Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

SAN SILVESTRE MODEL UNITED NATIONS 2020

SECURITY COUNCIL

BACKGROUND GUIDE

CYBER WARFARE

DIRECTOR: EILEEN MANNING


ASSISTANT DIRECTOR: DANIELA RODRIGUEZ
CRISIS ROOM DIRECTOR: MIKAELA TANNERT

September 11th & 12th, 2020 www.sansilvestremun.com


Lima, Perú
________________________________________San Silvestre MUN 2020: Security Council 

Index

Letter from the Secretary-General 3

Letter from the Committee Director 4

History of the Committee 5

Definition of Key Terms 6

Introduction 7

Statement of the Issue 8

Background Information 9

Case study 01

Case study 02 10

Case study 03

Relevant Past Actions 11

Bloc Positions 13

QADMAs 14

Suggestions for Further Research 15

Position Paper Requirements

Bibliography 16

2
________________________________________San Silvestre MUN 2020: Security Council 

Letter from the Secretary General

Dear Delegates and Faculty Advisors,

Welcome to San Silvestre Model United Nations 2020! I am beyond excited for the committees to develop and for you
to have fun this so awaited weekend.

San Silvestre School’s MUN has hosted a yearly conference for over 10 years now, and we pride ourselves by saying
that COVID-19 has not stopped us this year. The amount of dedication, passion and work that has been put into the
making of SSMUN 2020 on behalf of the entire staff dates back to last year, when this dream was born. This edition of
SSMUN is the biggest yet, involving for the first time schools from outside Lima, and outside Peru. Our committees
involve past, present, future and fantastic topics that I am sure cover the interests of our delegates.

I joined MUN a few years ago, and since then, my love for this activity has grown by the day. After attending Harvard
Model United Nations in 2019, I realized how important it is for MUN to reach as many young students as it can. Not
only do we learn about relevant issues of global concern, but we engage in debate, find solutions, and take on, dare I
say, the biggest challenges. MUNers are capable of it all, and I believe that every skill we acquire from MUN now will
last a lifetime. As Secretary-General, I have seen me, and my teammates go through our worst and best. MUN has
taken me on an adventure of triumph and frustration, but it has given me my greatest joys. Even though MUN is a
competitive atmosphere, winning should not be crucial. I have learnt about my strengths, weaknesses, interests, and
about the relevance of diplomacy. I thank MUN for everything I am, and for the enriching experiences it has given me.

Finally, I want to encourage you all to keep doing MUN: to fail, to laugh, to cry and to be your own Best Delegate.
Meet people, engage in your character, and do not ever be afraid to speak your voice. MUN may be a simulation
today, but in no time it will be us making decisions for the prosperity of humankind.

On behalf of the restless Secretariat and Staff, we want to thank you all for being part of San Silvestre Model United
Nations 2020, and for giving us the opportunity to host such a fun conference. Enjoy the ride!

Yours in diplomacy,
Mariafé Barrantes
Secretary-General
San Silvestre Model United Nations 2020

3
________________________________________San Silvestre MUN 2020: Security Council 

Letter from the Committee Director

Dear delegates,

My name is Eileen Manning, and I am going to be your chair for this year's Security Council! When I first joined
MUN, I could barely speak to other girls in the training sessions, much less in public conferences. However, my 4
years of MUN experience have provided me the necessary tools that allow me to be chairing this committee today.
MUN has allowed me to learn, meet new people, travel to different places, and grow as a person in general - shaping
me into the individual I am today.

The Security Council is the committee that is charged with ensuring international peace and security in all areas of our
global society, with the internet being no exception. This is why throughout this committee we will be discussing the
different ways of combating cyberwarfare and deep web related activities. I have always found the topics of
cybersecurity and the deep web to be highly interesting, so I hope that you will all enjoy this committee and come up
with creative solutions. Even though I expect you all to address these matters with the seriousness that they merit, I
hope that you will also have fun.

In case you have any concerns or doubts regarding the committee, topic or background guide please do not hesitate to
write me at emanning82@sansilvestre.edu.pe.

