Study Guide - DISEC - CarMUN 2023

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 28

Index

1. Letter from the Secretary General 3


2. Letter from the Committee Director 4
3. Letter from the Committee Director 6
4. Introduction to the Topic 7
5. History of the Committee 9
United Nations Disarmament Commission
6. Key Concepts 12
Cyberwarfare
Cyberterrorism
Cybercrime
Artificial Intelligence
Facial Recognition Technology
Generative Adversarial Networks (GANs)
Lethal Autonomous Weapons Systems
7. History of the Topic 14
8. Points of Contention 16
Cyberwarfare, Artificial Intelligence & National Security
Impact on Surveillance and Technology
Lethal Autonomous Weapons Systems
Regulation of Artificial Intelligence
9. Case Studies 20
1. Lithuania, the highest number of cyber threats to businesses during this time
2. South Korea, another important victim of cyber attacks
3. Skolkovo a Russian foundation that suffered a cyber attack
4. Minneapolis public schools another victim of cyber attack
10. Questions A Resolution Must Answer (QARMA’S) 22
11. Final Remarks 23
12. Blog Posts 24
13. Bibliography 25

2
Letter from the Secretary General

Dear faculty advisors, staff members and fellow delegates,

It is my honor to welcome you to the 10th edition of Carmelitas Model United


Nations 2023. I am more than just euphoric to finally say we are back; after 3 years of
virtuality, Carmelitas School finally opens its doors once again.

We know that virtuality represents a challenge to develop our potential as


delegates. And being back to in-person MUN gives us an opportunity to begin our own
journey apart from developing our skills as delegates.

My journey in Model United Nations started in 2020, when I was just 13 years old. This
space helped me to open my eyes, facing different issues of the world, such as injustice,
poverty, discrimination, and other important global questions. My career is soon to end,
but if you need a small reminder, keep living yours as if tomorrow wouldn’t exist, and most
indispensable of all, be happy doing it.

Is this precisely what CarMUN wants to enlight this year. Nowadays, we live in a
world in which a lot of people decide to close their eyes in front of inequality, injustice;
each of us has the power to do something to face this, but most of us wonder if we could
do it. That's why, the topic of this conference will be focused on how each delegate has
huge power to change the status Quo, to open their eyes and to make a difference to
this world. Therefore, CarMUN 2023 is focusing on converting the words in action.

Hence, I highly encourage taking advantage of each second, not only in CarMUN
or in any other MUN, but in each moment of life to make a difference. This conference will
help you to develop all your skills. I am deeply pleased to form part of your personal
journey and believe me, you will form part of mine. Remember that your participation is
not in vain, each moment that you spend here, take advantage of it. Never forget, this is
the moment where words will meet action,

My best wishes,

Mariagracia Miro Quesada


Secretary General

3
Letter from the Committee Director

Dear Delegates,

On behalf of the Disarmament & International Security Committee (DISEC), allow


me to send you our warmest regards and welcome you all to the conference! My name is
Mario Genit and I will be your director alongside Luciana for one the most important
committees of the General Assembly in this very special edition of my favorite conference
of the national high-school circuit: Carmelitas Model UN; better known as CARMUN.

Foremost, I would like to introduce myself so that you know a bit more about me.
I’m currently in my second year of Law School at Pontificia Universidad Católica del Perú
(PUCP) where I am also one of the representatives in the university’s highest executive and
deliberative body, meaning I’ve been heavily involved in college politics. Besides my
academic life, I debated for three years alongside Peruvian Debate Society: an
inter-university Model UN team, better known as PDS. Currently, after having participated
and won in four Harvard conferences, I am the Chief Advisor of one of the teams that will
be representing our country in the soon-to-begin international circuit!

Still, my journey with Model UN dates back to 2019, a year in which I organized this
conference —as part of the secretariat— and, as you’re doing right now, I debated as a
high school delegate at national and international conferences alongside the
competitive team of Carmelitas High School. Therefore, I’m aware of how enriching this
kind of experience can be on the academic and social side. It would be impossible to
deny the fact that the variety of long-lasting relationships that I earned at each
conference constitutes a major motive for me to keep participating as a director in
national and international conferences to inspire the same in the delegates attending my
committees, especially now that we’re talking about the conference that sparked so
much in me.

Moreover, focusing on the subject matter and the committee, you’re all going to
debate in one of the most competitive committees of the conference, not just because of
the size —which is enormous for a national conference— but also because of the level of
preparation we will be expecting from all the delegates. Even though General Assemblies
are not my area of expertise, I had the chance to debate in a gigantic committee in my
second participation at Harvard National Model UN, being awarded thus understanding
the composition and dynamics of a 100+ delegate committee. This means that I will make
sure you all have a blast at this conference.

Months ago, I attended my last committee in the Olympics of Model UN (Harvard


WorldMUN). In this conference, I understood the relevance of cybersecurity in the modern
world, therefore I’m going to expect a holistic understanding of the concepts that this

4
problem englobes. Personally, I look forward to high levels of argumentation, diplomatic
negotiations, and loads of content that support your stances and evidence your
commitment to the committee.

