Since the late 1990s and early 2000s, notable progress has been made toward holding accountable those responsible for conflict-related sexual violence (CRSV), with a view toward ending impunity. Developments by the International Criminal Tribunals for the former Yugoslavia and for Rwanda, as well as by the International Criminal Court, were instrumental to advancing jurisprudence on sexual violence in the context of armed conflict. Despite progress in seeking to hold perpetrators accountable, critics note that there is persistent impunity and a vacuum of justice and accountability for sexual violence crimes in most conflict-affected settings globally. At the same time, feminist scholars in particular have critiqued the ways in which criminal proceedings often fail sexual violence survivors, especially by further silencing their voices and negating their agency. These intersecting gaps and challenges ultimately reveal the need for a broader, deeper, thicker, and more victim-centered understanding of justice and redress in response to sexual violence.
Article
Markus K. Binder and Gary A. Ackerman
Although comprising only a tiny proportion of all terrorist plots and attacks, the prospect of terrorists employing chemical, biological, radiological, or nuclear (CBRN) weapons has raised substantial concerns among both policymakers and the general public. While CBRN terrorist events do represent a real, asymmetric threat (with at least 558 incidents recorded in extant databases), most of these incidents would not constitute the use of genuine weapons of mass destruction (WMD). This is because, to form a viable weapon, the toxic chemical, biological pathogen, hazardous radioisotope, or fissile material must be combined with an effective delivery system; as the scale of the intended effects of such a weapon increases, so generally does its sophistication and the difficulty of acquiring or producing it. The threat of CBRN terrorism can be parsed into a consideration of both the motivations underlying its pursuit and the capabilities required to successfully deploy a CBRN weapon. A wide variety of factors can prompt terrorists to pursue a CBRN weapon. These can be usefully categorized into ideological or psychological drivers, operational and instrumental purposes, and organizational motives. At the same time, while terrorists can conceivably acquire a CBRN capability via state or nonstate sponsors, theft, or purchase, the most likely avenue is internal development of a weapon or an attack on a nuclear, chemical, or biological facility. Historically, there have been over 200 actual uses by terrorists of CBRN agents, with chemical incidents being the most common type. Most incidents have not resulted in many casualties, although there are a handful of mass-casualty incidents of CBRN terrorism. Past perpetrators reflect a diverse array of ideologies and have selected a wide range of delivery methods. Yet, past trends may not be a reliable indicator of the future threat. While low-end CBRN terrorism events will likely continue to predominate, and the COVID-19 pandemic is unlikely to appreciably increase the threat of bioterrorism, emerging technologies that facilitate acquisition efforts and the precedent set by groups like the Islamic State indicate that the potential for CBRN terrorism to result in a genuine WMD event will persist and might even increase over time. Therefore, while authorities must be careful not to exaggerate or amplify the threat of CBRN terrorism, CBRN terrorism is a phenomenon that requires continued attention, with efforts to prevent it that remain commensurate with the extant level of the threat.
Article
Mia Bloom and Kristian Kastner Warpinski
While the use of child soldiers has declined in recent years, it has not ended entirely. Children remain front-line participants in a variety of conflicts throughout the world and are actively recruited by armed groups and terrorist organizations. Reports of children involved in terrorism have become all too common. Boko Haram has repeatedly selected women and girls as their primary suicide attackers, and, in Somalia, the United Nations reported that al-Shabaab was responsible for recruiting over 1,800 children in 2019. In Iraq and Syria, children were routinely featured in the Islamic State of Iraq and Syria’s (ISIS) propaganda, and the group mobilized children as “cubs” to fight for the so-called Caliphate. Unfortunately there is a myriad of reasons why terrorist organizations actively include children within their ranks: children can be proficient fighters, and they are easy to train, cheaper to feed, and harder to detect. Thus, recruiting and deploying children is often rooted in “strategy” and not necessarily the result of shrinking numbers of adult recruits. Drawing from the robust literature on child soldiers, there are areas of convergence (and divergence) that explain the pathways children take in and out of terrorist organizations and the roles they play. Focusing on two cases, al-Shabaab in Somalia and the Islamic State in Iraq and Syria, we argue that there are three distinct but overlapping processes of child recruitment, including forced conscription (i.e., kidnapping), subtle manipulation and coercion (i.e., cultures of martyrdom), and a process of seemingly “voluntary recruitment,” which is almost always the result of intimidation and pressure given the children’s age and their (in)ability to provide consent. The concepts of consent and agency are key, especially when weighing the ethical and legal questions of what to do with these children once rescued or detained. Nonetheless, the children are first and foremost victims and should be awarded special protected status in any domestic or international court. In 2020, countries were seeking to balance human rights, legal responsibility, and national security around the challenge of repatriating the thousands of children affiliated with ISIS and still languishing in the al-Hol and Al Roj camps.
Article
Alexander B. Downes and Stephen Rangazas
Since the end of the Cold War, scholars have increasingly sought to explain the causes of civilian victimization—the intentional use of violence against noncombatants—during armed conflict. The question of the effects and effectiveness of violence against civilians, in contrast, has received less scholarly attention. One strand of research examines the impact of wartime civilian victimization on postconflict political behavior and outcomes. A second strand investigates the effectiveness of violence during the war itself. The principal question this literature asks is: Does civilian victimization “work”? Put more precisely, can intentionally targeting noncombatants help belligerents achieve their wartime objectives, whatever those might be? Civilian victimization takes different forms and serves different purposes in different kinds of conflicts; scholarship on its effectiveness is thus divided into work on irregular (predominantly intrastate) wars versus conventional (predominantly, but not exclusively, interstate) wars. No matter what its particular form or in which type of conflict it is used, however, civilian victimization tends to follow two broad logics: coercive and eliminationist. Most scholarship on irregular wars examines the effectiveness of coercive victimization, whereas studies of conventional war look at the efficacy of both. For example, a key debate in the literature on civilian victimization in irregular wars concerns whether selective or indiscriminate violence is more effective at deterring civilians from shifting their allegiances to the adversary. A broad consensus holds that violence is effective only when selective, but new studies have found that indiscriminate violence can also work under certain circumstances. Similarly, there is broad agreement (with some notable exceptions) in the literature on conventional war that coercive civilian victimization—which is almost by definition indiscriminate—is ineffective. In contrast, scholars have yet to assess systematically the effectiveness of eliminationist victimization in conventional war.
Article
Ayşe Betül Çelik
The growing number of civil wars in the post-Cold War era has been accompanied by a rising number of forcibly displaced people, who either stay within the borders of their own countries, becoming internally displaced persons (IDPs), or cross borders to become refugees. Although many studies have been conducted on the reasons of conflict-induced displacement, various questions remain of interest for the scholars of international relations, especially questions pertaining but not limited to the (a) gendered aspects of conflict, displacement, and peace processes, (b) predicting possible future displacement zones, and (c) best political and social designs for returnee communities in post-civil war contexts.
Most studies still focus on the negative consequences of forced migration, undermining how refugees and IDPs can also contribute to the cultural and political environment of the receiving societies. Considering that there is a huge variation in types of conflict, motivations for violence, and the resulting patterns of displacement within the category of civil war, more research on the actors forcing displacement, their intentions, and subsequent effects on return dynamics can benefit research in this field. Similarly, research on return and reconciliation needs to treat displacement and return as a continuum. Paying attention to conflict parties in civil war bears the potential for new areas of exploration whose outcomes can also shed light on policies for post-civil war construction and intergroup reconciliation.
Article
Marie-Eve Desrosiers
In the context of nationalist and ethnic struggles, framing refers to strategic communication aimed at changing perceptions and behavior, such as persuading members of a group to unite and fight or their opponents to demobilize. The concept and theory behind framing stem from sociology, and in particular American social movements theory, where they have helped reconcile an interest in the construction of identities and “meaning work” with the study of structures that favor participation in collective endeavors. Framing not only unpacks the processes behind this form of strategic communication through notions such as alignment and resonance, but it has also produced extensive scholarship on types of frames that foster mobilization and the socio-psychological keys they play upon in so doing. Framing theory has also focused on some of the elements contributing to the success—or lack thereof—of communication aimed at persuasion.