Sincerely,

Eileen Manning
Director of the Security Council Committee
San Silvestre Model United Nations 2020

4
________________________________________San Silvestre MUN 2020: Security Council 

History of the Committee

The United Nations Security Council is one of the six main organs of the UN charter, as it holds the responsibility of
maintaining peace and security among the international community. It is the only organ with the power of making
decisions which all other member states must support and enforce. Following the end of the Second World War, the
Security Council was founded on October 24th, 1945 and held its first session on January 17th 1946.

It is made up of 15 members; 5 permanent ones and other 10 elected ones. The United States of America, United
Kingdom, France, China and Russia hold the permanent seats in the UNSC. These permanent 5, or P5, are granted the
right to veto resolutions, meaning one can vote against a resolution in order for it not to pass. Each member has one
vote, and any decision or resolution requires 9 out of 15 votes in favour as well as no veto votes for it to pass. The 10
elected states are chosen every 2 years from the different UN regional groups; Africa, Asia, Latin America,Western
Europe and others and Eastern Europe. Currently, the 10 elected states are Belgium, Dominican Republic, Estonia,
Germany, Indonesia, Niger, Saint Vincent and the Grenadines, South Africa, Tunisia and Viet Nam.

When facing a threat to international peace, the Security Council explores peaceful ways of settling the dispute. The
members are encouraged to reach an agreement by peaceful means. Actions such as designating representatives and
undertaking investigations are encouraged in this first phase. If the dispute reaches an armed conflict, then the Security
Council must try to secure a ceasefire to prevent an escalation of the conflict. In case of the previous measures not
working efficiently, the Council can resort to economic sanctions, arms embargo and even military action.

Directives
Apart from a resolution, delegates will have the chance to address immediate crises with directives. A directive is a
short document, usually only a few operative clauses in length, that attempts to resolve a specific issue in the
committee. The directive format also changes bloc dynamics to the extent that delegates in crisis committees usually
do not have a single dedicated bloc with which they consistently vote or support. It is common for two delegates to
co-author a directive and drastically disagree with the next directive discussed, as committee dynamics are much more
fluid.

Secret Actions
Secret Actions or Crisis Notes are the way with which delegates communicate with the crisis room. The crisis room is
a physically separate room staffed by Assistant Directors who act as the world as they respond to delegate notes. In
this sense, delegates can write to anyone in the world and expect a prompt response. This enables delegates to expand
their actions and impact on debate beyond what they do in committee. Secret Actions should be used as tools to
exercise each delegate’s assigned power.

5
________________________________________San Silvestre MUN 2020: Security Council 

Definition of Key Terms

Cyber-Warfare
There have been extensive discussions over a proper definition of the actions that compose Cyber Warfare and many
different explanations to this term have been given by various bodies.

According to certain international corporations, “cyber-warfare involves the actions by a nation-state or international
organization to attack and attempt to damage another nation's computers or information networks through, for
example, computer viruses or denial-of-service attacks.” From a view of security expertise, U.S. government security
expert Richard A. Clarke, in his book (Cyber War, 2010) defines cyber warfare as “actions by a nation-state to
penetrate another nation's computers or networks for the purposes of causing damage or disruption.”

Cybercrime
Cybercrime is described as “the criminal activity that utilizes an element of a computer or a computer network”.
Common types of cybercrime include online banking information theft, identity theft, online predatory crimes and
unauthorized computer access. Those activities can typically be divided into two categories: crimes that target
computer networks or devices and crimes that use computer networks to advance other criminal activities.

Cyberattack
Cyberattacks, also known as Computer Network Attacks (CNA), exploit computer systems, technology-dependent
enterprises and networks. They change computer codes, logic or data via a malicious code and can compromise data.
These CNAs can lead to cybercrimes like identity and information theft.

Cyberattacks can include, but are not limited to, offences such as system infiltration, viruses, password sniffing,
identity theft, fraud, spyware, instant messaging abuse and Denial of Service (DoS) on the digital side, but also
the theft of hardware, such as mobile devices or laptops.

Modern day attackers might include hackers, spies, terrorists or vandals.

Denial-of-Service Attack
Denial-of-service (DoS) is an attempt to make a machine or network resource unavailable to its intended users. A DoS
attack generally consists of efforts to temporarily or indefinitely interrupt or suspend services of a host connected to
the Internet by flooding the targeted machine with requests in order to interrupt normal traffic, rendering it
unprocessable and resulting in the denial of service to additional users.

