and cyber spaces. Beyond the traditional denial of service (DoS) attacks on information technology, hybrid warfare can encompass additional attacks that undermine trust in areas like financial services (for example, ransomware and identify theft), navigation (Global Positioning Systems), and medical records. In the climate change realm, attacks can be systematically carried out to question to validity of climate-related scientific data and research, and in so doing even physically deny access to certain regions for military operations. Campaigns against climate science are not new, and in recent court cases have traced such attacks back to oil companies in the 1970s.23 Increasingly, attacks on the validity of climate science are carried out by state and non-state actors as part of coordinated efforts to bolster insecurity. Actors employ techniques of uncertainty amplification, cyber aggression against individual scientists, and media campaigns to manufacture conspiracies related to everything from George Soros to chemtrails to weather control at Air Force facilities. Strategic reasons exist for doing so. For state relying heavily on oil and gas exports for government revenue, large-scale policy shifts to invest in renewable technologies and divest from fossil fuel industries, creates an existential threat to the well-being of the state. If, for example, the European Union responds to climate change by investing more in solar and wind technologies, this can directly affect the strength of the Russian state (where the oil and gas sector pay nearly forty percent of government revenues \The more uncertainty that can be inserted into discussions over climate change, the more that scientists are linked to conspiracy theories, the less likely abrupt policy changes will be made that move from dependence on fossil fuel sources.24 Intelligence agencies in Russia and petrostates have been linked to climate change disinformation campaigns, and the United States and Canadian governments have not been immune from such actions.25 Where the goals of such disinformation campaigns is disruption of actions to respond to climate change related risks, and where such actions have implications for disaster or military preparedness, they can constitute components of 50 https://scholarcommons.usf.edu/jss/vol13/iss4/4 DOI: https://doi.org/10.5038/1944-0472.13.4.1864 Briggs: Climate Change and Hybrid Warfare Strategies hybrid warfare actions. For example, politicization over the existence of climate change in the United States has led the White House to remove all references to climate change from the National Security Strategy, and the recently released Air Force Arctic strategy contained only three mentions of climate change (and all bundled with the term weather).26 The idea behind referring to A2AD info ops is not that information spaces will be completely off-limits to certain countries, but in the case of climate change and other scientific issues, social media spaces and even academic research have been flooded with strident anti-science voices that can overwhelm discussion, while political pressures have resulted in climaterelated data and websites being taken down by government officials. 27 The potential implications are that the U.S. Navy (whose Task Force Climate Change was shut down in 2019), Air Force, and Coast Guard are constrained in their abilities to discuss key factors in operational and strategic planning for the region.28 Large-scale loss of sea ice, melting permafrost, changes to Arctic shipping, all require investment in capabilities and/or consideration of lost infrastructure (for example, damage to runways due to permafrost melt), slowing the United States response and leaving open space for Russian and Chinese operations in the region. Denying domain awareness is a long-standing strategy in military operations, and the anti-science campaigns promoted by outside actors accelerate the inability of actors to avoid seeing clearly in rapidly changing regions like the Arctic. Shifting the Groundwork One of the more notable tools used in hybrid warfare in recent years has been the construction of new territory by the People’s Republic of China inside the South China Sea, and establishment of military bases to assert control over exclusive economic zones. While ruled