Professional Documents
Culture Documents
BG Cyber Terrorism
BG Cyber Terrorism
BG Cyber Terrorism
Greetings Delegates!
It is our pleasure to welcome you to the simulation of the General Assembly- DISEC of the
United Nation’s at the GEHU MUN 2018.
In this committee we shall be discussing a very challenging and common subject in today’s
time- DELIBERATION ON CYBER SECURITY AND CYBER TERRORISM. The increase in number of
these activities is the major concern at present for the international community.
This background guide will provide you a brief overview of the committee and the agenda.
Please note that this background guide is in no way meant to be an exhaustive guide on the
subject, but merely a stepping stone for the rest of your research, which you are, expected to
undertake yourself.
Delegates are supposed to accumulate all the basic knowledge about their own countries as
well as, be aware about the basic international policies. Large emphasis should be upon their
country’s foreign policies and its government’s stand on the issue at hand.
Finally, we on the executive board are at your disposal if you are to have any questions.
STATE OPERATED NEWS AGENCIES- these reports can be used in the support of or
against the state that owns the news agency. These reports if credible or
substantial enough, can be used in support of or not as any country as such but in
that situation, they can be denied by any other country in the council. Some
examples are:
RIA Novosti (Russia) http://en.rian.ru/
IRNA (Iran) http://www.irna.ir/ENIndex.htm
B. GOVERNMENT REPORTS
These reports can be used in a similar way as the state operated news agencies
reports can in all circumstances be denied by another country. However a nuance
is that a report that is being denied by a certain country can still be accepted by
the executive board as a credible information.
POINTS
1. POINT OF PERSONAL PRIVILEGE
Whenever a delegate experiences personal physical discomfort, which impairs
him/her from taking part in the proceeding, he/she may rise to a point of personal
privilege, so that the discomfort may be corrected. Such a point may interrupt a
speaker and so should be used with the utmost discretion.
2. POINT OF ORDER
During the discussion of any matter a delegate may rise to a point of order to point
out any statement by any other delegate which may be out of order or improper in
terms of factual representation. It is not applicable on opinions and beliefs and must
be backed by requisite proof. This point may be raised only when the executive board
allows and is completely suspended within informal consultation.
3. POINT OF ORDER TO THE EXECUTIVE BOARD
If at any point of time the executive board commits any inaccuracy in the rules of
procedure or commits a factual inaccuracy in any statement, a point of order can be
raised against the executive board to correct the inaccuracy.
4. POINT OF PARLIAMENTARY ENQUIRY
When the floor is open, a delegate may rise to a point of parliamentary enquiry to ask
the chairperson a question regarding the rules of procedure. This however may never
interrupt a speaker.
AGENDA: DELIBERATION ON CYBER SECURITY AND CYBER
TERRORISM
A. COMMITTEE BACKGROUND
The Disarmament and International Security Committee deals with global
challenges and threats to peace that affect the international community and seeks
out solutions to the challenges in the international security regime. It considers all
disarmament and international security matters within the scope of the Charter or
relating to the powers and functions of any other organ of the United Nations; the
general principles of cooperation in the maintenance of international peace and
security, as well as principles governing disarmament and the regulation of arms;
promotion of cooperative arrangements and measures aimed at strengthening
stability through lower levels of armaments. Founded in 1945, DISEC has been
involved with security threats, nuclear weapons, and arms deals for over 70 years.
Today, it continues to make the world safer, in spite of the growing security
concerns in the modern age.
B. TOPIC OVERVIEW: RISE OF INTERNATIONAL CYBER WARFARE
There is some debate as to the validity of the term cyber warfare. An act of cyber
war would, according to some, have to be lethal, political, and instrumental to be
considered war. Currently, what we refer to as cyber warfare could be classified as
spying, subversion, and sabotage. For the purposes of this committee, it is
recommended that delegates include spying, subversion, and sabotage within the
admittedly loose definition of cyber war.
Some feel cyber warfare shows promise, as it is a method countries can use to
attack each other with significantly fewer casualties. In response to this, others
feel that the lives lost will primarily be citizens who are not engaged in conflict,
while casualties of traditional wars include soldiers. An example of how electronic
warfare may affect citizens more is remote interference with modern cars’
computers, transferring control of the vehicle
Other uses for cyber warfare are more intriguing. If, for example, a foreign power
were to shut down interact in Canada, many people will not have the ability to buy
food, gasoline, and other necessities. This will not only displease citizens and
create dissent for the government, but will also stunt the economic growth needed
to keep a war functioning. Citizens are not the only ones at risk: a breach in
security may reveal troop placements in traditional war, and may result in
immense casualties. A similar breach in a military’ s logistics and finance may
prevent them from purchasing more vital supplies, such as ammunition or food,
and could also disrupt delivery, resulting in supplies being dumped in the middle of
a desert instead of a military base.’
C. BLOC POSITIONS
1. UNITED STATES OF AMERICA
The United States of America is the largest military superpower in the world, and
will take any measure necessary to ensure that their dominance is uncontested in
any field. In addition to this, America, as a developed country, some reports have
stated the power grid may be vulnerable to an attack, and while many methods to
attack other nations have been created, attempts to fix any vulnerability are
extremely common, as evidenced by unending patches and versions released on
operating systems and programs. These established pieces of infrastructure are
not invincible, as there is almost always another way to exploit a system. One
notable policy the United States has adopted is the five pillars, which outlines how
America should prepare itself for internet-based attacks. The main points are
recognition, active defense, defense of critical infrastructure, collective defense,
and maintenance of advantage.
2. RUSSIAN FEDERATION
Russia’s program for espionage and cyber warfare is developed, but larger attacks
have remained out of the public’s attention. Allegations against Russia include
internet surveillance, denial of service attacks, spreading propaganda and
disinformation, and distribution of harmful malware. Russia is third in the world in
total military spending, and clearly has not overlooked or underfunded computer-
based conflict.
3. PEOPLE’S REPUBLIC OF CHINA
Cyber warfare in China is a controversial topic. Officials in the United States, India
and other countries have reported numerous occasions when Chinese hackers
have allegedly attacked other countries, but the Chinese government denies this
vehemently. The issue is complicated by private organizations in China, which are
dedicated to international espionage. Overall, China’s main cyber warfare target is
the United States of America, with a reported 61,000 cyber-attacks carried out
between the two countries since 2009. This conflict is nearly unavoidable, as both
countries desperately wish to showcase their technological might on the world
stage. Ultimately, although China continues to deny its use of cyber warfare, it is
abundantly clear that various forms of online espionage are being utilized by the
country’s government and its private organizations on a daily basis.