Sincerely, I can’t wait to meet you all and hear your brilliant arguments, clashing
policies, and fruitful negotiations in the comeback of one of the most prestigious
conferences of the national high-school circuit of Model UN.

See you soon,

Mario Genit - disec@carmelitas.edu.pe


Director of DISEC

5
Letter from the Committee Director

Dear delegates,

Welcome to the 10th edition of CarMUN! My name is Luciana Palomino, last year I
was Co-Secretary General and this year I’m part of the Secretariat again, but as Under
Secretary General of Substantial Affairs and Advisor, while attending the University of Lima.
If you don’t know, this is a very special edition of CarMUN, since all the directors were part
of our delegation before. And now, I have the honor to be your director for the first time,
alongside Mario and our AD’s, Catalina and Fabio.

First of all, I would like for you to know a little bit about me. I joined CarMUN in 2019,
when I was 13 years old. At first, I didn’t know anything about MUN, neither what it means
or what you do as a delegate. However, through the years I started to fall in love with the
feeling of defending your position and making everyone hear your voice. There have
been ups and downs in my journey as well, nevertheless that will never compare to the
feeling of being in a committee and starting a speech.

Therefore I was thrilled to attend NAIMUN LX at the beginning of the year, where I
had a great time with other members of our delegation. And I must highlight the unique
feeling of welcomeness and support that our delegation always has. Additionally, to be
honest, CarMUN allowed me to meet a good amount of my best friends just when I
needed them the most; that is why I will never stop caring about our team.

Lastly, talking more about what I expect from you in this conference, I will always
look forward to a diplomatic and fun debate. Start by looking for solid arguments and
viable solutions, also without being afraid to stand up for your delegation and going
against policies. But, always be respectful with other delegates. Apart from that, since we
are in a DISEC committee, I understand that sometimes it is hard to talk in front of a lot of
people. However, the best tip that I can give you is to trust yourself and learn from it. Trust
me when I say that if we never make mistakes, we will never make ourselves better.

With nothing else to add, I can’t wait to see you in the committee.

Sincerely yours,
Luciana Palomino - disec@carmelitas.edu.pe
Director of DISEC

6
Introduction to the Topic

Every day technology continues to evolve as our dependence on it increases. In recent


years we have reached the peak of innovation with the creation of artificial intelligence,
programs like Drive or iCloud, and other tools; as a result, our daily lives depend on digital
infrastructure. However, leaving all of our information online makes us more exposed to
cyberattacks and its consequences. Even if we understand cyber-attacks as phone
scams, collection of confidential information or Internet fraud; it also means that anyone
can take advantage of anything connected to a computer (including government
infrastructures or data protection systems). With the idea of making our lives easier,
artificial intelligence emerged, but it also left a door open to new attack techniques. This is
why governments are facing a lack of protection against new threats.

On one hand, having in mind that cyber attacks can be directed to any kind of facility,
governments wanted to ensure cybersecurity to all services. Nevertheless, in the last year,
cyber attacks have increased all around the globe. As we can see on Graphic 1, from
Statistica 2023, Lithuania ended the year with 46.8 threats per 100 scans (between
October and December 2022), the highest number of cyber threats to businesses during
this time. Meanwhile, South Korea ranked second with 40.3 and Italy third with 35.1.
Although small and medium businesses are more likely to be victims of a cyber attack, big
companies like Toyota announced that they suffered from one in February of last year. This
led to the suspension of operations across 28 lines at 14 plants in Japan, as a result, the
brand lost around 13,000 cars.

7
On the other hand, the most common cyber attacks are directly to people in order to
obtain personal information in exchange of money or other kind of payment. Currently,
scammers built a new multitasking system with AI, making several scams at the same time
while being able to recollect data through viruses and fight against top anti-viruses too. In
the last report of the FBI about Internet Crime, it was stated that phishing is the most
common tool of cyber-crime, with a total loss of around 10.3 billion dollars.

In conclusion, we are fully aware of how cybercrime affects people directly but nowadays
it can cause massive disruption to the whole nation. Because technology is growing faster
and nations are way behind the regulations that they need. Apart from the fact that
anyone can have access to these weapons. Now, it is important to analyze the current
situation in order to be ready for a new era of cyber warfare, which is coming earlier than
we anticipated.

8
History of the Committee

The United Nations Charter went into force on October 24, 1945, establishing the
organization known as the United Nations (UN). The United Nations, as the League of
Nations successor, is a deliberative body whose mission is to glorify the codification of
international law, defend individual nations' sovereignty, and prohibit the use of force in
international affairs. The General Assembly is, according to the Charter, "one of the six
principal organs of the United Nations and the only body in which every member of the
organization is represented and allowed to vote." Its principal duty is to "discuss issues and
make recommendations," despite the fact that it lacks the authority to enact such
resolutions.

The body is also responsible for admitting new members, selecting members of the
Economic and Social Council (ECOSOC), Security Council, and Trusteeship Council,
supervising the activities of the other UN Organs as they are recorded and received
through reports, and participating in elections for International Court of Justice judges and
the Secretary-General. The General Assembly has affected political, economic,
humanitarian, social, and legal initiatives that have "improved the lives of millions of
people worldwide."