illegal by both courts in The Hague and by the U.S. State Department, among others, the PRC has skirted traditions of how countries claim control of territory and resources, taking advantage of Law of the Sea (UNCLOS) provisions while at the same time ignoring its prescriptions. This island terraforming is part of a larger strategic approach by the PRC to obtain control of natural resources, including fossil fuels, rare earth minerals, and especially food. 51 Produced by The Berkeley Electronic Press, 2020 Journal of Strategic Security, Vol. 13, No. 4 With concerns over food insecurity and availability of water and land, China has not been alone in making concerted efforts to obtain control of land overseas.29 Foreign control of land is nothing new. European colonial powers shifted entire agrarian economies to accommodate cash crop exports, and United States companies controlled large parts of Central America through the mid-20th century. Similar patterns now emerge with corporations wresting control of land and crops away from local governments, sometimes with enormous political consequences such as the South Korean company Daewoo’s attempts to lease over half of all agricultural land in Madagascar.30 What may be concerning for the future would be new approaches to control of land, water and resources in response to climate change pressures, elements of which are already evident. It is possible for actors to carry out coordinated campaigns using tools mentioned above, combining resilience targeting, human trafficking, and information warfare, in order to wrest control of territory that they then expand upon as security operations. While governments, corporations, terrorist and criminal networks have taken advantage of disasters in the past, new technologies are emerging that may allow the disasters to be engineered by those same actors. While geoengineering technologies have long been the work of science fiction, the ability to use technology to affect and control solar radiation management (SRM) of certain parts of the globe are increasingly close to reality. The concept behind SRM is to deploy technologies, such as stratospheric nanoparticles, to reflect the sun’s rays away from the earth, or to direct solar radiation onto selected regions to warm it more quickly.31 While cost, feasibility, and control issues are highly uncertain, from a security perspective three critical issues emerge. The first hybrid-climate security issue is that geoengineering technologies, if deployed in the future, may not be controlled by traditional space agencies like NASA or the European Space Agency (ESA). Geotech research is often being undertaken by corporations, in part because national governments may be constrained by legal conventions such as ENMOD (Convention on the Prohibition of Military or Any Other Hostile Use of Environmental Modification Techniques), but also because no 52 https://scholarcommons.usf.edu/jss/vol13/iss4/4 DOI: https://doi.org/10.5038/1944-0472.13.4.1864 Briggs: Climate Change and Hybrid Warfare Strategies governance mechanisms exist to address use of these new technologies.32 It would be entirely possible, to use a hypothetical example, for Pakistan to contract SpaceX to deploy technologies developed by China, in an attempt to prevent further melt of Himalayan glaciers. The issue is that no clear responsibility may exist, or mechanism for ‘downstream’ groups affected to protest such actions through formal channels. The lack of governance leads into the second critical issue, which is that of mis- and disinformation. With geoengineering technologies lacking clear cause and effect, and with conspiracies already circulating concerning such technologies, attribution for environmental events and disasters are open to exploitation. In the above example, even if the deployment of technology had no actual effect on Himalayan glaciers, any subsequent change in the Indian monsoon could be blamed on Pakistan, the United States, or China. Exploiting disasters for political gain is a common tactic, but the point is that technology to address climate change can open space for existing hybrid strategies against countries or societies. The third problem is that there may be some kernel of truth in such geoengineering concerns. It may be possible to employ such