Professional Documents
Culture Documents
Guia Academica Security Council
Guia Academica Security Council
Guia Academica Security Council
Security Council
Content
1. Welcome Letter. 3 2. Introduction to the commission. 4 3. Explanation of the Topic. 5 4. Procedure. 6 5.
Glossary. 10 6. Guiding question. 10 7. Conclusion. 10 8. Recommended sources. 11 9. Bibliography. 11
We want to introduce ourselves , we are Luana Camila Hincapie Valencia and Andres
Gomez, your commission presidents, we will accompany you in this process and model, we
made this Dill require the delegates to read to
avoid inconveniences.
In this diplomatic context, you assume a fundamental role as an architect of solutions and
negotiator of agreements in a fictional but no less exciting world. As we embark on this
intellectual journey, we trust that your insight, diplomatic skills, and strategic vision will help
enrich the discussions and resolutions we will outline together.
Having this clear, we hope to make this commission the best of the
model together, our main objective apart from excellence is that
you enjoy what you do and learn from it.
You have our complete support in whatever You need before and
during the model, if you have questions you can contact us via
email or WhatsApp and if you have questions during the debates,
you can approach us to help you in any way we can.
Attentively,
Andres Felipe Gomez Luana Camila Hincapie CEL: 311 260 3995 CEL: 315 767
0896
Mail: andresgomez427@colegionuevayork.edu.co Mail:luancamhincaval@gmail.com
The composition of the Security Council has been a contentious matter, particularly since
the end of the Cold War. Critics have argued that the Security Council and its five permanent
members reflect the power structure that existed at the end of World War II, when much of the
world was under colonial rule.
The conflict between Russia and Ukraine has been ongoing since 2014, and it has been
accompanied by a significant increase in cyber espionage and intelligence gathering activities.
Russia has been accdentify Russian spies involved in such activities since 2014. The spy war
has intensified as Western countries have sought to hit back and inflict lasting damage on the
ability of Russian intelligence to carry out covert operations. The recent expulsion of 500 Russian
officials from Western capitals is a symbol of this effort.
The cyber operations during the Russo-Ukrainian War have been a significant part of the
conflict. Russia has used cyber operations as part of a larger campaign or independently as an
instrument of coercion against Ukraine. The use of coded communications had also prompted
several states to mount concerted efforts to divine the secrets of those enciphering machines and
the codes they protected.
Also, the historical context of cyber operations in this conflict includes various incidents
and campaigns, such us:
SECURITY COUNCIL COMMITTEE 2007 Cyberattacks on
GRU Indictments (2018): In 2018, the United States indicted members of Russia's
military intelligence agency, theSome individuals were linked to cyber activities against
Ukraine.
Cyber Operations in Eastern Ukraine (Ongoing): The ongoing conflict in Eastern Ukraine
has seen continuous cyber operations. These include diss. The goal is often to gain
intelligence, disrupt communications, and sow confusion.
Election Interference: Both during the Ukrainian presidential elections and local
elections, therethe form of disinformation campaigns, hacking attempts, and efforts to
manipulate public opinion.
Energy Sector Targeting: The energy sector in Ukraine has been a frequent target of
cyberattacks. Incidents, such as attack on Ukraine's power grid, highlighted the vulnerability of
critical infrastructure to cyber threats. Such attacks can have significant real-world
consequences.
Monitoring Sanctions:
● In cases where the Security Council has imposed sanctions on a country or entity,
the committee monitors and assesses the implementation of these sanctions.
Counterterrorism Measures:
● Addressing and combating terrorism is often a key objective. The committee may
focus on implementing measures to counteract terrorism, such as sanctions or
other actions.
Peacekeeping Operations:
● Supporting and overseeing peacekeeping operations authorized by the Security
Council is another important objective. This may involve coordination with UN
peacekeeping missions.
International Cooperation:
The Security Council Committee adapts its focus and objectives based on the evolving
international security landscape and specific issues on its agenda. The committee's work is
guided by the principles of the United Nations Charter and aims
to prevent and address threats to global peace and security.
The case of cyber espionage and intelligence gathering between Russia and Ukraine is complex
and multifaceted, involving various incidents and strategies.
● Russia has been accused of employing a hybrid warfare strategy, which combines
conventional military tactics with non-military tools such as cyber operations,
disinformation, and economic coercion.
