Upload
archit-sharma
View
86
Download
0
Embed Size (px)
DESCRIPTION
A comprehensive background for the delegates in security council of JKMUN 2013
Citation preview
BACKGROUND
GUIDE
OF
Security Council
J K MUN 2013
LETTER FROM THE EXECUTIVE BOARD : Dear Delegates,
It is our distinct pleasure to welcome you to JKMUN 2013 and, more importantly, to the
United Nations Security Council. We are specially honoured to be the Executive Board for
the forthcoming thrilling and enjoyable sessions and we are so looking forward to working
with every one of you.
From each one of you, we expect impeccable diplomatic conduct – which includes diplomatic
courtesy, effective lobbying and above all compromising on negotiable grounds. Delegates
are also expected to be well versed with the MUN rules of procedure and the generic flow of
committee proceedings, in order to enhance the level of debate. Also if it’s your first MUN,
it’s ok, there isn’t a gun to your head to remain silent. Be free and be strong.
Delegates, it is you who form the committee and are the once who raise (or reduce) the
quality or the level of debate in a committee. So, a majority share of responsibility with in
ensuring the overall success of the Committee rests on your shoulders.
The members of the Executive Board have prepared the background guides for your
reference.
However, it has to be noted that the background guide only contains certain basic information
which may form the basis for the debate and your research. Please be sure to read them at
least once, before the conference. However, do not stop there: Make use of the internet and
save as much information as possible. Working papers and other study materials are allowed
in council, so you don’t have to worry about managing loads of research material in mind.
Our aim in the council would be to urge you, the delegates to put your best foot forward and
take back an unforgettable experience.
As your executive board, we want active participation from all the delegates, and we
shall feel more than happy to clear any doubts that you may have, or any clarifications
that you may seek. Please feel free to reach out.
Note: The Background Guide is just for reference and is strictly not to be used as a
proof or as a document for the conference.
Wish you best of luck for the conference Sincerely ,
Archit Sharma Sania Sharma
President Vice-President
Security Council Security Council
JKMUN'13 JKMUN'13
INTRODUCTION TO SECURITY COUNCIL :
The Security Council has primary responsibility, under the Charter, for the maintenance of
international peace and security. It is so organized as to be able to function continuously, and a
representative of each of its members must be present at all times at United Nations Headquarters.
On 31 January 1992, the first ever Summit Meeting of the Council was convened at Headquarters,
attended by Heads of State and Government of 13 of its 15 members and by the Ministers for Foreign
Affairs of the remaining two. The Council may meet elsewhere than at Headquarters; in 1972, it held a
session in Addis Ababa, Ethiopia, and the following year in Panama City, Panama.
When a complaint concerning a threat to peace is brought before it, the Council's first action is usually
to recommend to the parties to try to reach agreement by peaceful means. In some cases, the
Council itself undertakes investigation and mediation. It may appoint special representatives or
request the Secretary-General to do so or to use his good offices. It may set forth principles for a
peaceful settlement.
When a dispute leads to fighting, the Council's first concern is to bring it to an end as soon as
possible. On many occasions, the Council has issued cease-fire directives which have been
instrumental in preventing wider hostilities. It also sends United Nations peace-keeping forces to help
reduce tensions in troubled areas, keep opposing forces apart and create conditions of calm in which
peaceful settlements may be sought. The Council may decide on enforcement measures, economic
sanctions (such as trade embargoes) or collective military action.
A Member State against which preventive or enforcement action has been taken by the Security
Council may be suspended from the exercise of the rights and privileges of membership by the
General Assembly on the recommendation of the Security Council. A Member State which has
persistently violated the principles of the Charter may be expelled from the United Nations by the
Assembly on the Council's recommendation.
A State which is a Member of the United Nations but not of the Security Council may participate,
without a vote, in its discussions when the Council considers that that country's interests are affected.
Both Members of the United Nations and non-members, if they are parties to a dispute being
considered by the Council, are invited to take part, without a vote, in the Council's discussions; the
Council sets the conditions for participation by a non-member State. The Presidency of the Council
rotates monthly, according to the English alphabetical listing of its member States.
COMMITTEE BACKGROUND :
The Security Council is the most decisive organ of the United Nations organization. This organ holds power to carry out discussions and implement resolutions on matters which prove to be a threat to international peace and harmony. The Council is made up of 15 nations: five are permanent members and the remaining 10 seats rotate every 2 years among the nations in the UN. The 5permanent members are China, France, Russia, the United Kingdom and the United States.