6
________________________________________San Silvestre MUN 2020: Security Council 

Espionage and National Security Breaches


Espionage is the process in which one party gathers information about another party, which is not available to the
public, meaning it is uncovered covertly. They can do so by either using human spies or technical means (such as
hacking into systems). The information that countries tend to hide away from the public usually poses threats to
national security, the national economic or international state-relations. If the data becomes accessible, it increases the
risk of it being used against the nation itself or others.

Nearly 25% of all cyberattacks are espionage based, and there have been several cases in recent years of this. Some
cases include spying of Angela Merckel by the NSA, spying of private phone lines in countries such as the Bahamas,
Kenya, Mexico and Afghanistan by the NSA, and a data breach on the USA’s Office of Personnel Management, which
is assumed to have been done by China.

Cyber sabotage
Sabotage is defined as deliberate and malicious acts that result in the disruption of the normal processes and functions
or the destruction or damage of equipment or information. It is when computers and satellites that control specific
activities are damaged, and this damage leads to the disruption of the system and prevents the realization of the
activities.

This can involve the disruption of military activities, communications, power, water, fuel and transportation
infrastructure. It can also involve more civilian activities, as the breaches may disrupt electric power grids, trains, or
even the stock market.

Introduction

Today in the 21st century, technology is


advancing at an extremely rapid pace, with the
invention of the internet generating amazing
advances in communications, trade, science,
amongst other areas. However, the spread of the
internet has also led to the invasion and
incursion of the individual’s privacy, making
personal data open to anyone with a digital
device. Technology is slowly being integrated
into our lives making our human race even
more sedentary and dependable than ever.

7
________________________________________San Silvestre MUN 2020: Security Council 

Smartphones, computers, “smart cars”, even smart houses are now an inevitable part of our daily lives. What our
modern society does not seem to understand is how the internet is a weapon that points directly to each individual,
leaving every single person exposed and vulnerable to any possible danger.

This issue of privacy can be transferred to a global scale, since countries also suffer from this network vulnerability.
They are mostly threatened by international organizations that aim to obtain sensitive data, however, they may also be
vulnerable to digital attacks from other countries. Cyber-warfare tends to use less resources, is less dangerous for the
initiating state, can avoid being detected in the short-run and can do much more harm than just using troops.
Cyber-warfare takes advantage of vulnerabilities across networks, thus most nations are forced to be constantly
developing and testing their hacking abilities. Nations are working as hard as possible to fill out all their breaches, as
if one is discovered, it presents a danger not only for their army but to the whole world. It represents a great danger in
modern-day warfare and despite it not being commonly used, regulations are non-existent, making tracking its
development impossible.

Statement of the Issue

Cyber warfare is an issue that has risen in recent years due to the fact that past technologies were not developed
enough to allow cyber criminals to extract vital data from them. It is a constantly growing issue, yet its short existence
as a problem has resulted in the legal framework for cyberspace yet to be regulated, making any international action or
crime hard to track down and lawfully prosecute. This situation originates from several issues, as follows:

Cyberspace is not actually Space


Cyberspace cannot not be measured traditionally; it does not match with the traditional criteria. First of all, cyberspace
does not follow the logic of frontiers. The internet is a world without borders nor limitations, making information
completely accessible to any individual. Moreover, cyberspace is not governed nor any nation has sovereignty over it,
hence making it unfit to the traditional guidelines of frontiers. While an individual surfs on the internet, there is no
physical frontier that unables that person from accessing certain areas of the web hence making cyberspace a kind of
legal vacuum.

Lack of cooperation from the International Community


Cybercrime has been vaguely followed up by the international community. There are few countries that are currently
tracking down cybercrimes and properly prosecuting them. The European Union is one of the few united fronts
against cyber crime. The European Union Agency for Cybersecurity or ENISA was founded in 2004 and has been
fighting cybercrime since. Other organizations like NATO fight these crimes with a political purpose and a clear

8
________________________________________San Silvestre MUN 2020: Security Council 

opponent. The only international organization fighting cybercrime is the United Nations Office on Drugs and Crime
(UNODC). However, the fight against cybercrime is just a subtask in the greater goal to fight organized crime. A
specialized organization has not come into action yet.