● Cyber espionage and intelligence gathering are integral components of this strategy,
aiming to gain a strategic advantage, disrupt communication, and gather information
about military and political developments.
● Cyber operations serve political and military objectives in the conflict. This includes
gaining insights into the opponent's plans, capabilities, and intentions.
● Intelligence gathered through cyber means can inform military strategies, influence
decision-making processes, and provide a competitive edge in the geopolitical arena.
Targeted Attacks:
● Both Russia and Ukraine have been involved in targeted cyberattacks against each other.
These attacks may focus on government institutions, military organizations, critical
infrastructure, and other strategic targets.
● Techniques such as spear-phishing, malware deployment, and exploiting vulnerabilities in
software or hardware are commonly employed to gain unauthorized access to systems.
Disinformation Campaigns:
● Cyberattacks on critical infrastructure, such as the energy sector, have been a notable
feature. These attacks can disrupt essential services, sow fear, and create economic
instability.
● Ukraine, in particular, has experienced cyberattacks on its power grid, demonstrating the
potential real-world impact of cyber operations on critical infrastructure.
Attribution Challenges:
● Attribution in the cyber domain is often challenging. While there may be strong indicators
of state-sponsored activities, proving direct involvement by a specific government or
organization can be difficult.
● Cyber operations often involve the use of proxies and tactics to mask the identity of the
perpetrators.
International Implications:
● The use of cyber tools in the Russia-Ukraine conflict has international implications. It raises
concerns about the blurring lines between conventional warfare and cyber warfare, as
well as the potential for escalation in conflicts.
Counterintelligence Measures:
● Both Russia and Ukraine invest in counterintelligence measures to protect their own
networks and information. This includes improving
cybersecurity, conducting threat assessments, and
actively monitoring for signs of intrusion.
MUNARB MOTIONS
Motion: Motions are the tools that the delegate has to carry out an action within the
committee. They should only be proposed when the committee is open to them (this
moment is identified with the phrase “the floor is open to motions” stated by the
chairperson). Motions must be voted on by the committee; however, the chairperson has
the authority to introduce motions on their own initiative.
Opening Motions
Call to order: This is the first motion that arises in the model, indicating the start of
activities
within the UN format.
Roll call: (not voted on) In the roll call, the chairperson will name the delegations
that must
be present in the committee in alphabetical order. Each delegate will respond to the call
with present or present and voting. The difference is that in the second option (present
and
voting), the delegate waives their right to abstain during a vote.
Open agenda: Indicates the theme of the debate. When there are two topics in the
committee, the agenda is opened with topic A or B, but MUNARB only handles one topic
per committee.
Read opening speeches: Each delegate will come forward to read their previously
prepared
opening speech.
Debate Motions
Informal debate: Informal debate is the most usual type of debate; the delegate
determines the time for it when presenting the motion, however, for time reasons,
the chairperson may modify it. The debate works like this: the delegate who
presents the motion will be the first to speak (this is a UN tradition), and when they
finish their intervention, the floor will be open to further interventions (“delegates
who wishes to speak”), at this point, the delegates will raise their placards, and the
chairperson will decide who to give the floor to.
Lobby time: Lobby time is considered for establishing relationships and clarifying
specific points between delegates, and it is important to continue using
parliamentary language and respect between delegates.
● Extend debate / lobby time: The time must be specified, which can be modified by
the chair.
● Extraordinary, and the debate will continue.
● Adding to the record: (not voted on) The president will keep a record of the
statements made during the meeting, which delegates can refer to when citing or
adding a statement. The process for adding a statement will be as follows: at the
end of a speee given, and then ask the delegate who
made the speech if it is correct, needs to be
corrected, or is not correct. The statement will be
added if it is correct or corrected, and will not be
added if it is not correct.
What is it about? It is done to inform the committee about the content of the press
release or directive.
Additional information: After the press release or directive has been presented and
debated, it can be opened for amendment.
Reading of working papers: The reading of working papers refers to the moment
when the delegates who have formed a block present the written working paper. A
delegate (head of the block) will present it, but if they so choose, they may request a
point of personal privilege to present it along with another delegate (the author).
