Feeds

Western consumption helping to kill off species

Sydney Uni maps global extinction link to trade

Beginner's guide to SSL certificates

Grab a coffee, add two sugars, and check the news on your tablet: you’ve just helped kill off a species in a country you might never have heard of.

A school of physics may not be where you expect someone to analyze endangered species, but that’s the source of research from Sydney University, showing the link between the gadget, food and resources supply chains and global extinctions.

In an extraordinary feat of data collection spanning years, the researchers from the University’s Integrated Sustainability Analysis group in its School of Physics gathered data on five billion supply chains, and 15,000 commodities in 187 countries, and compared all this to a register of 25,000 endangered species.

The Web of the global supply chain is a species-killer. Source: University of Sydney

As much as a third of global species threats are due to global trade, the research finds. This is a huge shift, the researchers say, compared to a pre-globalised world, where many species threats were localized (due, for example, to local demands for food, fuel and living space).

In essence, the research finds that advanced economies – the places that try and police their own backyards, once our middle classes start noticing that such things matter – have mostly exported environmental destruction to countries that supply them with agricultural products, resource commodities, or manufactured goods.

Australia is a notable and not-honourable exception to this: our enthusiasm for mining makes us a net exporter of goods that endanger species through pollution and habitat loss (not that this is likely to give pause to people like Titanic-replica-builder and CIA conspiracy theorist Clive Palmer).

It’s across the board, the researchers say: developed countries’ demand for sugar, coffee, tea, timber, textiles, and raw materials for manufactured goods (read: blood minerals for electronics) all export environmental destruction to the supplier and cause “a biodiversity footprint that is larger than at home”.

Professor Manfred Lenzen, lead author of the research (abstract here) says he hopes the research will drive better product labeling and regulation, with co-author Barney Foran saying that sustainability shouldn’t be “a premium product”. ®

Internet Security Threat Report 2014

More from The Register

next story
GRAV WAVE DRAMA: 'Big Bang echo' may have been grit on the scanner – boffins
Exit Planet Dust on faster-than-light expansion of universe
SpaceX Dragon cargo truck flies 3D printer to ISS: Clawdown in 3, 2...
Craft berths at space station with supplies, experiments, toys
That glass of water you just drank? It was OLDER than the SUN
One MEELLION years older. Some of it anyway
Big dinosaur wowed females with its ENORMOUS HOOTER
That's right, Doris, I've got biggest snout in the prehistoric world
Japanese volcano eruption reportedly leaves 31 people presumed dead
Hopes fade of finding survivors on Mount Ontake
Relive the death of Earth over and over again in Extinction Game
Apocalypse now, and tomorrow, and the next day, and the day after that ...
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.