model united nations conference disec study...

14
SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda Comprehensive Measures to Strengthen Cyber Security in the Wake of New Methods of Terrorism

Upload: lamngoc

Post on 29-Apr-2018

217 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

SymbiMUN 2017

Model United Nations Conference

DISEC

Study Guide

Agenda

Comprehensive Measures to Strengthen Cyber Security in the Wake of New Methods of

Terrorism

Page 2: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

Table of Contents

Sr. No. Topics

1 Letter from the Executive Board

2 Introduction

3 Existent International Conventions Related to Cyber

Crime

4 Cyber Terrorism and Specific Instances

5 Cyber Terrorism by Specific Non State Actors in the

Middle East

6 Questions to Consider During Research

7 Questions a Resolution Must Answer (QARMA)

8 Some Recommended Sources for Research

9 Bibliography and Additional Research Links

Page 3: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

1. Letter from the EB Dear Delegates,

Greetings on behalf of the Executive Board for the DISEC for SymbiMUN 2017. We eagerly

look forward to being a part of your committee as Executive Board members.

With regard to the DISEC we would like to inform you that the agenda has been chosen

keeping in mind the theme for the conference which endeavors to take pre-emptive

actions in order to prevent future peril. One major issue which is sure to crop up to much

greater extents as the world progresses is that of cyber terrorism. As computers continue

to become more complex, they are becoming liable to attacks of a greater magnitude.

As most nuclear weapons are controlled via computers, there is a threat of cyber

terrorists even using complex codes to hack into their systems and cause a detonation of

nuclear weapons which can cause widespread destruction. Similar acts can also be

performed if cyber terrorism is not averted at the earliest.

The DISEC at SymbiMUN 2017 has been delegated with the responsibility of devising

comprehensive measures to combat the growing threat of cyber terrorism by non-state

actors.

The ISIS specifically is an extremely technologically capable entity which possesses the

ability to engage in cyber terrorism with several different countries. Another method that

is being used by it in order to propagate its cause and message is through social media

and the internet. Never before has the world seen such a technologically capable

extremist organization like the ISIS.

It is now the responsibility of the DISEC at SymbiMUN 2017 to address this issue

comprehensively and we wish all delegates the very best!

Regards,

Executive Board,

DISEC, SymbiMUN 2017

Page 4: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

2. Introduction At the very onset, the Executive Board for the DISEC at SymbiMUN 2017 would like to inform the delegates of this committee that country specific research is imperative for effective participation during the conference. In order to participate in an appreciable manner, it is hence imperative for the delegates to research well in relation to their country. Delegates must find out whether their country has been a victim of cyber terrorism, past international actions their country has taken in relation to the agenda under discussion and what measures have been suggested by the country to prevent cyber-terrorism. In case their countries have not taken any major steps or are not major parties to this issue of cyber-terrorism, delegates are suggested to come up with their own stance and participate accordingly. Let us first understand the basic meaning of cyber terrorism.

➢ A Basic Insight

Recent incidents have highlighted the lack of consensus internationally on what defines a cyberattack, an act of war in cyberspace, or cyber terrorism. Cyberwar is typically conceptualized as state-on-state action equivalent to an armed attack or use of force in cyberspace that may trigger a military response with a proportional kinetic use of force.

Cyberterrorism can be considered “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.” Cybercrime includes unauthorized network breaches and theft of intellectual property and other data; it can be financially motivated, and response is typically the jurisdiction of law enforcement agencies. Within each of these categories, different motivations as well as overlapping intent and methods of various actors can complicate response options. Criminals, terrorists, and spies rely heavily on cyber-based technologies to support organizational objectives. ➢ Cyberterrorists are state-sponsored and non-state actors who engage in

cyberattacks to pursue their objectives. ➢ Cyberspies are individuals who steal classified or proprietary information used by

Page 5: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

governments or private corporations to gain a competitive strategic, security, financial, or political advantage.