Proceed to a voting process: The voting process will be used for papers and
amendments. For it to take place correctly, after the motion has been voted on, the
president will present the following conditions: “The committee is in the voting process,
no one enters or leaves, delegates who declared themselves present and voting in the
roll call do not have the right to abstain, and the voting will take place in order of the roll
call: delegate 1, delegate 2…” Delegates have the right to declare their reasons for being
in favor or against the motion, usually when a delegate considers the current state of the
vote to be irrational up to the point at which they vote. When this happens, the president
immediately concludes the voting, the delegate has two and a half minutes to explain the
reasons, and a new vote is
scheduled. This will only happen once per vote.
Suspending the session: To take a break or at the end of the first day.
Ending the session: To end the established debate times in the entire
model.
Cyber Espionage: The covert and unauthorized acquisition of classified or sensitive information
from computer systems and networks.
Cryptography:The practice and study of techniques for secure communication in the presence
of third parties, safeguarding information through encryption.
Cyber Sovereignty:The concept that states have the right to govern and control the flow
of information within their borders, including the cyber domain.
Security Council:A principal organ of the United Nations responsible for maintaining
international peace and security.
Bilateral Relations:The diplomatic and political interactions between two nations, which can
influence the dynamics of cyber relations.
Cyber Diplomacy:The use of diplomatic channels and negotiations to address issues and
conflicts arising in the cyber domain.
Critical Infrastructure:Systems and assets, whether physical or virtual, that are essential to the
functioning of a society, economy, or government.
The conflict between Russia and Ukraine has been a long-standing one, with espionage and
intelligence gather cyberattacks, poisonings, and sabotage in Europe. The spy war has
intensified in recent months, with Western countries seeking to hit back and inflict lasting damage
on the ability of Russian intelligence to carry out covert operations. The report also highlights the
unprecedented expulsion of 500 Russian officials from Western capitals, who are believed to be
undercover intelligence officers.
Another report by Dark Reading outlines how attackers have used seven different families of
malware A recent report by CBS News alleges that Russia-based hackers conducted a
sophisticated cyber campaign against American intelligence officials, including contractors at the
State and Defense Departments, as part of an international operation that included NATO
members and Ukraine.
Finally, a report by Stiftung Wissenschaft und Politik provides an overview of the cyber
operations in Russia’s war against Ukraine. The report highlights the use of cyber operations by
Russia in the conflict and the lessons learned so far.
In conclusion, the conflict between Russia and Ukraine has seen a significant escalation in cyber
espionage and intelligence gathering. The conflict holds
valuable lessons for cyberwar, and it is essential to remain
vigilant against such attacks in the future.
Ray, M. (2024, January 27). Russia-Ukraine War | Casualties, Map, Causes, & Significance.
Masters, J. (2023, February 14). Ukraine: Conflict at the crossroads of Europe and Russia.
April 11). History Illustrated: Russia and Ukraine, a history of violence. Al Jazeera.
https://www.aljazeera.com/amp/gallery/2023/3/27/history-illustrated-russia-and-ukraine-a-
histor y-of-violence
JSTOR Daily. (2023). Ukraine, Russia, and the West: A background reading list. JSTOR Daily.
about Russia’s War in Ukraine exposed. (2023, March 8). European Commission Representation
in Cyprus. https://cyprus.representation.ec.europa.eu/news/twelve-myths-about-russias-war-
ukraine-exposed -2023-03-08_en
https://www.csis.org/analysis/russias-war-ukraine-identity-
history-and-conflict
Security-Council
Trahan, J. (2020). The origins and history of the veto and its use. In Cambridge University Press
Staff, C. (2023, February 28). The UN Security Council. Council on Foreign Relations.
https://www.cfr.org/backgrounder/un-security-council
Mueller, G. B., Jensen, B., Valeriano, B., Maness, R. C., & Macias, J. M. (2024). Cyber
www.jstor.org. https://www.jstor.org/stable/48703290
Cyber espionage and information warfare in Russia | Small Wars Journal. (n.d.).
https://smallwarsjournal.com/jrnl/art/cyber-espionage-and-information-warfare-russia
Corera, B. G. (2022b, May 14). Ukraine: The spy war within the war. BBC News.
https://www.bbc.com/news/world-61311026
https://www.darkreading.com/threat-intelligence/russia-ukraine-conflict-holds-cyberwar-lessons
Legare, R., & Ott, H. (2023, December 7). Russian hackers accused of targeting U.S. intelligence
hackers-u-s-intelligence-community-spear-phishing-cam paign/
SECURITY COUNCIL COMMITTEE