Permanent Member Countries of the Security Council :
1.People’s Republic of China
2.The Russian Federation
3.French Republic
4.United Kingdom of Great Britain and Northern Ireland 5. United States of America
Non Permanent Members :
1. Azerbaijan (2013)
2. India (2012) 3. South Africa (2012)
4. Colombia (2012) 5. Morocco (2013)
6. Togo (2013)
7. Germany (2012)
8. Pakistan (2013) 9. Guatemala (2013)
10. Portugal (2012)
The permanent members of UNSC are vested with “VETO” powers Each non-permanent member has one vote. While drafting a resolution, if at all there is a majority of non-permanent members in favour or against (the resolution); the permanent members have the power to overrule the majority and pass the resolution during the session.
Role of the Security Council :
The Security Council has primary responsibility, under the United Nations Charter,
for the maintenance of international peace and security.
It is for the Security Council to determine when and where a UN Peacekeeping operation
should be deployed.
(The Security Council in New York plays a crucial role in peacekeeping.)
The Security Council responds to crises around the world on a case-by-case basis and it has a range
of options at its disposal. It takes many different factors into account when considering the
establishment of new peacekeeping operation, including:
Whether there is a ceasefire in place and the parties have committed themselves to a peace
process intended to reach a political settlement;
Whether a clear political goal exists and whether it can be reflected in the mandate;
Whether a precise mandate for a UN operation can be formulated;
Whether the safety and security of UN personnel can be reasonably ensured, including in
particular whether reasonable guarantees can be obtained from the main parties or factions
regarding the safety and security of UN personnel.
The Security Council establishes a peacekeeping operation by adopting a Security Council resolution.
The resolution sets out that mission’s mandate and size.
The Security Council monitors the work of UN Peacekeeping operations on an ongoing basis,
including through periodic reports from the Secretary-General and by holding dedicated Security
Council sessions to discuss the work of specific operations.
The Security Council can vote to extend, amend or end mission mandates as it deems appropriate.
Under Article 25 of the Charter, all UN members agree to accept and carry out the decisions of the
Security Council. While other organs of the UN make recommendations to Member States, the
Council alone has the power to take decisions which Member States are obligated to implement.
Agenda : Innovation in combating global security
threats focusing on Technology Against Crime
Introduction :
The introduction of information and communication technology (ICT) in the last 60 years has
undoubtedly accelerated development in every sphere of the world, including terrorism. The
digitalization of innumerable processes, from education to migration, facilitates worldwide
interaction, minimizes bureaucracy and promotes open communications, innovation and
widespread information. Technology frees people from geographical and cultural boundaries,
broadening horizons and eroding frontiers.
It is undeniable that life on Earth is simultaneously experienced between the virtual and
physical realms. Governments use the Internet for expedient control of national systems.
From traffic lights to weapons control, a considerable part of daily life depends on how data
is exchanged between networks and systems. As the worldwide reliance in technology
advances, so do insecurities and threats and the need to secure the space where these data
exchanges take place: cyberspace.
The developments in ICT allow terrorist elements to organize and advocate their causes, as
well as allowing companies to market their goods worldwide. Terrorist organizations adapted
technological advances to their advantages and learned to navigate without being detected by
techno-centric approaches. Nowadays, cyberspace is as much a target as public transportation
or government buildings. Cyber terrorism is a volatile sphere of little definition and
enormous potential for disaster.
Disaster is Inevitable
“Political, social, and economic changes are the
motivations present in real-world terrorism.
Combining a dependence on Internet-connected
systems for banking and E-commerce with the ability
of anyone with a desire and readily available tool to
disrupt these areas, results in a situation that is all
too clear: unless steps are taken to significantly
reduce risks, disaster is inevitable. Even with the best
risk reduction, there are still likely to be problems.”
Cyberspace :
It is a forum of interaction, and it is not owned by anyone. Although it is partially
regulated, there is no central authority to police it. As technology expands and becomes more
affordable, more people have access to communication, information and the benefits of a
better life. The anonymity, freedom of expression and remote accessibility characteristic of
cyberspace, however, make it an optimal target for crime, illegal activities and terrorism.
Users, companies and governments alike fall victims to thousands of daily global cyber-
attacks from hackers looking to disrupt communication and steal secrets to sell to the highest
bidder. With every occurrence, the potential of a cyber-terrorist attack that can shut down
entire governments or take control over them looms over all member states.
Cyber terrorism is a global problem, and it requires a global solution.
