University of Southampton Research Repository

Total Page:16

File Type:pdf, Size:1020Kb

University of Southampton Research Repository University of Southampton Research Repository Copyright © and Moral Rights for this thesis and, where applicable, any accompanying data are retained by the author and/or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This thesis and the accompanying data cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder/s. The content of the thesis and accompanying research data (where applicable) must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holder/s. When referring to this thesis and any accompanying data, full bibliographic details must be given, e.g.: Ardron, J.A. 2020. Good governance of deep-seabed mining: transparency and the monitoring of environmental harm. University of Southampton, Faculty of Ocean and Earth Science, Graduate School of the National Oceanography Centre, Southampton (GSNOCS), PhD Thesis, 196pp. University of Southampton Faculty of Ocean and Earth Science Graduate School of the National Oceanography Centre, Southampton (GSNOCS) Good governance of deep-seabed mining: transparency and the monitoring of environmental harm by Jeffrey Allan Ardron ORCID ID 0000-0003-1326-0031 Thesis for the degree of Doctor of Philosophy September 2020 University of Southampton Abstract Faculty of Ocean and Earth Science Graduate School of the National Oceanography Centre, Southampton (GSNOCS) Thesis for the degree of Doctor of Philosophy Good governance of deep-seabed mining: transparency and the monitoring of environmental harm by Jeffrey Allan Ardron This thesis considers the good environmental governance of deep-seabed mining (DSM), with a focus on the seabed ‘Area’ beyond national jurisdiction (ABNJ). DSM in ABNJ has not yet begun, due in part to a lack of internationally agreed upon regulations. Shortly after this thesis research began, however, the International Seabed Authority (ISA) began consultations and drafting of its exploitation regulations, making this research particularly timely. Herein, two themes run throughout: i) transparency and ii) statistically robust monitoring of environmental impacts. For each of these themes, the research presented here suggests that there is considerable room for the ISA to improve its practices. For example, it is currently much less transparent than bodies managing international fisheries (Chapter 2). Furthermore, its practices largely do not meet the expectations contained in recognised standards for terrestrial mining and other related sectors (Chapter 3). Regarding the monitoring of environmental impacts, the ISA calls for statistical robustness. However, it currently lacks guidance on how such robustness should be assessed and reported upon. Mortality modelling conducted here (Chapter 4), using data from the Clarion- Clipperton Zone, suggests that impacts on benthic megafauna from neighbouring polymetallic nodule mining operations could be difficult to detect until it is ‘too late’; i.e. only after serious harm has already occurred. To be able to detect early warnings of possible serious environmental harm, monitoring design will need to take into account increased statistical power from the outset, which will require large sample areas (containing 500-750 individuals) and adequate replication ( ≥5 sites) in order to be able to rule out ‘false negatives’; i.e. type II errors. The thesis contains 45 recommendations, which if implemented by the ISA would improve the likelihood of statistically robust environmental monitoring and informed decision making. Additionally, in Chapter 5 (Epilogue), three simply stated, overarching good practices are put forward, not only for the ISA, but for DSM contractors and researchers alike: i) ensure DSM environmental data are readily available; ii) establish robust statistical practices in the analysis of environmental data; and iii) be inclusive when considering the results of environmental data analyses. Table of Contents Table of Contents Table of Contents .......................................................................................................... i Table of Tables ............................................................................................................ vii Table of Figures ............................................................................................................ix Research Thesis: Declaration of Authorship ..................................................................xi Acknowledgements ..................................................................................................... xii Definitions and Abbreviations ...................................................................................... xv Chapter 1 Introduction ............................................................................................... 1 1.1 Abstract ...................................................................................................................... 1 1.2 Brief context ............................................................................................................... 1 1.3 A brief history of deep-seabed mining interest ......................................................... 3 1.4 United Nations Convention on the Law of the Sea .................................................... 6 1.5 The International Seabed Authority ........................................................................... 7 1.5.1 The legally dormant years: 1982-1994 .............................................................. 