➢ Cyberthieves are individuals who engage in illegal cyberattacks for monetary gain. ➢ Cyberwarriors are agents or quasi-agents of nation-states who develop

capabilities and undertake cyberattacks in support of a country’s strategic objectives.

➢ Cyberactivists are individuals who perform cyberattacks for pleasure, philosophical, political, or other nonmonetary reasons.

There are no clear criteria yet for determining whether a cyberattack is criminal, an act of hacktivism, terrorism, or a nation-state’s use of force equivalent to an armed attack. Likewise, no international, legally binding instruments have yet been drafted explicitly to regulate inter-state relations in cyberspace.

➢ What are Cyber Attacks?

“Cyberattack” is a relatively recent term that can refer to a range of activities conducted through the use of information and communications technology (ICT). The use of distributed denial of service (DDoS) attacks has become a widespread method of achieving political ends through the disruption of online services. In these types of attacks, a server is overwhelmed with Internet traffic. So access to a particular website is degraded or denied. The advent of the Stuxnet worm, which some consider the first cyberweapon, showed that cyberattacks may have a more destructive and lasting effect. Appearing to target Iran, Stuxnet malware attacked the computerized industrial control systems on which nuclear centrifuges operate, causing them to self-destruct.

Recent international events have raised questions on when a cyberattack could be considered an act of war, and what sorts of response options are available to victim nations. Although there is no clear doctrinal definition of “cyberwarfare,” it is typically conceptualized as state-on-state action equivalent to an armed attack or use of force in cyberspace that may trigger a military response with a proportional kinetic use of force. Cyber terrorism can be considered “the premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives.” Cybercrime includes unauthorized network breaches and theft of intellectual property and other data; it can be financially motivated, and response is typically the jurisdiction of law enforcement agencies. The cyberattacks on Sony Entertainment illustrate the difficulties in categorizing

Page 6: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

attacks and formulating a response policy. On November 24, 2014, Sony experienced a cyberattack that disabled its information technology systems, destroyed data and workstations, and released internal emails and other materials. Warnings surfaced that threatened “9/11-style” terrorist attacks on theaters scheduled to show the film The Interview, causing some theaters to cancel screenings and for Sony to cancel its widespread release, although U.S. officials claimed to have “no specific, credible intelligence of such a plot.” The Federal Bureau of Investigation (FBI) and the Director of National Intelligence (DNI) attributed the cyberattacks to the North Korean government; North Korea denied involvement in the attack, but praised a hacktivist group, called the “Guardians of Peace,” for having done a “righteous deed.”

This incident illustrates challenges in cyberattack categorization, particularly with respect to the actors involved and their motivations as well as issues of sovereignty regarding where the actors were physically located. With the globalized nature of the Internet, perpetrators can launch cyberattacks from anywhere in the world and route the attacks through servers of third-party countries.

3. Existent International Conventions Related to Cyber Crime

➢ Council of Europe Convention on Cybercrime

The Council of Europe Convention on Cybercrime is the first international treaty to attempt to harmonize laws across countries as to what constitutes criminal activity in the cyber realm. This law enforcement treaty, also known as the Budapest Convention, requires signatories to adopt criminal laws against specified types of activities in cyberspace, to empower law enforcement agencies to investigate such activities, and to cooperate with other signatories. While widely cited as the most substantive international agreement relating to cybersecurity, some observers regard it as unsuccessful. Critics warn that the Convention is short on the enforcement side, and lacks jurisdiction in countries where criminals operate freely. In addition to most members of the Council of Europe, the United States and three other nations have ratified the treaty. ➢ United Nations General Assembly Resolutions

A series of U.N. General Assembly resolutions relating to cybersecurity have been adopted over the past 15 years. One resolution called for the convening of and a report from an international group of government experts from 15 nations, including the United