DISEC is in charge of "all disarmament and international security matters within the scope
of the Charter or relating to the powers and functions of any other organ of the United
Nations". As one of the General Assembly's six central committees, DISEC members
address global security problems such as intergovernmental cooperation, peace projects,
and military equipment control and monitoring.

9
The Committee meets every year in October, four to five weeks following the GA
conference. All 193 UN member countries are invited to attend these annual sessions. The
general debate takes up the first eight days of the session, followed by two weeks of
discussion on each of DISEC’s seven agenda goals, which are "nuclear weapons, other
weapons of mass destruction, outer space (disarmament aspects), conventional
weapons, regional disarmament and security, other disarmament measures and
international security, and the disarmament machinery."

Several historic resolutions have been approved on the proposal of the First Committee.
Resolution 1, titled "Establishment of a Commission to Deal with the Problems Raised by the
Discovery of Atomic Energy," was adopted by the General Assembly at the suggestion of
DISEC. The committee has also played an essential part in issues like nuclear testing, space
exploration, regional wars, and cybersecurity, such as the one we will be discussing in our
committee!

United Nations Disarmament Commission


As with practically every UN committee, there are subdivisions that play a critical part in
completing the organization's mandate. As for this Committee, the UN Disarmament
Commission was established in 1952 by General Assembly Resolution 502 (VI) under the
Security Council with the mandate to prepare proposals for a treaty governing the
regulation, limitation, and balanced reduction of all armed forces and armaments,
including the elimination of all weapons of mass destruction.

Starting with the Ten-Nation Disarmament Committee in 1960, disarmament discussions


were carried out by a series of committees. In 1962, this entity was renamed the
Eighteen-Nation Disarmament Committee, and in 1969, it was renamed the Conference
of the Committee on Disarmament and ultimately the Conference on Disarmament in
1978.

The first special session of the General Assembly devoted to disarmament in 1978 created
the successor Disarmament Commission as a subsidiary organ of the Assembly, composed
of all United Nations Member States. It was established as a deliberative body with the task
of evaluating and making suggestions on different topics concerning disarmament, as
well as following up on the special session's pertinent decisions and recommendations. It
submits an annual report to the General Assembly.

The UNDC meets for three weeks in the spring and functions through plenary sessions and
working groups, with the number of working groups determined by the number of

10
substantive issues on the agenda. The UNDC and its working groups are chaired by the
five geographical groupings in turn.

In order to have a clear idea of the work conducted by the organ, here we attach some
of the principles, guidelines, and recommendations adopted unanimously by the
Disarmament Commission since 1978:

YEAR TITLE REPORT

2017 Recommendations on practical confidence-building A/72/42


measures in the field of conventional weapons

1999 Guidelines on conventional arms control/limitations and A/54/42


disarmament, with particular emphasis on consolidation of
peace in the context of General Assembly resolution 51/45
N

1993 Guidelines and recommendations for regional approaches A/48/42


to disarmament within the context of global security

1992 Guidelines and recommendations for objective information A/47/42


on military matters

1990 Declaration of the 1990s as the Third Disarmament Decade A/45/42

As you may now notice, the relevance of our committee relies on its wide capacity to
protect and regulate security in the entire globe with the aid of the multiple organs that
constitute the General Assembly and also the ones that are out of the scope of the
mandate, meaning the United Nations Security Council and the organs and bodies under
its control. Hence, with this section you may now have a better understanding of the
power of our committee; however, even though we would like to facilitate your job by
handling much more pieces of information, we won’t like to discourage you from doing
more research (one of the most enriching parts of every Model UN). We strongly
recommend you understand the complete mandate of DISEC and keep up the research
so that you can formulate feasible solutions to mitigate the problems that derive from
cybersecurity.

11
Key Concepts
Cyberwarfare
Refers to an internet-based attack on a nation or country’s government with the intention
of causing disruption and damage. As Britannica explains, “cyberwar is usually waged
against government and military networks in order to disrupt, destroy, or deny their use.
Cyberwar should not be confused with the terrorist use of cyberspace or with
cyberespionage or cybercrime.”

Cyberterrorism
Refers, similarly to cyberwarfare, to a politically motivated use of technology to cause
widespread fear in a determined society. Therefore, while cyberwarfare itself refers to an
attack on a nation or country’s government, this term is differentiated by the political
motivation and the mere purpose of generating chaos, insecurity and overall fear in
society.

Cybercrime
The complication with this term relies on the lack of consensus on its definition. A common
approach is to define it in two categories: cyber-dependent crimes and cyber-enabled
crimes.
1. Cyber-dependent crimes are crimes that can only be committed by using
Information and Communication Technologies (ICTs). A notorious example is
ransomware: hacking into an organization or individual’s device, encrypting data
and demanding payment for decryption.
2. Cyber-enabled crimes are so-called traditional crimes that have been transformed
in speed, scale and scope through the use of ICTs, such as online banking scams,
identity theft or fraud, and online child sexual exploitation.

Artificial Intelligence
Is the simulation of human intelligence processes by machines, especially computer
systems. Specific applications of AI include expert systems, natural language processing,
speech recognition and machine vision.
1. Expert Systems: is a computer program that uses artificial intelligence technologies
to simulate the judgment and behavior of a human or an organization that has
expertise and experience in a particular field.
2. Natural Language Processing: is the ability of a computer program to understand
human language as it is spoken and written.
3. Machine Vision: is the ability of a computer to see; it employs one or more video
cameras, analog-to-digital conversion and digital signal processing. The resulting
data goes to a computer or a robot controller. It is similar in complexity to voice
recognition.

12
Facial Recognition Technology
This technology works by analyzing key facial features, generating a mathematical
representation of these features, and then comparing them against the mathematical
representation of known faces in a database and generating possible matches. This is
based on digital images (either still or from live camera feeds).

Generative Adversarial Networks (GANs)


Refers to a machine learning (ML) model in which two neural networks compete with
each other by using deep learning algorithms to become more accurate in predictions.
GANs typically run unsupervised and use a cooperative zero-sum game framework to
learn, where one person’s gain equals another person's loss.

Lethal Autonomous Weapons Systems


Slaughterbots, also called ‘lethal autonomous weapons systems’ or ‘killer robots’, are
weapons that use Artificial Intelligence (AI) to identify, select, and kill human targets
without human intervention. Though these weapons sound futuristic, reports of their use
are starting to mount up.

13
History of the Topic

In 1983, we heard about cyber warfare for the first time. This term appeared in a magazine
article, called Wired, which described it as the future of wars, including giant robots,
autonomous flying vehicles and autonomous weapon systems. Ten years later, in 1993, this
idea began to evolve as two employees at the RAND Corporation discussed hackers
using military computers as a means of disruption (later it was added that attacking
non-military computers would be just as easy). Even though these ideas were in the
market, it wasn’t the target of many as technology started to evolve during the 2000’s.
However, it is a fact that during this time weapons grew twice as fast with the discovery of
new technology.

After that, during 2010, what is called “the first cyberwarfare attack” occurred. This virus,
called STUXNET, started to develop during 2005 by the government of the United States
and Israel. It was directed to Iran and infected around 20.000 devices in 14 different
institutions. Is reported to have destroyed 20% of the centrifuges Iran used to create its
nuclear fuel, which is almost 1.000 of uranium enrichment. This was the first time that a
cyber attack destroyed actual infrastructure, leading to the start of the cyber war age.

Because of that, governments realized that cyber weapons could be used against
nuclear facilities in the future, which could be even bigger than the ones in Iran. In
addition, terrorist groups revealed their interest in these weapons and their desire of using
them for massive destruction. Even if STUXNET wasn’t designed to harm people or destroy
any facility, this will not always be the case. Eventually, the international community
accepted that this was a threat to international security.

14
Furthermore, the Convention on Cybercrime (or the Budapest Convention created in
2001) was signed by 30 new states. This is the
first international agreement designed to
reduce computer related crime by
harmonizing national laws, strengthening
investigation techniques and increasing
international cooperation. This fast change
happened after the attack in Iran,
demonstrating the alarming care of
governments on the topic.

Then, the attacks continued, but it has been threatening since artificial intelligence
showed up. This makes cyber attacks faster, more sophisticated and powerful. With its
help, cyber attacks can execute commands while collecting data to create its own plan.
The access to these weapons are difficult to regulate, making it impossible to ensure
security to any kind of device, from the government or a single person.

Just in 2022, cyberattacks increased by 38% according to CheckPoint research, leaving


gaming and e-commerce businesses being the primary targets, since they are the ones
with the most detailed personal data. Even if we have been through a lot of evolution in
cyberwarfare, there is still a long way to go. If today, cybercrime is mainly directed to
people, that does not mean that it will not go after government data.

As a result, they are the ones investing in tools and technologies for protection and
prevention leaving states afraid of what AI can lead to in the future of cyberwarfare. Since
this tool is the one marking a before and after on cyberattacks. It may be useful for a lot of
users, but it is also a great help for autonomous attacks that are impossible to take down.

15
Points of Contention

Cyberwarfare, Artificial Intelligence & National Security


A serious and unresolved challenge in AI and cyber attacks is the need to understand and
mitigate the technology's harmful uses by both state and non-state actors. As systems
such as natural language processing AI’s evolve, they pose a slew of new concerns to
international security. For example, GPT-3's capacity to drastically improve text synthesis
compared to lesser models makes distinguishing AI-generated content from
human-created material increasingly challenging. This might be abused for phishing and
spam purposes by making it easier to transmit emails with very authentic looks.

Misinformation and the abuse of public forums are also highly relevant and dangerous
threats to democratic processes; for example, it was discovered that in the United States,
the Federal Communications Commission's public comments system was systematically
targeted with AI tools in order to submit millions of instances of fake citizen feedback; the
results of this system ultimately influenced the policymaker's controversial ruling on net
neutrality. Thus, even though this took place in a particular political context, it opens the
door for new ways of cyber attacks that can harm the population of a determined society
in a plethora of ways never seen before.