7 1.5.2 ISA operations .................................................................................................... 8 1.6 Good governance of natural resources: lessons learned from national jurisdictions .................................................................................................................................. 11 1.6.1 Natural resource problems and good governance .......................................... 12 1.6.2 Developing states and DSM ............................................................................. 13 1.6.3 Nautilus Minerals Inc.: a case study ................................................................. 14 1.7 Research question .................................................................................................... 17 1.8 Key definitions and commentary ............................................................................. 17 1.8.1 Deep-seabed mining ........................................................................................ 17 1.8.2 Policy-science elements ................................................................................... 18 1.8.3 Good governance ............................................................................................. 18 1.8.4 Serious harm .................................................................................................... 19 1.9 The chapters ahead .................................................................................................. 22 Chapter 2 Transparency in the operations of the International Seabed Authority: an initial assessment ..................................................................................... 25 i Table of Contents 2.1 Abstract .................................................................................................................... 25 2.2 Introduction ............................................................................................................. 26 2.3 Methods ................................................................................................................... 28 2.4 Results ...................................................................................................................... 29 2.4.1 Availability of data and basic information ....................................................... 29 2.4.2 Participation in decision-making ..................................................................... 30 2.4.3 Access to outcomes ......................................................................................... 32 2.4.4 Two supplementary questions ........................................................................ 35 2.5 Discussion................................................................................................................. 36 2.6 Recommendations ................................................................................................... 40 2.6.1 Availability of data and basic information ....................................................... 40 2.6.2 Participation in decision-making ..................................................................... 41 2.6.3 Access to outcomes and to justice .................................................................. 41 2.6.4 Contractual and financial transparency ........................................................... 42 2.7 Conclusion ................................................................................................................ 42 Chapter 3 Incorporating transparency into the governance of deep-seabed mining in the Area beyond national jurisdiction ....................................................... 43 3.1 Abstract .................................................................................................................... 43 3.2 Introduction ............................................................................................................
Recommended publications
  • Covertactloii Informmon BULLETIN R ^
    Number 9 • June 1980 $2.00 SPECIAL TECHNOLOGY ISSUE ^ CovertActloii INFORMmON BULLETIN r ^ V Editorial Last issue we noted that no CIA charter at all would be Overplaying Its Hand better than the one then working its way through Congress. It now seems that pressures from the right and left and the Perhaps the CIA overplayed its hand. Bolstered by complexities of election year politics in the United States events in Iran and Afghanistan the Agency was not content have all combined to achieve this result. to accept a "mixed" charter. By the beginning of 1980 journalists were convinced that no restrictions would pass. Stalling and Dealing Accountability, suggested Los Angeles Times writer Robert Toth, would remain minimal and uncodified, and At the time of the Church Committee Report in 1976, "Congress, responding to the crisis atmosphere during a there were calls for massive intelligence reforms and ser short election-year session, will set aside the complex legal ious restrictions on the CIA. By a sophisticated mixture of issues in the proposed charter while ending key restraints stalling, stonewalling, and deal-making, the CIA and its on the CIA and other intelligence agencies." It now seems supporters managed, in three years, to reverse the trend that Toth was 100% wrong. completely. There were demands to "unleash" the CIA. A first draft charter proposed some new restrictions and re laxed some existing ones. The Administration, guided by The Disappearing Moral Issue the CIA, attacked all the restrictions. The Attorney Gener al criticized "unnecessary restrictions," and hoped that The major public debate involved prior notice.