Considering that participation in crises and conflicts is an extreme form of mobilization, framing has, since the mid-2000s, made headway in conflict studies, where scholars have turned to framing processes to shed light on how people can be convinced to rally around the nationalist or ethnic flag and even take up arms in their group’s name. More recently, framing-centric approaches have been used to shed light on frames deployed in conflicts of a religious nature, as well as in the study of radicalization and the ideological or ideational framing behind it. The future of framing theory with regards to identity-based conflicts depends, however, on scholars’ ability to produce framing concepts and theoretical insights specific to conflict studies able to federate the community or researchers adopting the approach to study armed violence. As growing research on armed conflict turns to understanding the links between national and local realities, framing theorists may in addition benefit from greater attention to local frames and framing dynamics, and how they relate to the broader, elite-driven frames more commonly focused on in the study of armed violence. Finally, though so far little explored, framing proponents may stand to gain from engaging with literature using survey experiments or other promising quantitative approaches that have also sought to generate insights into ethnic relations or government representation and policy regarding crises and war.
Article
Hayden B. Peake
“Counterintelligence” (CI) is a term with multiple meanings—its definitions vary, even when applied to a single nation. Yet it can be understood by identifying the common CI functions in a source. These include: handling double agents, defectors, deception operations, and covert communications; handling and detecting moles or penetrations; and dealing with security threats in general. Antecedent elements of what is today called counterintelligence may be found in various histories of intelligence and warfare. The existence of security services can be traced back to ancient Egypt, Assyria, Persia, Greece, Rome, China, and Muscovy, among others. With the rise of the nation-state, rulers began creating secret political police organizations to safeguard their existence. In the case of the United States, it was not until the Civil War that there was anything like a domestic counterintelligence agency, and even then it was not a statutory organization. After World War I, however, former intelligence officers, agents, defectors, and journalists began publishing accounts of counterintelligence and domestic security operations. These topics were often discussed side-by-side. The number of scholarship on CI grew as World War II and the Cold War followed. In particular, the so-called “Cambridge Five” case—which involved five Cambridge graduates who were recruited as Soviet spies in the 1930s—had generated considerable literature and was furthermore considered an important case study in Western and Soviet intelligence services.
Article
Jennifer D. Kibbe
Covert action presents a potential policy for decision makers who want something quicker or more muscular than diplomacy but less expensive and obtrusive than military force. In contrast with intelligence, which entails collecting and analyzing information, covert action is an active instrument of foreign policy. The three main categories of covert action include propaganda, political action, and paramilitary action. Another separate category is economic action, which involves destabilizing the target state’s economy in some way. Because of the inherent secrecy of covert action, outside scholars have no way of knowing how much they do or do not know about the topic at hand and it also makes it hard to verify the information, since the information comes from a variety of sources. Covert action literature is particularly strong in case studies of particular operations. There is also a well-developed subsection within the field that focuses on covert action since the end of the Cold War, the role that the Office of Strategic Services (OSS) played during World War II, and covert actions undertaken by other states. However, there are several issues in the covert action literature. These issues include the assessment of the success or failure of particular operations and of the policy instrument as a whole, the tangible and intangible costs incurred by covert action, the ethical questions raised by conducting covert actions as well as the particular methods used and its impact on democracy, the oversight of covert action, and the evolution of US law covering covert action.
Article
Priya Dixit
Understandings of “critical” in critical scholarship on terrorism range from a Frankfurt School–influenced definition to a broader definition that aims to interrogate commonsense understandings of terrorism and counterterrorism. Overall, critical scholarship on terrorism draws on multiple disciplines and methodological traditions to analyze terrorism and counterterrorism. Within these, there have been ongoing debates and discussions about whether the state should be included in research on terrorism and, if so, what the inclusion of the state would do for the understanding of terrorism. Critical scholarship has also outlined the need for further attention to research ethics, as well as urged researchers to acknowledge their standpoints when conducting and communicating research. Some, but not all, critical scholarship has a normative orientation with the goal of emancipation, though the meaning of emancipation remains debated. Methodologically, the majority of critical scholarship on terrorism utilizes an interpretive lens to analyze terrorism and related issues. A central goal of critical terrorism research is to rework power relations such that Global South subjectivities are centered on research. This means including research conducted by Global South scholars and also centering Global South peoples and concerns in analyses of terrorism and counterterrorism. The role of gender, analytically and in practice, in relation to terrorism is also a key part of critical scholarship. Critical scholars of terrorism have observed that race is absent from much of terrorism scholarship, and there needs to be ongoing work toward addressing this imbalance. Media and popular culture, and their depiction of terrorism and counterterrorism, form another key strand in critical scholarship on terrorism. Overall, critical scholarship on terrorism is about scrutinizing and dismantling power structures that sustain commonsense knowledge regarding terrorism.
Article
K.M. Fierke
Critical theory in International Relations originated from the Marxist tradition which, during the mid- to late Cold War, formed the basis of dependency and world systems theory. In the years before and after the Cold War, critical theory became part of a larger post-positivist challenge to the discipline and to the development of critical security studies. At the heart of contestation within the broader arena of critical security is the concept of emancipation, developed by members of the Frankfurt School such as Theodor W. Adorno and Max Horkheimer. Several key debates have been at the center of critical security studies relating to the construction of threats, identity and difference, human security, and emancipation. In particular, critical security analysts have addressed the question of how, given the range of threats or risks that exist in the world, some threats come to have priority over others and become the focus of discourses of security. Also, some scholars have disputed the idea that identity is dependent on difference. The concept of human security shifts attention away from states to individuals, emphasizing human rights, safety from violence, and sustainable development. In the case of emancipation, critical theorists have expressed concern that the concept is too closely linked with modernity, meta-narratives, especially Marxism and liberalism, and the Enlightenment belief that humanity is progressing toward a more perfect future. What is needed is not to avoid emancipation per se, but to pay close attention to its underlying assumptions.
Article
Barry Buzan and Lene Hansen
International security studies (ISS) has significantly evolved from its founding core of “golden age” strategic studies. From the onset of the Cold War in the late 1940s through to the 1970s, strategic studies virtually was ISS, and remains a very large part of it. The fact that it continues to stand as the “mainstream” attacked by widening/deepening approaches further speaks to its status as a “core.” This core consists of those literatures whose principal concern is external military threats to the state, and the whole agenda of the use of force which arises from that. This core was originally focused on nuclear weapons and the military-political rivalry between the US and the Soviet Union, but has since adapted its focus to changes in the salience and nature of military threats caused by the end of the Cold War and 9/11. It includes literatures on deterrence, arms racing, arms control and disarmament, grand strategy, wars (and “new wars”), the use of force, nuclear proliferation, military technology, and terrorism. Debates within ISS are structured, either implicitly or explicitly, by five questions: (1) which referent object to adopt, (2) whether to understand security as internally or externally driven, (3) whether to limit it to the military sector or to expand it, (4) what fundamental thinking about (international) politics to adopt, and (5) which epistemology and methodology to choose.
Article
John D. Stempel
There is a potentially serious difference between diplomacy and intelligence. Creative tension between diplomacy and intelligence stems from the involvement of both with questions of strategy and statecraft. Indeed, the source of this conflict is often clandestine or covert activities that become public and adversely affect both relations between states and diplomats’ ongoing work. Early works in the intelligence scholarship focuses basically at the descriptive level and centers on acquiring information. In 1922, studies began considering the political aspects of the intelligence–diplomacy connection, zeroing in on the defects of US intelligence and the adequacy of policies, including those related to intelligence gathering and its impact on diplomacy. Studies about the details of the intelligence–diplomacy connection also began to appear. These studies look at the interplay between intelligence and policy making as well as the morality of clandestine operations. In order to link intelligence goals to policy needs, future studies on the intelligence–diplomacy connection should further assess the impact of culture on intelligence gathering and perception, provide better insight into the characteristics of good versus bad intelligence officers and diplomats, include qualitative estimates of the effectiveness and efficacy of techniques and strategies as well as legal and ethical discussions of control and policy, and explore the strategic interactions between intelligence officers and diplomats and how these are managed in various governing systems.
Article
Zahid Shahab Ahmed
Religious extremism is not a new phenomenon in South Asia but it has certainly grown during the 21st century and that too across the region. While there are historical reasons behind religious divisions and fissures in South Asia (e.g., the two-nation theory with reference to the creation of a separate homeland for the Muslims of the Indian subcontinent), religious nationalism is a key driver behind the securitization of religious minorities. Although the existence of Muslim extremists is linked to how religion was used as a tool to recruit and mobilize mujahideen against the Soviet occupation of Afghanistan between 1979 and 1988, the global dynamics after the September 11, 2001, terrorist attacks and the “war on terror” have also influenced religious radicalization and extremism in Pakistan. In contrast, Buddhist and Hindu nationalism have been key drivers of religiously motivated extremism targeting religious minorities, especially Muslims, in Sri Lanka and India. There are similarities in terms of how Buddhist, Hindu, and Muslim extremist groups have been propagating hate and inciting violence; for instance, many extremist groups now increasingly use social media. As this article argues, the presence of religious extremism in South Asia presents a significant challenge to peace and security. This includes various forms of extremism targeting different religious groups and promoting anti-Western sentiments. International terrorist organizations are active in the region, while Hindu and Buddhist nationalists contribute to the marginalization and violence against Muslims. Creating an environment of tolerance, inclusivity, and respect for all religious communities is crucial to address these complex issues effectively.