Page 7: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

States. The stated purpose of this process was to build “cooperation for a peaceful, secure, resilient and open Information and Communication Technology (ICT) environment” by agreeing upon “norms, rules and principles of responsible behaviour by States” and identifying confidence and capacity-building measures, including for the exchange of information. Unlike the work done at Tallinn under the auspices of NATO, this U.S.-led process included both China and Russia. The resulting 2010 report, sometimes referred to as the Group of Governmental Experts (GGE) Report, recommended a series of steps to “reduce the risk of misperception resulting from ICT disruptions” but did not incorporate any binding agreements. Nevertheless, some observers believe the report represents progress in overcoming differences between the United States and Russia about various aspects of cybersecurity. In December 2001, the General Assembly approved Resolution 56/183, which endorsed the World Summit on the Information Society (WSIS) to discuss information society opportunities and challenges. This summit was first convened in Geneva, in 2003, and then in Tunis, in 2005, and a10-year follow-on in Geneva in May 2013. Delegates from 175 countries took part in the first summit, where they adopted a Declaration of Principles—a road map for achieving an open information society. The Geneva summit left other, more controversial issues unresolved, including the question of Internet governance and funding. At both summits, proposals for the United States to relinquish control of the Internet Corporation for Assigned Names and Numbers (ICANN) were rejected. An international treaty banning cyberwarfare and/or information weapons has been proposed in the United Nations by Russian and German delegations. Preferring a normative approach over an arms control styled regime, the United States may wish to reserve its right to develop technologies for countermeasures and reconnaissance against potential cyber foes, particularly those acting outside the boundaries of a state system. ➢ International Telecommunications Regulations

The International Telecommunication Union (ITU) regulates international telecommunications through binding treaties and regulations and nonbinding standards. Regulations prohibit interference with other nations’ communication services and permit control of non-state telecommunications for security purposes. The regulations do not, however, expressly forbid military cyberattacks. Also, ITU apparently has little enforcement authority.

Page 8: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

The ITU convened the World Conference on International Telecommunications (WCIT) in Dubai, United Arab Emirates, during December 3-14, 2012, to review the International Telecommunications Regulations. In the run-up to the summit, many security observers expressed concern over the closed nature of the talks and feared a shift of Internet control away from private entities such as ICANN toward the United Nations and national governments. Although these concerns proved to be largely baseless, a controversial deep packet inspection proposal from the People’s Republic of China was adopted at the summit. Dissenting countries, including Germany, fear that this recommendation will result in accelerated Internet censorship in repressed nations. ➢ Other International Law

Some bodies of international law, especially those relating to aviation and the sea, may be applicable to cybersecurity; for example by prohibiting the disruption of air traffic control or other conduct that might jeopardize aviation safety. Bilaterally, mutual legal assistance treaties between countries may be applicable for cybersecurity forensic investigations and prosecution.

4. Cyber Terrorism and Specific Instances

Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. Cyber terrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyber terrorism. Cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological since this is a form of terrorism. ➢ Major Concerns Associated With Cyber Terrorism

As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. Many groups such as Anonymous, use tools such as Denial of- service attack to attack and censor groups who oppose them, creating many concerns for freedom and respect for differences of thought.

Page 9: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

The focus of the international community has to be on measures which shall make the internet safe enough to prevent the execution of any and all cyberattacks. As the Internet continues to expand, and computer systems continue to be assigned more responsibility while becoming more and more complex and interdependent, sabotage or terrorism via cyberspace may become a more serious threat. This is what the DISEC has to work towards avoiding at SymbiMUN 2017. ➢ Some Specific Instances of Cyber Terrorism and International Action

• Estonia The Baltic state of Estonia was target to a massive denial-of-service attack that ultimately rendered the country offline and shut out from services dependent on Internet connectivity for three weeks in the spring of 2007. The infrastructure of Estonia including everything from online banking and mobile phone networks to government services and access to health care information was disabled for a time. The tech-dependent state was in severe problems and there was a great deal of concern over the nature and intent of the attack. The cyber attack corresponded to an Estonian-Russian dispute over the removal of a bronze statue depicting a World War II-era Soviet soldier from the centre of the capital, Tallinn. In the midst of the armed conflict with Russia, Georgia likewise was subject to sustained and coordinated attacks on its electronic infrastructure in August 2008. In both of these cases, circumstantial evidence point to coordinated Russian attacks, but attribution of the attacks is difficult; though both the countries point the finger at Moscow, proof establishing legal culpability is lacking.