Another concern is the growth of deepfake technology, which goes beyond text and
includes audio and video. Deepfake technology uses machine learning techniques,
notably generative adversarial networks (GAN’s), on a technical level. The huge volume
of audio and visual data freely available on the Internet, notably of political officials,
public servants, and celebrities, offers an atmosphere favorable to the construction of
deep fakes, simply because there are so many samples to generate a dataset for
AI-training, constituting another way in which (if not regulated properly) AI can derive into
a powerful tool for new approaches to cyberwarfare.

The highly connected nature of the Internet, particularly social media platforms, also
poses a significant challenge, as deepfakes can be generated and shared almost
instantly; there is real potential for a targeted piece of deep fake media impersonating a
public figure to incite violence, damage trust, or move markets. Recognizing the promise
of these systems, academics have worked diligently to improve proactive detection tools,
but the quick rate of development is undermining some of these achievements; therefore,
it is clear that AI's uses for manufacturing fake but realistic data require additional
examination and discussion, both technically and legally for the prevention of nefarious
consequences.

16
Impact on Surveillance and Technology
Advances in computers, along with the worldwide growth of surveillance infrastructure,
have significant consequences for the future of AI and its position in the continuing
debate between privacy and surveillance. In the field of facial recognition software (FRT),
computational intelligence has resulted in increasing detection accuracy rates over time.
However, its use in public settings to recognize persons' faces has sparked considerable
criticism. Even while training these FRT systems, there are worries that if an algorithm is
poorly built, its deployment may provide insights into the information that was used for its
training set, even if that data has not been made public.

One effort already made by a sector of the international community is the draft of the
European Union’s AI Act, which specified a series of restrictions on the deployment of
Artificial Intelligence as it constitutes a notable worry for the international community in
terms of cybersecurity; therefore, cyberwarfare.

The aforementioned Act implemented a risk-based method to categorize technologies


based on their potential for damage considering that data privacy is more than simply
eliminating essential identifying personal data and opening it out to the public. The
integrity of data anonymization was brought into doubt as early as 1997 when researchers
were able to re-identify personal medical information to a well-known public personality in
the United States. This experiment spurred a re-evaluation of existing data privacy policies,
which had grown vulnerable to re-identification as more powerful computers became
available. The potential of AI to find correlations in big datasets may result in comparable
challenges to data privacy, necessitating a rethinking of current methods.

We consider that a clear case study that evidences the weakness of some FRT softwares
and demonstrates how perjudicial their hacking can be is the Clearview AI Australian
scandal in the year 2020. This software harvested photos from social media and bundled
the information for law enforcement agencies. The Australia Institute’s Centre for
Responsible Technology supported the Australian Human Rights Commission’s proposal for
a moratorium on facial recognition technology until a framework that protects the rights
of individuals was developed. The Australian Institute highlighted that some issues that
should be addressed are the following:

1. The level of consent users should have over their information being captured and
on-sold, either to businesses or state authorities.
2. The protection of an individual's personal information and how it is interpreted and
used, particularly by the government.
3. The security standards required for the storage and disposal of such information,
especially when an image has been removed by a user from the public domain.

17
Source: The Australia Institute

Even though we only cited one case study that depicts the different effects of a
cybersecurity breach, it may help us measure the variety of possibilities that might develop
from the use of FRTs and artificial intelligence-based technologies. Given the applications
of AI, our committee is also entrusted with filling regulatory and security holes for the future
of cybersecurity and its relationship with cyberwarfare.

Lethal Autonomous Weapons Systems


Lethal Autonomous Weapons (LAWs) are any kind of weapons that select and apply force
to a target without human intervention. Even if it has a positive side, which is that less
soldier’s lives are put in danger; it is mainly seen by its negative side, it may not attack all
precise targets (including civilians). Because a person only activates an autonomous
weapon, however they do not know specifically who or what it will strike.

That is why, since 2018, António Guterres (United Nations Secretary-General), has
maintained a very clear position against these weapons. Because they are “politically
unacceptable and morally repugnant”. Actually, in his 2023 New Agenda for Peace, the
UN Secgen recommends the States to “conclude, by 2026, a legally binding instrument to
prohibit LAWs that function without human control”. Arguing that it cannot be used in
compliance with international humanitarian law.

In addition, these weapons have a direct connection with artificial intelligence. Having in
mind that they require “autonomy” to perform their functions in the absence of direction,
with the incorporation of AI, this allows the weapon to adjust to changing circumstances,
still without needing control. Also, it really helps with the function of the weapon, since it
can be working in different tasks or parameters (which have to be pre-defined). Apart
from that, it does not necessarily have to be used without human control. For example, it
can be used to identify potential targets, but not to attack them.

Nevertheless, LAWs will be impossible to predict. Because, once they implement AI, it is
going to choose all the next moves of the weapon. In consequence, it will become a

18
“black box” that will be extremely difficult for humans to understand or know how it will
define a target. In conclusion, if autonomous weapons are already sensitive to what can
trigger a strike, AI will only make it difficult to know what is the target.