Article
Michael J. Boyle
Unmanned aerial vehicles, otherwise known as drones, are one of the most important developments in global security in the 21st century. Drones, which can be operated remotely from ground pilots, are now in use by more than 100 countries and a growing number of non-state actors, such as terrorist groups. Some of this is driven by a booming export market in drones, with countries such as the United States, Israel, China, and Turkey becoming the world’s leading suppliers of the technology. Drones have begun to alter the course of conventional wars, as seen in Nagorno-Karabakh and Ukraine, and also have enabled new practices such as targeted killings of terrorist operatives either on their own territory or, in the case of the United States, on remote battlefields. Drones are also shifting how states attempt to deter and coerce each other and also enabling non-state actors such as terrorist groups to strike at opponents in new and surprising ways. As drones have begun to affect the security of individuals, non-state actors, and states, they have also yielded a number of legal and ethical controversies about when and where they should be used. In particular, the remote nature of the technology raises questions as to whether the distance of their pilots from the battlefields that they fight on is producing the “push-button warfare” mentality or otherwise lowering the barriers to the use of force. Future trends in the technological development of drone warfare, including swarming and the use of artificial intelligence–enabled drones, will only make coming to grips with the impact of drones on global security more important.
Article
David M. Rowe
Economic sanctions are a versatile instrument of statecraft used by states to try to influence the behavior of foreign actors by threatening or restricting customary cross-border trade or financial flows to an intended target. Examples of economic sanctions are retaliatory tariffs imposed in trade disputes and the complete cessation of economic flows aimed at undermining a certain regime. The importance of economic sanctions to policy makers has spawned a substantial amount of scholarly work dominated by two questions: whether sanctions “work” and whether states should use them. The long-running scholarly debate about whether sanctions work is essentially a dispute over how to classify cases. However, comparing cases of success and failure is problematic, in part because the very notion of what constitutes the successful use of sanctions is not clear and policy makers rarely seek to influence a single target or pursue a single policy goal when using sanctions. One of the most promising developments in the literature has been the increasing use of game theory to analyze sanctions, but this approach does not adequately determine the appropriateness of sanctions as a policy instrument. Sanctions research should focus instead on the basic strategic dynamics of the sanctions episode in order to identify those factors that contribute most strongly to the effective use of sanctions and to enable policy makers to understand more about the consequences of using sanctions as an instrument of statecraft.
Article
International relations (IR) and security studies lack a coherent and developed body of inquiry on the issue of empire. The central focus of IR situates discussion of imperialism and hierarchy outside the core of the discipline, and on its fringes where scholars from other disciplines engage with IR and security studies literature. Similarly, security studies focus on major war between great powers, not “small wars” between the strong and the weak. The general neglect of empire and imperialism in IR and security studies can be attributed to Eurocentrism, of the unreflective assumption of the centrality of Europe and latterly the West in human affairs. In IR this often involves placing the great powers at the center of analysis, as the primary agents in determining the fate of peoples. Too easily occluded here are the myriad international relations of co-constitution, which together shape societies and polities in both the global North and South. In 1986, Michael Doyle published Empires, a thoughtful effort to systematize the historiography of empire and imperialism with social science concepts. It is rarely cited, much less discussed, in disciplinary literature. By contrast, the pair of articles he published in 1983 on Kant and the connection between liberalism and peace revived the democratic peace research program, which became a key pillar of the liberal challenge to realism in the 1990s and is widely debated. The reception of Doyle’s work is indicative of how imperialism can be present but really absent in IR and security studies.