Definitions of Cybercrime
There is a history of conflicts with definitions in cybercrime. Since there are no international guidelines to recognize
cybercrime, it has been inaccessible and unreachable to penalize crimes on the internet. There are digital attacks
conducted directly via the internet, such as credit card duplications, fraud, application of viruses, among others.
However, there is a second category of crime, this being the use of the internet as a platform of more tangible crimes
such as child pornogoraphy, marketizing the sale of illegal weapons or even recruitment of terrorist groups. This
fragmentation provokes the difficulty for the international community to create a legal framework of cybercrime and
therefore proper prosecution.

Background Information

Case study 01: Estonia 2007


The first case is of a cyber attack that took place in 2007 in Tallinn, Estonia. It was one of the first cyberattacks of this
scale, and had large repercussions on Estonia’s economy, not to mention that it also restricted the use of the internet to
its citizens via DOS attacks. It has now come to be known as the “Estonian Cyberwar”.

In April 2007 the Estonian government decided to move a soviet statue to the outskirts of the city. The statue, placed
by Soviet leaders in Estonia in 1947, represented USSR's victory over Nazism for the Russians, however, for the
Estonians it was a symbol of Soviet oppression. The movement of the soviet statue in Estonia led to protests from
different Russian speakers, and this, paired with false media reports of Russian news agencies, resulted in riots in the
country. Roughly 150 people were injured in these riots, 1,000 were detained, and 1 man was even killed. The next
day, Estonia was subject to DoS attacks, which rendered access to the Internet for the Estonians nearly impossible for
weeks. Online services of Estonian banks, media outlets and government bodies were taken down by unprecedented
levels of internet traffic. This led to both individuals and firms suffering, as they were unable to access email accounts,
digital documents, cash machines, amongst other technologies.

The attack raised awareness of the international community on network security and led to the creation of the
Cooperative Cyber Defense Center (CCDC) in 2008. This NATO based center has been followed by the launch of the
European Union agency for Network and Information Security (ENISA) by the European Union to help the Members
with questions of cybersecurity. Estonia's government has also taken up more security measures to prevent a future
attack. They set up a voluntary Cyber Defence Unit, and the country's leading IT experts are also trained by the

9
________________________________________San Silvestre MUN 2020: Security Council 

Ministry of Defence. These experts train to digitally defend their country by constantly practicing what to do if a
major utility or vital service provider is brought down by a cyber-attack. For their protection, they are security vetted
and remain anonymous.

Case study 02: Saudi Arabia 2012


The second case is the hack against the Saudi Aramco firm, a Saudi
Arabian multinational petroleum and natural gas company based in
Dhahran, Saudi Arabia that produced nearly 10% of the world’s oil.
Nowadays, this hack is considered to be one of the biggest hack’s in
the world's history. In 2012, a group of hackers known as the
“Cutting Sword of Justice” did a cyber attack on the firm, partially
wiping or totally destroying over 35,000 devices. The virus, called
Shamoon, was a virus used in the energy sector for cyber espionage.

The hack forced Aramco to temporarily shut down data centers all around the globe, in an effort to stop the virus from
spreading. Employees were forced to resort to working with pen and paper, and to carry out transactions without the
use of emails, phone calls, and other technological facilities. However, oil production remained steady at 9.5 million
barrels per day. Even though the firm stopped selling oil for the first days after the hack, they were forced to start
giving oil away for free in order to keep the production steady. After a few months, the firm recovered and bounced
back with a stronger security system, however a smaller firm would have been bankrupted.

As for the hackers, on the morning of the incident they identified themselves as the “Cutting Sword of Justice” and
took credit for their actions. They claimed that they were an “anti-oppression” and “anti-tyranny” hacker group, and
that they were “fed up of crimes and atrocities” taking place around the world, particularly in the Middle East and in
the Al-Saud regime in Saudi Arabia. They stated that their attack was “a warning to the tyrants of this country and
other countries that support such criminal disasters with injustice and oppression”, and explained that they chose this
particular firm due to the fact that it was the largest financial source for the Al-Saud regime.

Clearly there is more detail to how the hack was carried out and what other specific consequences it had, however, the
case provides some important things to note. These include the capabilities of modern day hackers and the tremendous
repercussions they can have in individuals, firms and governments, and how the impacts of cyber attacks, whilst
digital, can have enormous impacts on the physical world.