technologies in a deliberate attempt to disrupt climate, weather, or ecosystem stability, or even just to give the appearance of doing so. Turning such technologies into a weapon is not beyond the realm of possibility, particularly if the strategic goal is disruption itself.33 If the strategic goal of hybrid warfare is to stoke instability in a region or system, to keep it off balance by exploiting available technologies and vulnerabilities, these new approaches to terraforming and geoengineering allow disruptive actors to exploit climate change in ways that are difficult for states and communities to defend against or even anticipate. With climate change (via sea level rise) already shifting land and maritime borders, and natural processes and hazards no longer following historical patterns, these uncertainties will be easy to take advantage of or accelerate. Conclusion The disruptions that climate-related environmental changes pose to 53 Produced by The Berkeley Electronic Press, 2020 Journal of Strategic Security, Vol. 13, No. 4 military operations and strategy have at many times mirrored those challenges raised by irregular warfare, counter insurgency operations (COIN), and cyber warfare. By not fitting into easily defined categories, emerging risks and threats tended to be redefined so that they did fit traditional security concepts, or they were ignored. Concepts like climate change can be considered either a political issue by military officers or a boutique topic by academics, rather than representing a wide variety of change drivers that could undermine many well-established assumptions about stability, operations, and logistics. So, too, has hybrid warfare been contested as being too broad, too all-inclusive, rather than reflecting coordinated campaigns by aggressive states and non-state actors whose goal is the disruption that many people may hope goes away on its own. Instead, military strategists should understand that hybrid warfare and climate security are interlinked concepts, both reflecting the ability of aggressors to take advantage of uncertainty and change, and to sow division and accelerate such changes. Both military planners and security studies specialists should focus more attention on climate change not only as a threat multiplier for traditional concepts of security, but incorporate shifts in environmental conditions with advances in understanding hybrid warfare and new technologies for adversaries to take advantage of these changes. With climate security discussions largely focused on either diplomacy or impacts on conventional military operations, greater integration of lessons from hybrid warfare, IW, COIN, and related experiences can allow warning intelligence and planning for new constellations of strategic threats. Climate change adaptive strategies such as migration can be worsened and turned into a security threat, power plants under stress from heat can be attacked via cyberattacks, and possibly even climate systems themselves can come under threat from more than unintended action. More fullspectrum assessments of these possibilities can assist in anticipating and warning of where and how climate change can be deliberately securitized. The examples discussed in this article, from criminal networks and information warfare to geoengineering, are a subset of tools available within the hybrid warfare spectrum of potential actions. The cases demonstrate that global environmental changes are not external factors affecting the strategic peripheries. The environment is instead the ground 54 https://scholarcommons.usf.edu/jss/vol13/iss4/4 DOI: https://doi.org/10.5038/1944-0472.13.4.1864 Briggs: Climate Change and Hybrid Warfare Strategies upon and within which we operate, and absent concerted efforts to rethink how climate change affects strategic security, we will be left preparing for the wrong battles. Endnotes Elisabeth Braw, “How Climate Change Will Help China And Russia Wage Hybrid War,” DefenseOne, October 23, 2019; https://www.defenseone.com/ideas/2019/10/howclimate-change-helps-hybrid-war-practitioners/160810/; John J. McCuen, "Hybrid wars," Military Review 88, no. 2 (2008): 107. 2 Sun Tzu, The Art of War (Oxford: Oxford University Press, 1971), 141-143. 