Article
John S. Duffield
A substantial amount of scholarly literature about the relationship between energy and security, and how it has changed over time, has been produced before the early 1970s through the 2000s. Relatively few scholarly works were written on energy and security prior to the 1970s, and few scholars paid attention to the growing dependence of the United States and its allies on oil, whether imported or not, and its potential political, economic, and security ramifications. During the 1970s, two major oil shocks prompted two overlapping waves of scholarship on energy and security. The first oil shock began in 1973, when the Arab members of OPEC cut back production and embargoed exports to the United States and several other countries that were deemed too sympathetic to Israel during the October War. A closely related theme was Western cooperation on energy security. In the late 1980s and 1990s, there was a notable decline in the amount of scholarship published on the theme of energy and security, probably due to an overall improvement in the oil security situation. The 2000s witnessed a renewed interest in the relationship between energy and security owing to a variety of factors, such as the run up in oil prices that occurred in 1999 and 2000, and the reemergence of resource nationalism. Despite the significant volume of scholarship on energy and security, it could be argued that the important relationship between them has yet to be fully explored and deserves more research.
Article
Özgür Özdamar
Next to national defense, energy security has become a primary issue for the survival and wellbeing of both developed and developing nations. A review of the literature shows how concerns for energy security acquired a new dimension after the collapse of the Soviet Union in 1991, when the Western powers and a weakened Russia competed for the control of the Eurasia region and its energy resources. Research has also focused on how different countries have developed a variety of strategies for securing their energy supply. Energy security literature can be split into three general sections: neoclassical economics and public choice, bureaucratic politics and public administration, and political economy. Scholars have also explored regime theory, resource conflict, and the relationship between national energy security and foreign policy. In the case of the United States, four major challenges in foreign policy issues related to energy security can be identified: “building alliances, strengthening collective energy security, asserting its interests with energy suppliers, and addressing the rise of state control in energy.” These challenges require eight specific foreign policy responses from the U.S. government, two of which constitute the core relationship between energy security and foreign policy making: “candor and respect” for the producer countries, and foreign policies that promote the stability and security of suppliers.
Article
Simon Dalby
Environmental security focuses on the ecological conditions necessary for sustainable development. It encompasses discussions of the relationships between environmental change and conflict as well as the larger global policy issues linking resources and international relations to the necessity for doing both development and security differently. Climate change has become an increasingly important part of the discussion as its consequences have become increasingly clear. What is not at all clear is in what circumstances climate change may turn out to be threat multiplier leading to conflict. Earth system science findings and the recognition of the scale of human transformations of nature in what is understood in the 21st century to be a new geological epoch, the Anthropocene, now require environmental security to be thought of in terms of preventing the worst dangers of fragile states being unable to cope with the stresses caused by rapid environmental change or perhaps the economic disruptions caused by necessary transitions to a post fossil fueled economic system. But so far, at least, this focus on avoiding the worst consequences of future climate change has not displaced traditional policies of energy security that primarily ensure supplies of fossil fuels to power economic growth. Failure to make this transition will lead to further rapid disruptions of climate and add impetus to proposals to artificially intervene in the earth system using geoengineering techniques, which might in turn generate further conflicts from states with different interests in how the earth system is shaped in future. While the Paris Agreement on Climate Change recognized the urgency of tackling climate change, the topic has not become security policy priority for most states, nor yet for the United Nations, despite numerous policy efforts to securitize climate change and instigate emergency responses to deal with the issue. More optimistic interpretations of the future suggest possibilities of using environmental actions to facilitate peace building and a more constructive approach to shaping earth’s future.
Article
Elizabeth L. Chalecki
The term environment is often used as a short form for the biophysical environment, which refers to the biotic and abiotic surrounding of an organism or population, and consequently includes the factors that have an influence in their survival, development, and evolution. All life that has survived must have adapted to conditions of its environment. On one hand, part of the study of environmental science is the investigation of the effect of human activity on the environment. On the other hand, scholars also examine threats posed by environmental events and trends to individuals, communities, or nations, otherwise known as environmental security. It studies the impact of human conflict and international relations on the environment, or on how environmental problems cross state borders. Environmental security is a significant concept in two fields: international relations and international development. Within international development, projects may aim to improve aspects of environmental security such as food security or water security, along with connected aspects such as energy security. The importance of environmental security lies in the fact that it affects humankind and its institutions anywhere and at anytime. To the extent that humankind neglects to maintain the planet’s life-supporting eco-systems generating water, food, medicine, and clean air, current and future generations will be confronted with increasingly severe instances of environmentally induced changes.