Case study 03: Ukraine 2015


The final case study is the Ukrainian power outage of 2015. On December 23rd, 2015, a group of hackers
entered the system of 3 different power companies. The attack left more than 250,000 Ukranian citizens
10
________________________________________San Silvestre MUN 2020: Security Council 

without power for several hours, and was the first operation of this magnitude - it was the first confirmed
hack that managed to take down a power grid.

Different cyber warfare officials have described the attack as “brilliant” and “extremely sophisticated” in
terms of the way that it was carried out. It was done by a skilled group of strategists who had been planning
the operation for several months. The identity of the hackers remains anonymous to this day, however,
Ukranian officials believed Russia to be behind the attack. The level of sophistication used in the attack
implies that it was a well-funded and well-trained team, which indicates that it was probably from a nation
state, however, it might have also been a non-state group or a case of collaboration between cybercriminals
and nation-state actors.

Relevant Past Actions

As has been previously mentioned, cybersecurity is a very recent issue in our society relative to other problems, and as
a result, few past actions have taken place in order to solve it:

2001-2010

Resolutions A/RES/55/63 and A/RES/56/121 on “Combating the criminal misuse of information technologies”

These resolutions were passed in 2001 and 2002. They mention the importance of the problem that is the misuse of
information technologies. The resolutions also highlight the work carried out by the European Union and other groups
and calls for international collaboration and standards regarding the issue.

Resolution A/RES/57/239 on the “Creation of a global culture of cybersecurity”

This resolution was adopted in 2003. It highlights the importance of international cooperation and summed up
previous resolutions, making a special note on the results of the World Summit on Information Security in Geneva
2003. The resolution asked all member states to collaborate on an international framework.

Resolution A/RES/64/211 on "Creation of a global culture of cybersecurity and taking stock of national efforts
to protect critical information infrastructures”

This resolution was adopted in 2010, and it emphasizes the results of the resolutions above (and on resolution
A/RES/58/199 - “Creation of a global culture of cybersecurity and the protection of critical information
infrastructures”) and invites, yet again, all member states to collaborate. The resolution contains an annex which
provides advice and general guidelines on how to establish and implement cybersecurity on state level.

11
________________________________________San Silvestre MUN 2020: Security Council 

2011-2020

Resolution 73/27 on “Developments in the Field of Information and Telecommunications in The Context of
International Security”

Developed in December 2018 by the UN General Assembly, this resolution focuses on the peaceful use of Information
and Communication Technologies (ICTs). It promotes the collaboration of both state and non-state actors along with
different nations in the sharing of information and the upkeep of human rights in cyberspace. The resolution also
included the creation of an Open End Working Group (OEWG) to “to further develop the rules, norms and principles
of responsible behaviour of States […], and the ways for their implementation”. The group met in 2019 and was to
report to the UN in 2020, however, the coronavirus pandemic resulted in the postponement of the reports. It is
important to note that the group was to work on a consensus basis, a situation that complicates the finding of common
ground regarding controversial topics such as cyberspace. The resolution also included a set of 13 norms for states to
follow regarding security in ICT’s.

Resolution A/RES/73/266 on “Advancing Responsible State Behaviour in Cyberspace in the Context of


International Security”

This resolution was also developed in December 2018 by the General Assembly. It created a Group of Governmental
Experts (GGE) on cyber space consisting of 25 members to study the question of norms and behaviors in cyber-space.
This group was to work closely together with different regional organizations such as the AU, EU and ASEAN. Whilst
smaller groups of experts can have the advantage of finding solutions quicker, they omit the opinions of certain UN
members.

It is important to note that both of these resolutions do not explicitly mention cybersecurity, but rather focus on ICTs.
They were both sponsored and supported by different groups in the United Nations and use information from the
Group of Experts on ICTs which was established following a 1998 resolution.

More Resolutions
Several other resolutions from the General Assembly were also called “Developments in the Field of Information and
Telecommunications in The Context of International Security”. These include A/RES/71/28 of 2016, A/RES/69/28 of
2014 and A/RES/68/243 of 2013. This shows that the international stage has realized the high importance of
cybersecurity and continues to make steps towards guidelines, information sharing, safety measures and other

12
________________________________________San Silvestre MUN 2020: Security Council 

necessary measures to provide cybersecurity not just for citizens directly but also by ensuring state security and
therefore important infrastructure. However, no concrete frameworks have been formalized yet.