Since the early 1970s, the United Nations member states have openly tackled international
terrorism and possible measures to eliminate it in every sphere and manifestation. After long,
meticulous and futile debates regarding a detailed definition of distinguishable acts of
terrorism, states agreed that an act of terrorism is any action regardless of its nature or
perpetrator—whether a state or private individual—that threatens non-military institutions
and personnel and aims to destabilize the status quo of the international peace and security of
states. Although there is no exact definition of what cyber terrorism refers to, many seem to
abide by the concept offered in the paper on the issue from the Special Oversight Panel on
Terrorism in 2000: “Cyber Terrorism is the convergence of terrorism and cyberspace. It is
generally understood to mean unlawful attacks and threats of attack against computers,
networks, and the information stored therein when done to intimidate or coerce a government
or its people in furtherance of political or social objectives….” For an attack to qualify as
cyber terrorism, it should result in violence against persons or property, or at least cause
enough harm to motivate fear.
Cyber terrorism draws parallels to its non-virtual twin in the complexity of its definition and the width of its scope. Although the term has never had a technical definition, multiple documents have enumerated efforts to prevent the spread of cyber-terrorism within the UN member states and agencies that were established to prevent targeted hostile activity in cyberspace.
Elements of Cyber Terrorism : Several elements are important to understanding the full scope of the problem. One element
results from the affiliation of those perpetrating the attacks. Many perpetrators affiliate with
some kind of terrorist group by reading about their goals and ideals and committing to
carrying out certain actions, without having met the group’s members in exchange for money
or other benefits. Such loose ties complicate investigations and media reports on attacks.
Also, new technology can promote alliances between groups with similar interests, which can
strengthen the groups and give them more resources and opportunities to access information
resources.
Alongside the affiliation aspect of cyber terrorism, it is also important to consider the
motivation behind all attacks. Cyber terrorism has similar motives to those of real-world
terrorism. Social, political and even economic issues are motivations for these attacks.
Having the resources to access other sources of information as well as a strong motivation for
change might result in attacks for the purpose of hurting or alarming not only the target
government or enterprise, but the general population to demonstrate power.
Cyber terrorism aims to shut down critical national infrastructures, such as energy,
transportation and government operations, to coerce or intimidate the population.
Intimidation of civilian enterprises also results from cyber terrorism, which tries to
communicate political, economic or social beliefs that threaten all countries across the world.
This is why protection of information has become a priority for the international community.
Not only are large databases and important details about governments and enterprises at risk,
but personal information from all citizens is also in danger, making this an issue of global
proportions and urgency.
{This map shows victims of a recent cyber terrorism attack, indicating how widespread and universal the threat is.}
Current Situation :
As the online economy continues to grow, and security and personal transactions are
increasingly conducted through online portals, the Internet has become an even bigger target
for cyber terrorists. Internet transactions accounted for nearly $700 billion of economic
activity in 2011, and the increasing amount of Internet access worldwide means that more
countries are vulnerable.
While many governments are taking independent steps to boost their own cyber security,
there is widespread concern throughout the international community that this is not enough.
Within a single nation’s security infrastructure, there is often great difficulty in coordinating
and communicating among different bureaucracies. This lack of internal consensus not only
leads to increased difficulty in designing a solution to the security threat, but also leaves a
nation more vulnerable in the event of an attack if agencies are unable to coordinate their
responses to a breach in network security.
Another problem to consider within the current framework of cyber security mechanisms is
the difficulty of integrating cyber security for the wide variety of Internet users: government,
industry, private citizens and international transactions. Further adding to this entanglement is
the fundamental question of online privacy and whether security measures violate or protect
that principle.
{A typical website hacked by unethical hackers of Pakistan Cyber Army.}
Hackers :
The Internet has come a long way since a basic frame in 1991, thanks to governments’
funded research that allowed programmers and developers to work with near-limitless
scope. These developments made navigation and interactions faster and more reliable for
individual users and, by shedding the information handicap, tested the limits of
development. Another set of actors vital for the development of every component of
cyberspace were individual users who were committed to exploring and innovating
outside set rules, codes and regulations.
They became known as hackers. Hackers find and exploit weaknesses in the system for
various purposes and are at times
employed by companies and governments. Anyone with an Internet connection and
knowledge of programming can be a hacker, regardless of socioeconomic, cultural or
educational background. Hackers are said to wear three hats, which is to say they are
classified according to their motivations. Black Hat hackers exploit the web for malicious
activities. Grey Hat hackers are mainly interested in making a name for themselves, pushing
the boundaries of exploiting and publicizing weaknesses in systems and gaining a reputation.
White Hat hackers who tend to be hack activists. Regardless of their intentions, origins or
employer, hacking is an illegal, and often criminalized, activity. Hackers write programs
called malware to infiltrate operating systems and disrupt their programming. Malware come
in different shapes and forms and is sometimes harmless, opening connections that play
constant ads without apparent cause, or spyware that records personal information and is used
to steal someone’s identity.
Hackers are also the best defence against cyber threats. Governments and security companies
rely on information provided by hackers to perfect their programs and to find zero day
vulnerabilities, unknown weak points in the programming. