The Center for Climate & Security

Home » climate change » Sleeper Species: Increasing Threats to Great Lakes’ Ecological Security and What to Do About It

Sleeper Species: Increasing Threats to Great Lakes’ Ecological Security and What to Do About It


Introduction

Biological invasions—the establishment and spread of non-native species in new regions—is one of the greatest threats to the ecological security of the Great Lakes basin, which spans the United States and Canada.1 The threat lies with the ability of a non-native introduced species to become invasive—to spread aggressively and cause undesirable impacts to the environment, economy, and human health.2 However, not all non-native introduced species become invasive, at least not immediately. There can be a time lag between introduction, establishment, and harm, dictated by some local environmental condition (e.g., temperature or precipitation) that limits or suppresses the non-native species. When a shift in that environmental condition occurs, perhaps driven by changes in climate, nutrients, or water levels, a threshold may be breached, triggering an eruption in the once-inconspicuous (i.e., “sleeping”) non-native population. Once this biotic eruption has occurred, the newly invasive species may destabilize the local ecosystem, potentially even tipping an entire ecological system into an alternative state.3 Major changes or state shifts in ecosystems resulting from species invasions can undermine biodiversity, food, and economic security and even increase exposure to zoonotic diseases.4

The potential for non-native species to meet the “sleeper” definition is growing as climate change drives more frequent and intense fluctuations in weather events, thus providing conditions for these species to erupt. Consequently, management might require a new suite of special monitoring and response capabilities. However, the unpredictable nature of sleeper species makes it difficult for land and water resource managers to prioritize funds and conservation activities to predict and counter invasion potential. For instance, species introductions can occur in small batches and isolated areas, and species need time before they can establish populations large enough to be noticed.

Even if natural resource managers know that a non-native species is present, the complexity of how that species interacts with the environment makes it extremely difficult to pinpoint exactly how or when it may become invasive. Understanding what environmental factors currently suppress the species’ population would bring resource managers closer to identifying potential tipping points that would release the sleeper, enabling invasion (Fig. 1).5 This management complexity grows when also accounting for the variety of ways species are introduced to new regions.

Figure 1: Climate change has the potential to create new conditions and lift environmental barriers that once limited non-native species growth. This change enables them to ‘awaken’ and transition quickly toward rapid population growth and potential invasion.6

As climate change creates opportunities for some species to be more successful, it will be challenging to build preventative frameworks that target already established invasive species while also adapting these frameworks to detect and monitor sleeper species rapidly. This briefer highlights the need for a cohesive management plan with a rapid response structure to address the threat of invasive and sleeper species, with emphasis on synergizing data collection, collaboration, and public translation of the threat. While this is a global issue, this briefer focuses on the environments, industries, and communities of the Laurentian Great Lakes, located in the northern Midwest of the United States and southern Canada (Fig. 2).7 These lakes are threatened by species introductions and invasions driven by booming recreational and shipping industries and an expanding economy.

Figure 2: The Great Lakes Region and Associated Watershed Boundaries8

Leave a Reply

Discover more from The Center for Climate & Security

Subscribe now to keep reading and get access to the full archive.

Continue reading