Bloc Positions

United States and Russian Federation

It is widely known that throughout history, the US and Russia have been listed as the main users of the deep web, but
also as the main executors of cyberwarfare activities. As you must know, governments are constantly looking for
techniques of defense against foreign attacks, however, the US and Russia have been the two countries who have
discovered and immersed themselves into the web ‘sans frontieres’. Both of these governments have gained popularity
for developing their cyber-armies and actively funding the deep web. Amidst the history of the internet, it is suspected
that both nations work together and have joined resources in order to accelerate their knowledge on technology and
gain years of advantage against their international counterparts. This theory is supported by the record of cyberattacks
both countries have suffered from each other and the countless future attacks that their future beholds; almost
implying their governments are using each other as “testing grounds” for new technology and war methodology
advancements; like laboratory experiments on politics. The curious aspect of this theory is that, if it were to be true,
both nations have been keeping it a secret to the rest of the international community. Both of them have also carried
out disinformation campaigns or attacks targeting the government's critical infrastructure (Russia in Eastern Europe
and the US on DPRK).

China

The Chinese government is the country with the highest rates of hackers as well as the highest rate of cyberattacks, at
41% of the world's cyberattacks. The government is known for investing in the digital world, as it is constantly putting
resources towards their cyber-army. China has a firewall known as the “Great Firewall of China”, one of the harshest
internet censorship policies relative to the other permanent members of the security council. These policies cause
conflicts with several other countries. There are also conflicts between the USA and China. These two superpowers
had reached an agreement to stop hacking each other during peace times in order to collaborate for the establishment
of a code of conduct regarding cybersecurity. However, China is commonly believed to be behind several attacks to
the networks of the USA and its allies. 

Latin America and the Caribbean

13
________________________________________San Silvestre MUN 2020: Security Council 

Considering that these areas are both part of the developing world, they tend to lack very advanced technologies, and
thus tend to be more prone to cyberattacks. Whilst some nations such as Argentina have some of the most advanced
technological developments in the world, the area is overall more vulnerable to cyberattacks relative to Europe or
North America. These nations tend to require stricter regulations that will aid them and that will protect both their
critical infrastructure and their sovereignty.

North Atlantic Treaty Organization

This has been one of the most active groups on the topic, having taken several measures in order to combat the threats
of cyber warfare. Since the majority of countries have good technological developments and resources, they tend to
provide aid in this digital combat and fight for the protection of nations in the cyber world. Countries like Germany
have provided digital resources in order to combat the issue, and countries such as France are consistently advocating
for the creation of a code of conduct regarding cybersecurity. It is expected that by 2023 a command center with all
nation’s cyber capabilities shall be created.

Questions A Directive Must Answer (QADMAs)

1. Given modern breaches in cybersecurity, how should “cyber warfare” and “cyberattacks” be legally defined?

2. With the number and sophistication of cyberattacks increasing, what measures should be taken to prevent, or
decrease, future state to state cyberattacks?

3. Should an international framework be established to increase international cybersecurity? What must be done
to create an international framework?

4. Should there be reprimands on an international stage for state espionage?

5. Cyber threats originating from non state actors, especially rogue and terrorist organizations, are often excluded
in conversations regarding international cybersecurity. With increasing accessibility to tools of technological
destruction among individuals and non-state actors, what should be done to ensure security from them?

6. How can security be increased without violating the privacy of citizens? What measures can be taken to
ensure the right to personal privacy?

7. Computer systems and informational technologies are fields of constant change and evolution. What tactics
should be employed in order to keep up with advancements in cyber warfare technology?

14
________________________________________San Silvestre MUN 2020: Security Council 

Suggestions for Further Research

Even though we tried to be as detailed as possible in the elaboration of this Background Guide, delegates should not
limit themselves to this resource when doing research for the conference. Delegates should do further research on the
topic, as well as extensive research on the position of their country regarding the issue.
We recommend that delegates look up different cases of cyberwarfare that have directly affected or involved their
countries in order to have a clearer idea of how their country is related to the issue. We also recommend for delegates
to read previous resolutions.