Regulation of Artificial Intelligence


As we previously mentioned, the independence of artificial intelligence is coming faster
than expected. Because of that, we make it very clear that the threats of cyberattacks
are multiplying with the time. In consequence, the regulation of artificial intelligence must
be prepared for constant changes and adaptations.

Looking back to the start of the evolution of artificial intelligence, it was never expected to
be used in this way. Somehow AI has been quietly present during all this time but with
different purposes. For example, when Google auto-completes a search query. However,
the release of Chat GPT moved artificial intelligence out of the shadows, proving that an
independent computer was created. Then, its purpose moved from consumer-focused to
something ordinary people can use themselves without any need for technical expertise.

Because of that, the international community is already showing its concern to ensure
better conditions for the development and use of this innovative technology. In April 2021,
the European Commission proposed the first EU regulatory framework for AI. Here, it was
proposed that AI systems that can be used in different applications are analyzed and
classified according to the risk they pose to users, so they can regulate it depending on
their level of risk. The commission, aware of the power of AI, commented that they want
to “lead the way of artificial intelligence”, concerning other states.

Also, finding prevention measures is risky, since AI is an open tool that can work for both
sides. Meaning, it can be used to reinforce cybersecurity and detect any threat, but it can
also detect if any cyber security measure is applied. Actually, it was stated by Alice
Bonasio, a technology journalist, that AI research has grown at a pace of 12.9 percent
annually over the last five years. Leaving us without a way to measure exactly the
influence of artificial intelligences; thus, prevention measures will not be totally effective.

19
Case Studies

1. Lithuania, the highest number of cyber threats to businesses during this time
The National Cybersecurity Center of Lithuania (NCKB) condemned on Monday a
series of assaults on multiple online pages and a mobile transportation application
in Vilnius, the capital and site of the next NATO summit, which begins on Tuesday.
They have also recently been targeted by Russian hackers in cyberspace.
According to Lithuanian officials, all of these 'hacks' are tied to a cybersecurity
vulnerability on the site developer's end. Nonetheless, Moscow promised to react
against Lithuania for restricting freight transportation in the isolated Russian province
of Kaliningrad a few days later. Hackers "linked to the Russian state" targeted
dozens of Lithuanian government and commercial institutions. Lithuania warned
that the digital onslaught will certainly continue and probably increase in the
coming days.It looked to be the start of what Russia described as punitive steps
against NATO for banning rail shipment of some products to Kaliningrad.

2. South Korea, another important victim of cyber attacks


On Monday, August 21, South Korea and the United States launched joint military
drills. These yearly exercises, known as the Ulchi Freedom Shield, have enraged
North Korea, which has denounced the repeated invasion of its borders. A group of
hackers recently launched an attack in an attempt to steal information regarding
the exercises. In addition, North Korean hackers gained access to one of these
workers' accounts in January of this year and installed a code for their control.
However, there is no evidence that any sensitive material was accessed in this
manner. Despite the fact that repeated attempts to gather data from military
activities failed, some of the compromised machines were affected.

3. Skolkovo a Russian foundation that suffered a cyber attack


Hackers gained access to information systems and resources, including a
file-sharing platform, at the Skolkovo Foundation, created by former Russian
President Dmitry Medvedev. The breach is being blamed on the organization,
which is named after the Moscow district of Skolkovo. The "Ukrainian Cyber Front"
organization, on the other hand, has claimed responsibility for the attack. Archives
containing breach documents have been made available on the "sudo rm -RF"
Telegram channel. The resources of Skolkovo, including its website and online
services, are presently unavailable. Concerns have now been raised regarding
Russian cyber espionage activities targeting Sweden as a result of the intrusion.

20
4. Minneapolis public schools another victim of cyber attack
Minneapolis Public Schools notified over 100,000 people that their personal
information may have been compromised as a result of a hack earlier this year. On
March 7, the Medusa ransomware organization claimed responsibility for the
assault, asking $1 million to decrypt MPS systems. Because the school system did not
pay up, the gang exposed data, including extremely sensitive student files, and
posted a 51-minute video with screenshots of the stolen material ten days later. The
district stated that it would have notified victims sooner but required time to
conduct a thorough examination to identify the presence of sensitive information.
The intrusion started on February 6 and lasted until February 18, when MPS
contacted law police. The district has offered victims 24 months of credit monitoring
and identity theft restoration services, as well as a dedicated phone line. MPS is also
analyzing and improving its information security policies and processes, introducing
more protections, and performing extra training to lessen the possibility of such
situations in the future.

21
Questions A Resolution Must Answer (QARMA’S)

1. How can the Disarmament and International Security Committee act to limit the

risks that uncontrolled AI use poses to the whole international community?

2. Should states interfere by regulating artificial intelligence growth to safeguard

digital security and prosperity? If this is the case, how can an international

agreement on regulatory frameworks be reached?

3. Should there be a distinction between restrictions imposed on non-state actors and

those imposed on official authorities?

