Professional Documents
Culture Documents
FSMUN 8.0 UNHRC - Study Guide
FSMUN 8.0 UNHRC - Study Guide
- Prachet Sinha
Intro To The Agenda:
The issue of prioritising national security over the right to privacy has been one
that has been discussed at length the world over. Does a threat to national
security warrant a country to have unprecedented access to their citizens’ lives?
Or does a fundamental human right take priority over a potential threat? These
are the fundamental questions we wish to answer with the discussions to be
made in this committee, we’ve seen many historical instances where a country
has controlled variety of facets of their citizens’ lives under the guise of national
security, but do those arguments hold weight under scrutiny enacted by other
nations as their equals?
The delegates are highly encouraged to look into their country’s privacy laws
and surveillance laws, in order to gain a good understanding of the highly
nuanced stances most nations hold on this topic, and I would like to remind the
delegates that your nation’s own policy may even take precedence over your
foreign policy in agenda’s such as this one.
Important Definitions:
Privacy:
recognizes that each person has a sphere of existence and activity that properly
belongs to that individual alone, where he or she should be free of constraint,
coercion, and even uninvited observation.
Data Privacy:
Data privacy, or information privacy, often refers to a specific kind of privacy
linked to personal information (however that may be defined) that is provided
to private actors in a variety of different contexts.
National Security:
National security or national defence is the security and defence of a nation
state, including its citizens, economy, and institutions, which is regarded as a
duty of government.
Mass Surveillance:
Mass surveillance can subject a population or significant component thereof to
indiscriminate monitoring, involving a systematic interference with people’s
right to privacy and all the rights that privacy enables, including the freedom to
express yourself and to protest.
Privacy comes from the human desire to separate self and society, to make a
distinction between what is theirs and what they share with the outside world.
In the modern age, Warren and Brandeis’ “The Right to Privacy” from the
Harvard Law Review in 1890 stand as the most well-remembered references in
support of a fundamental right to privacy, or “the right to be left alone,” even at
that time the writer’s noted the threat to privacy posed by technological
advancements such as Instant Photography and News.
In the second half of the 20th century, more legal references to the right to
privacy being a fundamental right showed up in national legislations, to put the
protection of these rights into law.
International frameworks that set the right to privacy into stone include Article
12 of the Universal Declaration of Human Rights (United Nations, 1948), Article
17 of the International Covenant on Civil and Political Rights (United Nations,
1966), Article 8 of the European Convention of Human Rights (Council of
Europe, 1950) and Article 7 of the Charter of Fundamental Rights of the
European Union (2000). Thes state undoubtedly that the right to privacy is a
fundamental human right and that it must be protected in national legislations
as well.
Key Events/Stakeholders:
Pegasus
Spyware developed by the Israeli cyberarms firm NSO Group that can be
covertly installed on mobile phones running most versions of iOS and Android.
The 2021 Project Pegasus revelations suggest that the current Pegasus software
can exploit all recent iOS versions up to iOS 14.6. As of 2016, Pegasus was
capable of reading text messages, tracking calls, collecting passwords, location
tracking, accessing the target device's microphone and camera, and harvesting
information from apps. The spyware is named after Pegasus, the winged horse
of Greek mythology. It is a Trojan horse computer virus that can be sent "flying
through the air" to infect cell phones.
The NATGRID
The integrated intelligence master database structure for counter-terrorism
purpose connecting databases of various core security agencies under
Government of India collecting comprehensive patterns procured from 21
different organizations that can be readily accessed by security agencies round
the clock. The 26/11 attacks on Mumbai led to the exposure of several
weaknesses in India's intelligence gathering and action networks. NATGRID is
part of the radical overhaul of the security and intelligence apparatuses of India
that was mooted by the then Home Minister P. Chidambaram in 2009. The
National Investigation Agency (NIA) and the National Counter Terrorism Centre
(NCTC) are two organisations established in the aftermath of the Mumbai
attacks of 2008.
Useful Resources:
- Intelligence.gov: Privacy, Technology & National Security
- United Nations: Universal Declaration of Human Rights
- United Nations: The United Nations Charter
- Human Rights Media: Right to Privacy
- Privacy International: What Is Privacy?
- i-Sight: A Practical Guide To Data Privacy Laws By Country
- UNCTAD: Data Protection & Privacy Legislation Worldwide
- Privacy International: United Nations Recognition of Privacy
- UN OHCHR: The right to privacy in the digital age, Report 2020