    [Show full text]
  • Princeton Diplomatic Invitational 2020
    Top Secret // ORCON // JENNIFER Princeton Diplomatic Invitational 2020 Project Azorian Chairs: Kris Hristov & Scott Overbey Crisis Director: Gabriel Peña 1 Top Secret // ORCON // JENNIFER Top Secret // ORCON // JENNIFER CONTENTS CONTENTS ........................................................................................................................... 2 LETTERS FROM THE STAFF ......................................................................................... 3 COMMITTEE DESCRIPTION ......................................................................................... 5 24 hour format .................................................................................................................... 6 Committee Sessions 1&2 ................................................................................................... 6 Committee Session 3 through 6 ........................................................................................ 6 CURRENT STATUS ............................................................................................................ 7 A Brief Summary of Nuclear Weapons ........................................................................... 7 MAD About You: Nuclear Tactics .................................................................................. 9 Rocketmen: Delivery Systems ......................................................................................... 11 The Red Banner Fleet: The Soviet Nuclear Navy ........................................................ 12 K-129
    [Show full text]
  • Ebook Download Dark Side of Camelot, the Ebook
    DARK SIDE OF CAMELOT, THE PDF, EPUB, EBOOK Seymour M. Hersh | 528 pages | 01 Sep 1998 | Little, Brown & Company | 9780316360678 | English | New York, United States Dark Side of Camelot, the PDF Book Time for the Grab Bag! Hersh asked me a year or two ago if I'd learned anything new; when I told him that a former C. That said, I did not like this book. Does anyone still think John F. A hero. Democracy Now. Hersh has accused the Obama administration of lying about the events surrounding the death of Osama bin Laden and disputed the claim that the Assad regime used chemical weapons on civilians in the Syrian Civil War. Basically what happened is that those women who were arrested with young boys, children, in cases that have been recorded, the boys were sodomized, with the cameras rolling, and the worst above all of them is the soundtrack of the boys shrieking. No trivia or quizzes yet. Some of Hersh's speeches concerning the Iraq War have described violent incidents involving U. Archived from the original PDF on March 26, Friend Reviews. Retrieved September 27, Retrieved May 16, To widen my studies I also include prominent biographies and many other Kennedy tomes. Nothing in ''The Dark Side of Camelot'' gives off even a whiff of the dead-fish aroma of the trust fund for Marilyn's Mom, but Kennedy loyalists, joined by others who just don't want to know, are using Hersh's terrible misstep to dismiss what he has dug up as trifling gossip and unsupported hearsay.
    [Show full text]
  • Hughes Glomar Explorer a Mark of World-Class Engineering History
    D EPARTMENTS D RILLING AHEAD Hughes Glomar Explorer a mark of world-class engineering history Linda Hsieh, Associate Editor the “claw” and load during the transition from dynamic open water conditions to THIRTY-FIVE YEARS ago, at the height the shelter of the ship’s center well. of the Cold War, the US government drew a plan to retrieve part of a sunken Soviet A COVERT MISSION submarine from the Pacific Ocean. And to realize that plan, the government To hide the ship’s real mission, a story turned to the drilling industry. was concocted that billionaire Howard Hughes built it for deep sea mining. It Specifically, the Central Intelligence was a great cover-up, Mr Crooke said. Agency turned to Global Marine in “Who knew what a mining ship really Houston. CIA agents showed up at the looked like? It could look like whatever company in November 1969 and asked we wanted it to look like!” it to do what, at the time, seemed an impossible task: lift a 2,000-ton asym- T he Explorer was completed in July 1973 metrical object from about 17,000 ft of at a cost of more than $200 million, and water. the salvage mission commenced a year later in July 1974, taking just 5 weeks to But Curtis Crooke, then Global Marine’s complete . vice president of engineering , believed the task was possible, and so the com- In 1996, Global Marine leased the ves- pany was recruited into a government sel and converted it into a deepwater “black” program – completely classified drillship.
    [Show full text]
  • A Mechanically Marvelous Sea Saga: Plumbing the Depths of Cold War Paranoia Jack Mcguinn, Senior Editor
    addendum A Mechanically Marvelous Sea Saga: Plumbing the Depths of Cold War Paranoia Jack McGuinn, Senior Editor In the summer of 1974, long before Argo, there was “AZORIAN” — the code name for a CIA gambit to recover cargo entombed in a sunk- en Soviet submarine — the K-129 — from the bottom of the Pacific Ocean. The challenge: exhume — intact — a 2,000-ton submarine and its suspicious cargo from 17,000 feet of water. HowardUndated Robard Hughes Jr. photo of a young Howard Hughes — The Soviet sub had met its end (no one ($3.7 billion in 2013 dollars),” but none entrepreneur, inventor, movie producer — whose claims to know how, and the Russians of it came out of Hughes’ pocket. Jimmy Stewart-like weren’t talking) in 1968, all hands lost, Designated by ASME in 2006 as “a appearance here belies some 1,560 nautical miles northwest of historical mechanical engineering land- the truly bizarre enigma he would later become. Hawaii. After a Soviet-led, unsuccessful mark,” the ship had an array of mechani- search for the K-129, the U.S. undertook cal and electromechanical systems with one of its own and, by the use of gath- heavy-duty applications requiring robust But now, the bad news: After a num- ered sophisticated acoustic data, located gear boxes; gear drives; linear motion ber of attempts, the ship’s “custom claw” the vessel. rack-and-pinion systems; and precision managed to sustain a firm grip on the What made this noteworthy was that teleprint (planetary, sun, open) gears. submarine, but at about 9,000 feet the U-boat was armed with nuclear mis- One standout was the Glomar’s roughly two-thirds of the (forward) hull siles.