• China The Chinese Defence Ministry confirmed the existence of an online defence unit in May 2011. Composed of about thirty elite internet specialists, the so-called "Cyber Blue Team," or "Blue Army," is officially claimed to be engaged in cyber-defence operations, though there are fears the unit has been used to penetrate secure online systems of foreign governments. This would also fall under the broad definition fo cyber terrorism.

• Israel May 2011 Israeli Prime Minister Benjamin Netanyahu announced the establishment of the National Internet Defense Taskforce, charged with developing tools to secure vital Israeli online infrastructure. "The main responsibility of the taskforce will be to expand

Page 10: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

the state's ability to defend vital infrastructure networks against cybernetic terrorist attacks perpetrated by foreign countries and terrorist elements"

• NATO Member Nations During the Kosovo conflict in 1999, NATO computers were blasted with e-mail bombs and hit with denial-of-service attacks by activists protesting the NATO bombings. In addition, businesses, public organizations, and academic institutes received highly politicized virus-laden e-mails from a range of Eastern European countries, according to reports. Web defacements were also common. After the Chinese Embassy was accidentally bombed in Belgrade, Chinese activists posted messages such as "We won't stop attacking until the war stops!" on U.S. government Web sites. All NATO member nations are carrying out coordinated efforts in order to prevent cyber terrorism and have been able to set up wings which specifically work towards avoiding any and all cyber attacks on all of the member nations of the NATO.

• Other Nations Most countries in modern times have set up very strong cyber security wings. However, rapid progress in the field of technology has left a lot of their defence systems outdated.

5. Cyber Terrorism by Specific Non State Actors in the Middle East

➢ The Islamic State, Al Nusra and Cyber Terrorism The Islamic State and the Al Nusra Front are two major extremist organization which are functioning out of the Middle East. The Al Qaeda also has a huge presence in the region. Links have been provided in the last section of the study guide in case delegates want to read about these extremist organizations in details. This part of the study guide solely focuses on their cyber activities. Among these 3 extremist organizations, the Islamic State or IS has by far the biggest online presence and has effectively made use of the Internet to further recruitment of members to its cause. This clearly suggests that the IS has an extremely active internet and cyber wing which is well capable of unleashing acts of cyber terrorism on various member nations in course of time which is sure to cause widespread devastation in a huge way. This needs to be looked into by the DISEC at the earliest and this is going to be the major topic for discussion at SymbiMUN 2017 in the DISEC.

Page 11: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

Two major aspects that are going to be discussed in relation to the IS and other extremist groups are as follows:

i. Cyberterrorism

The entire concept of cyber terrorism has been discussed comprehensively in the above sections of the study guide. Apart from cyber terrorism, various other aspects of cybercrime have also been elucidated in a very appreciable manner. Though there are no clearly reported threats or instances of cyberterrorism which the IS can be credited for, there are many reports which suggest that the IS is slowly and steadily developing the capability to utilize cyberterrorism as an effective means of furthering its cause. Member nations need to take immediate action to prevent IS as well as all other major extremist organizations from carrying out cyberattacks which requires an effective framework as well as co-operation among all member nations. There has to be open information sharing and technical collaboration to protect all internet systems. A new convention in this regards must be mulled over.

ii. Use of Social Media and the Internet The use of Social Media has become a matter of absolutely grave concern for the world in relation to the Islamic State. Though other extremist organizations are also making use of the Internet in order to brainwash and recruit people, none come close to the IS in this department. A properly organized structure has ensured that the IS has recruited over 10000 individuals to its extremist organization via social media sites like Facebook, Twitter and various chat messengers available online as well. Well trained handlers make use of strategic methods to lure innocent youths to join various extremist pages or groups where they slowly and steadily brainwash them into finally joining extremist causes. Apart from this, the work of recruitment is also incentivized for the internet handlers who are offered huge sums of money running into thousands of dollars for successful recruitments. The only way to control this at the moment is for strict supervision of the Internet and social media by national governments. However, there is a thin line between supervision