3 Christopher Paul, "Confessions of a Hybrid Warfare Skeptic," Small Wars Journal, (March 2016); https://smallwarsjournal.com/jrnl/art/confessions-of-a-hybridwarfare-skeptic; Jarno Limnéll, "The Exploitation of Cyber Domain as Part of Warfare: Russo-Ukrainian War," International Journal of Cyber-Security and Digital Forensics 4, no. 4 (2015): 521-533, http://doi.org/10.17781/P001973. 4 Robert Johnson, "Hybrid War and its Countermeasures: a Critique of the Literature," Small Wars & Insurgencies 29, no. 1 (2018): 141-163, http://doi.org/10.1080/09592318.2018.1404770. 5 Frank G. Hoffman, "‘Hybrid Threats:’ Neither Omnipotent Nor Unbeatable," Orbis 54, no. 3 (2010): 441-455, https://doi.org/10.1016/j.orbis.2010.04.009; Roger N. McDermott. "Does Russia Have a Gerasimov doctrine?" Parameters 46, no. 1 (2016): 97; Alessio Patalano, "When Strategy Is ‘Hybrid’ and Not ‘Grey:’ Reviewing Chinese Military and Constabulary Coercion at Sea," The Pacific Review 31, no. 6 (2018): 811839, https://doi.org/10.1080/09512748.2018.1513546; Adrian Wolfberg, "Fullspectrum Analysis: a New Way of Thinking for a New World," Military Review 86, no. 4 (2006): 35. 6 Daniel P. Bagge, Unmasking Maskirovka: Russia's Cyber Influence Operations (New York: Defense Press 2019). 7 Mark Galeotti, "Hybrid, Ambiguous, and Non-linear? How New Is Russia’s ‘New Way of War’?" Small Wars & Insurgencies 27, no. 2 (2016): 282-301, https://doi.org/10.1080/09592318.2015.1129170. 8 Qiao Liang and Wang Xiangsui, Unrestricted Warfare (Beijing: PLA Literature and Arts Publishing House Arts, 1999); James K. Wither, "Making Sense of Hybrid Warfare," Connections 15, no. 2 (2016): 73-87, https://doi.org/10.11610/connections.15.2.06. 9 Simon Dalby, "Climate Change and Environmental Conflicts," in Routledge Handbook of Environmental Conflict and Peacebuilding, eds. Ashok Swain and Joakim Öjendal (New York: Routledge, 2018), 42-53, https://doi.org/10.4324/9781315473772-4; Kendra Sakaguchi, Anil Varughese, and Graeme Auld, "Climate Wars? A Systematic Review of Empirical Analyses on the Links Between Climate Change and Violent Conflict," International Studies Review 19, no. 4 (2017): 622-645, https://doi.org/10.1093/isr/vix022; Jürgen Scheffran, Michael Brzoska, Jasmin Kominek, P Michael Link, and Janpeter Schilling, "Climate Change and Violent Conflict," Science 336, no. 6083 (2012): 869-871, https://doi.org/10.1126/science.1221339. 10 Ralph Espach, David Zvijac, and Ronald Filadelfo, “Impact of Climate Change on US Military Operations in the Western Pacific,” Marine Corps University Journal 7 (2016): 89-113, https://doi.org/10.21140/mcuj.2016si05. 11 Chad M. Briggs. "Climate Security, Risk Assessment and Military Planning." International Affairs 88, no. 5 (2012): 1049-1064, https://doi.org/10.1111/j.14681 55 Produced by The Berkeley Electronic Press, 2020 Journal of Strategic Security, Vol. 13, No. 4 2346.2012.01118.x; Andrew DeWit, "Towards Human Security: Climate Change and the Military Role in Humanitarian Assistance and Disaster Response," in Human Security and Japan's Triple Disaster, eds. Paul Bacon and Christopher Hobson (New York: Routledge, 2014), 192-209. 12 New evidence is emerging that glacier retreat increases the risks of landslide-generated tsunamis in the Arctic. Henry Fountain, “Scientists Warn of Growing Landslide Risk for Alaska,” New York Times, May15, 2020, A2, https://www.nytimes.com/2020/05/14/climate/alaska-landslide-tsunami.html. 13 Bruce Stanley, "The City-Logic of Resistance: Subverting Urbicide in the Middle East City," Journal of Peacebuilding & Development 12, no. 3 (2017): 10-24, https://doi.org/10.1080/15423166.2017.1348251. 14 Chad M. Briggs, Moneeza Walji, and Lucy Anderson, "Environmental Health Risks and Vulnerability in Post-conflict Regions," Medicine Conflict and Survival 25, no. 2 (2009): 122-133, https://doi.org/10.1080/13623690902943362. 15 Hoffman, "‘Hybrid Threats,’ " 29-30. 16 Simeon Alozieuwa, "Political Economy of War and Violence: the Boko Haram in the Lake Chad Basin," African Renaissance 13, no. 1-2 (2016): 165-198. 17 Stefano Braghiroli and Andrey Makarychev, "Redefining Europe: Russia and the 2015 Refugee Crisis," Geopolitics 23, no. 4 (2018): 823-848, https://doi.org/10.1080/14650045.2017.1389721. 