    [Show full text]
  • Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • Final Report: National Register of Historic Places/California Register of Historical Resources Evaluation for The
    Prepared for: FINAL REPORT: NATIONAL REGISTER OF HISTORIC PLACES/CALIFORNIA REGISTER OF HISTORICAL RESOURCES EVALUATION FOR THE POINT SUR NAVFAC, POINT SUR Central Coast Lighthouse Keepers STATE HISTORIC PARK, CALIFORNIA P.O. Box 223014 Carmel, CA 93922 And Monterey District 2211 Garden Road Monterey, CA 93940 Prepared by: P.O. Box 721 Pacific Grove, California 93950 April 2013 Point Sur NAVFAC Final National/California Register Evaluation PAST Consultants, LLC April 2013 TABLE OF CONTENTS I. EXECUTIVE SUMMARY ..................................................................................... 1 II. INTRODUCTION.................................................................................................... 3 Introduction ............................................................................................................... 3 Project Description..................................................................................................... 4 Project Team .............................................................................................................. 5 Organization of the Report ........................................................................................ 5 Methodology and Research Materials ...................................................................... 6 Previous Evaluations and Correspondence ............................................................... 8 Federal Guidelines for the Documentation and Historical Evaluation of Cold War Properties..................................................................................................
    [Show full text]
  • Deep Sea Drilling Project Initial Reports Volume 49
    Initial Reports of the Deep Sea Drilling Project A Project Planned by and Carried Out With the Advice of the JOINT OCEANOGRAPHIC INSTITUTIONS FOR DEEP EARTH SAMPLING (JOIDES) Volume XLIX covering Leg 49 of the cruises of the Drilling Vessel Glomar Challenger Aberdeen, Scotland to Funchal, Madeira July—September 1976 PARTICIPATING SCIENTISTS Bruce P. Luyendyk, Joe R. Cann, Wendell A. Duffield, Angela M. Faller, Kazuo Kobayashi, Richard Z. Poore, William P. Roberts, George Sharman, Alexander N. Shor, Maureen Steiner, John C. Steinmetz, Jacques Varet, Walter Vennum, David A. Wood, and Boris P. Zolotarev SHIPBOARD SCIENCE REPRESENTATIVE George Sharman POST-CRUISE SCIENCE REPRESENTATIVE Stan M. White SCIENCE EDITOR James D. Shambach Prepared for the NATIONAL SCIENCE FOUNDATION National Ocean Sediment Coring Program Under Contract C-482 By the UNIVERSITY OF CALIFORNIA Scripps Institution of Oceanography Prime Contractor for the Project This material is based upon research supported by the National Science Foundation under Contract No. C-482. Any opinions, findings, and conclusions or recommendations ex- pressed in this publication are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. References to this Volume: It is recommended that reference to whole or part of this volume be made in one of the following forms, as appropriate: Luyendyk, B. P., Cann, J. R., et al., 1978. Initial Reports of the Deep Sea Drilling Project, v. 49: Washington (U.S. Government Printing Office). Mattinson, J. M., 1978. Lead isotope studies of basalts from IPOD Leg 49, In Luyendyk, B. P., Cann, J. R., et al., 1978.
    [Show full text]
  • FY 2004 Budget Request Summary
    TABLE OF CONTENTS Bureau Overview..............................................................................................1 Organizational Chart ...........................................................................................2 MMS Assessment Management Process ............................................................3 Fiscal and Energy Benefits of MMS Activities .................................................5 What Does the Future Hold? ...........................................................................7 FY 2004 Budget Request Summary ...................................................................8 Maintaining Operations ......................................................................................9 Visionary Requirement .....................................................................................10 Increased Security ............................................................................................11 Total FY 204 Funding for MMS Operations.....................................................11 Making Improvements ......................................................................................12 President’s Management Agenda .....................................................................13 Contributions to DOI Draft Strategic Plan .......................................................16 Budget Allocation Table ..................................................................................17 Budget Estimate..........................................................................