4. What are the implications of artificial intelligence regulation for the advancement

of worldwide technological growth? How can the ramifications of progress be

safeguarded?

5. How can governments avoid the use of artificial intelligence in cyberwarfare? How

can they be held accountable for the harm they cause if they are used?

22
Final Remarks

After all that has been said, we believe you understand the significance of this subject.
Especially given how little time we have to deal with it. Artificial intelligence is becoming
more powerful as technology advances.

Remember that this is a "Background Guide," which means that you will need to conduct
more research to prepare for this committee. During the conference, we wish to see a
wide range of suggestions, not just regarding the topics we've just listed, but also about
areas in which you may be as creative as possible.

Last but not least, always remember to have fun. We have no doubt that you will gain a
lot from this committee as a delegate; don't pass up the opportunity to try new things and
give your 100%.

23
Blog Posts

In this year’s conference we will replace position papers for blog posts. Through this
system, delegates will receive 2 questions, as we approach CarMUN!

The questions MUST be answered , before the deadline in order to be awardable, with a
maximum of 500 words per question. Chairs will be able to comment on Blog Posts if they
consider it necessary.

The first question will be posted on October the 2nd and must be answered before
October 9th 11:59pm. The second question will be posted on October the 9th and must
be answered before October 16th 11:59pm.

We highly encourage you to check the Delegates Handbook for a step-by-step


explanation on how to answer a blog post.

Blog posts can be found at carmunperu.org/blog. If there is any complication or inquiry


regarding the blog posts, we encourage you to write an email to
carmun@carmelitas.edu.pe

24
Bibliography
1. BBC News Mundo. (2015, October 11). El virus que tomó control de mil máquinas y
les ordenó autodestruirse. BBC News Mundo.
https://www.bbc.com/mundo/noticias/2015/10/151007_iwonder_finde_tecnologia_
virus_stuxnet
2. Bonasio, A. (2021, December 7). Report: Global AI Research - Tech Trends -
Medium. Medium.
https://medium.com/edtech-trends/report-global-ai-research-a1582f2f88c5
3. Burns, E., Laskowski, N., & Tucci, L. (2023). artificial intelligence (AI). Enterprise AI.
https://www.techtarget.com/searchenterpriseai/definition/AI-Artificial-Intelligence
4. Chowdhury, M. (2021). The evolution of artificial intelligence: past, present & future.
Analytics Insight.
https://www.analyticsinsight.net/the-evolution-of-artificial-intelligence-past-present-
future/
5. EU AI Act: first regulation on artificial intelligence. (2023, June 8). European
Parliament. Retrieved September 11, 2023, from
https://www.europarl.europa.eu/news/en/headlines/society/20230601STO93804/eu
-ai-act-first-regulation-on-artificial-intelligence
6. EU AI Act: first regulation on artificial intelligence | News | European Parliament.
(2023, August 6).
https://www.europarl.europa.eu/news/en/headlines/society/20230601STO93804/eu
-ai-act-first-regulation-on-artificial-intelligence
7. Future of Life Institute. (2023, September 3). Educating about Lethal Autonomous
Weapons - Future of Life Institute.
https://futureoflife.org/project/lethal-autonomous-weapons-systems/
8. Howey, W. (2023, July 21). How governments are looking to regulate AI - Economist
Intelligence Unit. Economist Intelligence Unit.
https://www.eiu.com/n/how-governments-are-looking-to-regulate-ai/
9. International Committee of the Red Cross. (2021, October 11). Cyber operations
during armed conflicts. International Committee of the Red Cross.
https://www.icrc.org/en/document/cyber-warfare
10. International Committee of the Red Cross. (2022, July 26). What you need to know
about autonomous weapons. International Committee of the Red Cross.
https://www.icrc.org/en/document/what-you-need-know-about-autonomous-wea
pons
11. Internet Crime Report 2022. (2022). In Internet Crime Complaint Center. Retrieved
September 11, 2023, from
https://www.ic3.gov/Media/PDF/AnnualReport/2022_IC3Report.pdf
12. Kolesnikov, N. (2023). 50+ Cybersecurity Statistics for 2023 You Need to Know –
Where, Who & What is Targeted. Techopedia.