18 Robert Agnew, "Dire Forecast: a Theoretical Model of the Impact of Climate Change on Crime," Theoretical Criminology 16, no. 1 (2012): 21-42, https://doi.org/10.1177/1362480611416843; Lauren Markham, “How Climate Change Is Pushing Central American Migrants to the US,” The Guardian, 6 April 2019, https://www.theguardian.com/commentisfree/2019/apr/06/us-mexico-immigrationclimate-change-migration. 19 Beth Tellman, Steven E. Sesnie, Nicholas R. Magliocca, Erik A. Nielsen, Jennifer A. Devine, Kendra McSweeney, Meha Jain, David J. Wrathall, Anayasi Dávila, Karina Benessaiah, and Bernardo Aguilar-Gonzalez, “Illicit Drivers of Land Use Change: Narcotrafficking and Forest Loss in Central America,” Global Environmental Change 63 (2020): 102092, https://doi.org/10.1016/j.gloenvcha.2020.102092. 20 Jonathan S. Simon, "Wake of the Flood: Crime, Disaster, and the American Risk Imaginary after Katrina," Issues in Legal Scholarship 6, no. 3 (2007), https://doi.org/10.2202/1539-8323.1094. 21 Timothy E. Hill, Reducing an Insurgency's Foothold: Using Army Sustainability Concepts as a Tool of Security Cooperation for AFRICOM (Carlisle Barracks PA: Army War College, 2008), https://apps.dtic.mil/sti/citations/ADA493738. 22 Justin L. Reddick, Under the Dragon's Wing: A Strategic Approach to China's Militarization Efforts of its Artificial Islands in the South China Sea (Fort Leavenworth, KS: US Army Command and General Staff College, 2017), https://apps.dtic.mil/sti/citations/AD1038848. 23 Stephan Lewandowsky, Naomi Oreskes, James S. Risbey, Ben R. Newell, and Michael Smithson, "Seepage: Climate Change Denial and its Effect on the Scientific Community," Global Environmental Change 33 (2015): 1-13, https://doi.org/10.1016/j.gloenvcha.2015.02.013. 24 Sander van der Linden, "The Conspiracy-effect: Exposure to Conspiracy Theories (About Global Warming) Decreases Pro-social Behavior and Science Acceptance," Personality and Individual Differences 87 (2015): 171-173, https://doi.org/10.1016/j.paid.2015.07.045. 25 Indigo J. Strudwicke and Will J. Grant, "#Junkscience: Investigating Pseudoscience Disinformation in the Russian Internet Research Agency Tweets." Public Understanding of Science 29, vol. 5 (2020): 459-472, https://doi.org/10.1177/0963662520935071. 26 Jean Chemnick, “Trump Drops Climate Threats from National Security Strategy,” 56 https://scholarcommons.usf.edu/jss/vol13/iss4/4 DOI: https://doi.org/10.5038/1944-0472.13.4.1864 Briggs: Climate Change and Hybrid Warfare Strategies Scientific American, December 19, 2017, https://www.scientificamerican.com/article/trump-drops-climate-threats-fromnational-security-strategy/; U.S. Department of the Air Force, Arctic Strategy: Ensuring a Stable Arctic Through Vigilance, Power Projection, Cooperation, and Preparation (Arlington, VA: U.S. Department of Defense, 2020), https://www.af.mil/Portals/1/documents/2020SAF/July/ArcticStrategy.pdf. 27 Victoria Hermann, "I Am an Arctic Researcher. Donald Trump Is Deleting My Citations," The Guardian, March 28, 2017, https://www.theguardian.com/commentisfree/2017/mar/28/arctic-researcherdonald-trump-deleting-my-citations. 28 JD Simkins, “Navy Quietly Ends Climate Change Task Force, Reversing Obama Initiative,” Navy Times, August 26, 2019, https://www.navytimes.com/offduty/military-culture/2019/08/26/navy-quietly-ends-climate-change-task-forcereversing-obama-initiative/. 29 Gerald Chan, "China and Small States in Food Security Governance," African and Asian Studies 13, no. 1-2 (2014): 59-79, https://doi.org/10.1163/15692108-12341285. 30 Venusia Vinciguerra, "How the Daewoo Attempted Land Acquisition Contributed to Madagascar’s Political Crisis in 2009," in Contest for Land in Madagascar, eds. Michael Lambek, Gwyn Campbell and Sandra Evers (Leiden: Brill, 2013), 221-246, https://doi.org/10.1163/9789004256231_011. 31 Andrew Lockley, "Security of Solar Radiation Management Geoengineering," Frontiers of Engineering Management 6, no. 1 (2019): 102-116, https://doi.org/10.1007/s42524019-0008-5. 32 Janos Pasztor, "The Need for Governance of Climate Geoengineering," Ethics & International Affairs 31, no. 4 (2017): 419, https://doi.org/10.1017/s0892679417000405. 33 Paul Nightingale and Rose Cairns. “The Security Implications of Geoengineering: Blame, Imposed Agreement and the Security of Critical Infrastructure” (Working Paper, University of Sussex, 2014), http://sro.sussex.ac.uk/id/eprint/52905/. 57 Produced by The Berkeley Electronic Press, 2020