    [Show full text]
  • Central Intelligence Agency (CIA) Mandatory Declassification Review (MDR) Log, 2010-2016
    Description of document: Central Intelligence Agency (CIA) Mandatory Declassification Review (MDR) Log, 2010-2016 Requested date: 24-October-2016 Released date: 21-November-2016 Posted date: 12-December-2016 Source of document: Freedom of Information Act Request Information and Privacy Coordinator Central Intelligence Agency Washington, D.C. 20505 Fax: 703-613-3007 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. Central Intelligence Agency Washington. D.C. 20505 21 November 2016 Reference: F-2017-00161 This is a final response to your 24 October 2016 Freedom of Information Act request for copies of the Mandatory Declassification Review (MDR) Log maintained by the Central Intelligence Agency.
    [Show full text]
  • The Implausibility of Secrecy, 65 Hastings L.J
    University of Florida Levin College of Law UF Law Scholarship Repository Faculty Publications Faculty Scholarship 2-1-2014 The mplI ausibility of Secrecy Mark Fenster University of Florida Levin College of Law, [email protected] Follow this and additional works at: http://scholarship.law.ufl.edu/facultypub Part of the Administrative Law Commons, National Security Commons, and the Politics Commons Recommended Citation Mark Fenster, The Implausibility of Secrecy, 65 Hastings L.J. 309 (2014), available at http://scholarship.law.ufl.edu/facultypub/347 This Article is brought to you for free and open access by the Faculty Scholarship at UF Law Scholarship Repository. It has been accepted for inclusion in Faculty Publications by an authorized administrator of UF Law Scholarship Repository. For more information, please contact [email protected]. Fenster_21 (M. Stevens) (Do Not Delete) 1/29/2014 6:39 PM Articles The Implausibility of Secrecy Mark Fenster Government secrecy frequently fails. Despite the executive branch’s obsessive hoarding of certain kinds of documents and its constitutional authority to do so, recent high-profile events—among them the WikiLeaks episode, the Obama administration’s infamous leak prosecutions, and the widespread disclosure by high-level officials of flattering confidential information to sympathetic reporters—undercut the image of a state that can classify and control its information. The effort to control government information requires human, bureaucratic, technological, and textual mechanisms that regularly founder or collapse in an administrative state, sometimes immediately and sometimes after an interval. Leaks, mistakes, and open sources all constitute paths out of the government’s informational clutches.
    [Show full text]
  • Nixon's Wars: Secrecy, Watergate, and the CIA
    Eastern Kentucky University Encompass Online Theses and Dissertations Student Scholarship January 2016 Nixon's Wars: Secrecy, Watergate, and the CIA Chris Collins Eastern Kentucky University Follow this and additional works at: https://encompass.eku.edu/etd Part of the Defense and Security Studies Commons, and the United States History Commons Recommended Citation Collins, Chris, "Nixon's Wars: Secrecy, Watergate, and the CIA" (2016). Online Theses and Dissertations. 352. https://encompass.eku.edu/etd/352 This Open Access Thesis is brought to you for free and open access by the Student Scholarship at Encompass. It has been accepted for inclusion in Online Theses and Dissertations by an authorized administrator of Encompass. For more information, please contact [email protected]. Nixon’s Wars: Secrecy, Watergate, and the CIA By Christopher M. Collins Bachelor of Arts Eastern Kentucky University Richmond, Kentucky 2011 Submitted to the Faculty of the Graduate School of Eastern Kentucky University In partial fulfillment of the requirements for the degree of MASTER OF ARTS December, 2016 Copyright © Christopher M. Collins, 2016 All rights reserved ii Acknowledgments I could not have completed this thesis without the support and generosity of many remarkable people. First, I am grateful to the entire EKU history department for creating such a wonderful environment in which to work. It has truly been a great experience. I am thankful to the members of my advisory committee, Dr. Robert Weise, Dr. Carolyn Dupont, and especially Dr. Thomas Appleton, who has been a true friend and mentor to me, and whose kind words and confidence in my work has been a tremendous source of encouragement, without which I would not have made it this far.
    [Show full text]