25
https://www.techopedia.com/cybersecurity-statistics#:~:text=Sources%3A-,Cyberse
curity%20Key%20Stats,was%20%244.35%20million%20in%202022.
13. Lethal Autonomous Weapon Systems (LAWS) – UNODA. (n.d.-a).
https://disarmament.unoda.org/the-convention-on-certain-conventional-weapons
/background-on-laws-in-the-ccw/
14. Lethal Autonomous Weapon Systems (LAWS) – UNODA. (n.d.-b).
https://disarmament.unoda.org/the-convention-on-certain-conventional-weapons
/background-on-laws-in-the-ccw/
15. Live Facial Recognition Technology Terms and Definitions. (n.d.). South Wales Police
Heddle De Cymru. Retrieved September 12, 2023, from
https://www.south-wales.police.uk/police-forces/south-wales-police/areas/about-u
s/about-us/facial-recognition-technology/live-facial-recognition-technology-terms-
and-definitions/?__cf_chl_tk=Di2DI.Ujw0X8CpmzPVu9g9wP_cqEJHTImJTQhjOG5YA-1
694495002-0-gaNycGzNDLs#
16. Mitchell, R. L. (2012a, November 5). After Stuxnet: The new rules of cyberwar.
Computerworld.
https://www.computerworld.com/article/2717524/after-stuxnet--the-new-rules-of-cy
berwar.html
17. Mitchell, R. L. (2012b, November 5). After Stuxnet: The new rules of cyberwar.
Computerworld.
https://www.computerworld.com/article/2717524/after-stuxnet--the-new-rules-of-cy
berwar.html
18. Moore, M., PhD. (2023a). What is cyberwarfare? University of San Diego Online
Degrees.
https://onlinedegrees.sandiego.edu/what-is-cyberwarfare/#:~:text=History%20of%2
0Cyberwarfare,the%20rise%20of%20the%20Internet.
19. Moore, M., PhD. (2023b). What is cyberwarfare? University of San Diego Online
Degrees. https://onlinedegrees.sandiego.edu/what-is-cyberwarfare/
20. Moore, M., PhD. (2023c). What is cyberwarfare? University of San Diego Online
Degrees.
https://onlinedegrees.sandiego.edu/what-is-cyberwarfare/#:~:text=History%20of%2
0Cyberwarfare,the%20rise%20of%20the%20Internet.
21. Pečinka, L. (2020). Massive facial recognition hack highlights need to call pause.
The Australia Institute.
https://australiainstitute.org.au/post/massive-facial-recognition-hack-highlights-nee
d-to-call-pause/
22. Poliveiraa. (n.d.). Cybercrime Module 14 Key issues: Cyberterrorism.
https://www.unodc.org/e4j/zh/cybercrime/module-14/key-issues/cyberterrorism.ht
ml

26
23. Recent Cyber-Attacks of 2022: The Pandemic of Cybercrime. (n.d.-a). SANGFOR.
https://www.sangfor.com/blog/cybersecurity/recent-cyber-attacks-2022
24. Recent Cyber-Attacks of 2022: The Pandemic of Cybercrime. (n.d.-b). SANGFOR.
https://www.sangfor.com/blog/cybersecurity/recent-cyber-attacks-2022
25. Report of the Disarmament Commission for 2017. (2017). In General Assembly
Official Records (A/72/42). Retrieved September 11, 2023, from
https://front.un-arm.org/wp-content/uploads/2019/09/A-72-42-E.pdf#page=11
26. Review of the Implementation of the Recommendation and Decisions adopted by
the General Assembly at its Tenth Special Session: Report of the Disarmament
Commission. (1999). In General Assembly Official Records. Retrieved September 11,
2023, from
https://front.un-arm.org/wp-content/uploads/2019/09/A-51-182-Rev.1-E.pdf#page=
77
27. Sánchez, L. O., & Sánchez, L. O. (2023a). Stuxnet: ¿qué es y cómo funciona?
NordVPN.
https://nordvpn.com/es/blog/que-es-stuxnet/#:~:text=Stuxnet%20es%20el%20prime
r%20malware,a%20internet%2C%20puede%20actualizarse%20autom%C3%A1ticam
ente.
28. Sánchez, L. O., & Sánchez, L. O. (2023b). Stuxnet: ¿qué es y cómo funciona?
NordVPN.
https://nordvpn.com/es/blog/que-es-stuxnet/#:~:text=Stuxnet%20es%20el%20prime
r%20malware,a%20internet%2C%20puede%20actualizarse%20autom%C3%A1ti
camente.
29. Sheldon, J. B. (2023, September 11). CyberWar | Cybersecurity, cyberattacks &
defense Strategies. Encyclopedia Britannica.
https://www.britannica.com/topic/cyberwar
30. Statista. (2022, December 12). Global most targeted countries by cyber threats
2022.
https://www.statista.com/statistics/1351436/most-targeted-countries-cyber-threats/
31. United Nations. (n.d.). UN General Assembly - First Committee - Disarmament and
International Security. https://www.un.org/en/ga/first/
32. United Nations Disarmament Commission – UNODA. (n.d.).
https://disarmament.unoda.org/institutions/disarmament-commission/
33. Vijayan, J. (2012, September 24). U.S. banks on high alert against cyberattacks.
Computerworld.
https://www.computerworld.com/article/2721363/u-s--banks-on-high-alert-against-
cyberattacks.html
34. Wilkinson, I. (2023, August 2). What is the UN cybercrime treaty and why does it
matter? Chatty House. Retrieved September 11, 2023, from
https://www.chathamhouse.org/2023/08/what-un-cybercrime-treaty-and-why-doe

27
s-it-matter#:~:text=There%20is%20no%20universally%20accepted,and%20Communi
cation%20Technologies%20(ICTs)
35. Yasar, K., & Lewis, S. (2023). generative adversarial network (GAN). Enterprise AI.
https://www.techtarget.com/searchenterpriseai/definition/generative-adversarial-
network-GAN

28

You might also like