Position Paper Requirements

Position Papers are the first document, and impression, given to the Chairs. This document describes the official
stance and policy of your country, and divides itself in three paragraphs. The heading should specify the topic being
debated, committee, delegation, the delegate’s name and school.
1. First Paragraph: The policy of the country being represented, in which ways has your country tackled the
topic to be debated and in which ways these policies intersect. This may be shown through statistics, historical
background, specific policies, laws, president’s statements and of course, previous programs your country has
implemented.
2. Second Paragraph: The relationship between the State and the International Community, in which ways has
your country contributed to UN initiatives regarding the topic, they may be resolutions, initiatives, or
activities altogether. It’s important to delimit the influence your country has with the UN in regards to the
topic.
3. Third Paragraph: What proposals does the delegation have to solve the problem? The Chair encourages
delegates to consider the following aspects: financial (who, and how will my project be funded?), institutional
(what institutions, of national or international regime, will be involved in its enforcement?), governmental (in
which ways can my delegation contribute in a unique way in this proposal?), term of enforcement (is the
implementation short, or long-term?), and applicability (is this proposal fit for all countries in committee or
only for those with certain characteristics?). If your proposal answers adequately the questions raised, then it’s
not only well-structured, but significantly competitive.
Position Papers should not exceed the length of one page without sources included. In order to be eligible for a prize
they must submit it before September 6th, until 11:59pm in Times New Roman size 11 to
emanning82@sansilvestre.edu.pe.
Note: All papers must include sources and bibliography as plagiarism will not be tolerated.

15
________________________________________San Silvestre MUN 2020: Security Council 

Bibliography

- https://www.aljazeera.com/indepth/features/2016/10/.html
- http://www.rand.org/topics/cyber-warfare.html
- http://thomasrid.org/no-cyber-war
- https://money.cnn.com/2015/08/05/technology/aramco-hack/
- https://www.saudiaramco.com/
- https://pastebin.com/HqAgaQRj
- https://www.cloudflare.com/learning/ddos/glossary/denial-of-service/
- https://www.un.org/securitycouncil/content/current-members
- https://www.un.org/disarmament/topics/informationsecurity/
- https://www.armscontrol.org/act/2013_09/TheUNTakesaBigStepForwardonCybersecurity
- https://fcw.com/articles/2016/03/09/cyberresiliencychowdhry.aspx
- https://ccdcoe.org/organisations/un/
- https://www.un.org/disarmament/open-ended-working-group/
- https://www.bbc.com/news/39655415
- https://www.vanityfair.com/news/2013/07/new-cyberwar-victims-american-business
- https://en.wikipedia.org/wiki/Cyberwarfare
- https://www.newsweek.com/intercept-wouldnt-reveal-country-us-spying-so-wikileaks-did-instead-252320
- https://www.npr.org/sections/thetwo-way/2015/06/04/412086068/massive-data-breach-puts-4-million-federal-
employees-records-at-risk
- https://edition.cnn.com/2015/06/04/politics/federal-agency-hacked-personnel-management/
- https://www.military.com/defensetech/2008/02/06/cyber-sabotage
- https://web.archive.org/web/20140521045928/https://firstlook.org/theintercept/article/2014/05/19/data-pirates-
caribbean-nsa-recording-every-cell-phone-call-bahamas/
- https://www.zdnet.com/article/cyberwar-a-guide-to-the-frightening-future-of-online-conflict/
- https://www.researchgate.net/figure/Growth-in-Internet-Connected-Devices-Objects-by-2020_fig17_2715855
22
- https://ccdcoe.org/organisations/un/
- https://www.wired.com/2016/03/inside-cunning-unprecedented-hack-ukraines-power-grid/
- https://ics.sans.org/media/E-ISAC_SANS_Ukraine_DUC_5.pdf
- https://ec.europa.eu/info/law/law-topic/data-protection/data-protection-eu_en
- https://sapiencyber.com.au/wp-content/uploads/2018/08/SC8-18738-Cyber-Defense-for-Critical-Infrastructure
.pdf
- https://interestingengineering.com/7-countries-having-the-majority-of-hackers
- A/RES/73/27
- A/RES/73/266
- A/RES/55/63
- A/RES/56/121
- A/RES/57/239
- A/RES/64/211

16

You might also like