Page 12: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

and violation of the right to privacy of an individual while supervising and filtering content. Member nations have to discuss this issue and try and come up with an effective and universally acceptable solution to solve this problem. Though some UN member nations like India have been able to take effective action to by and large prevent internet handlers, there is still a lot left to be done. ➢ Other Unconventional Methods Being Used

Delegates of the DISEC are also encouraged to bring up other conventional and indirect confrontational methods being used by extremist elements in the Middle East to further their cause and movement. These also form a part of the agenda. However, the primary aspects of the agenda which need to be discussed are the use of cyber terrorism and social media by these extremist organizations in the Middle East.

6. Questions to Consider During Research It is imperative that the following five questions be answered by all delegates during their research process before the MUN:

➢ Does your nation have an effective framework to tackle cyber terrorism? ➢ Has your nation or any of its allies been a victim of cyber terrorism in a big way? ➢ How open is the Internet in your country? Are various sites restricted in your

nation? E.g. Various social media sites are banned in China ➢ Is your nation a signatory to any international conventions related to cyber

security? ➢ Have any citizens of your country joined extremist organizations in the Middle East

like the ISIS or Al Nusra? Apart from this, research in relation to different aspects covered in the study guide and those that are specific to your country must also be carried out for effective participation during the MUN conference.

7. Questions a Resolution Must Answer (QARMA)

Page 13: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

➢ How can the Right to Privacy be ensured while also carrying out strict supervision of

the Internet to prevent activities of non-state actors? ➢ What is the possibility of establishing a convention which makes all nations liable to

meeting with certain cyber security standards while also adhering to strict guidelines which prevent cyber espionage?

➢ What steps can be taken to dilute the impact of extremist organizations based out of the Middle East on the Internet?

➢ What steps must be suggested to member nations to prevent citizens from their own countries from being brainwashed by the extremist organizations over the internet?

➢ What is the definition of cyberterrorism? Without legally defining it, there is no legal possibility of carrying our actions to prevent it.

8. Some Recommended Sources for Research

➢ Cyber Terrorism

• http://www.wired.com/insights/2015/01/is-cyber-terrorism-the-new-normal/

• http://www.emrisk.com/knowledge-center/newsletters/cyber-terrorism-emerging-threat

• https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf

• http://www.un.org/en/terrorism/ctitf/pdfs/ctitf_interagency_wg_compendium_legal_technical_aspects_web.pdf

• http://www.computerworld.com/article/2492864/cybercrime-hacking/un--more-international-cooperation-needed-to-fight-cyberterrorism.html

➢ Use of Social Media by Extremist Organizations

• http://www.thepointmagazine.com.au/post.php?s=2014-12-05-opinion-isiss-social-media-machine

• http://www.brookings.edu/blogs/techtank/posts/2015/11/19-isis-social-media-power-lesaca

• http://www.theguardian.com/world/2015/nov/28/isis-fighters-rubber-ducks-reddit-4chan

➢ ISIS

Page 14: Model United Nations Conference DISEC Study Guidesymbiosisinternationalschool.net/final_site/symbimun/pdf/...SymbiMUN 2017 Model United Nations Conference DISEC Study Guide Agenda

http://tonyblairfaithfoundation.org/religion-geopolitics/commentaries/backgrounder/what-isis

➢ Al Nusra

http://www.bbc.com/news/world-middle-east-18048033

➢ Al Qaeda http://www.encyclopedia.com/topic/Al-Qaeda.aspx

9. Bibliography and Additional Research Links

➢ https://www.fas.org/sgp/crs/natsec/R43955.pdf ➢ http://www.un.org/en/terrorism/ctitf/wg_counteringinternet.shtml ➢ http://www.nepmun.org/phocadownloadpap/security%20council-study%20guide-

nepmun14.pdf ➢ http://www.un.org/press/en/2012/ga11259.doc.htm ➢ http://www.un.org/press/en/2012/ga11259.doc.htm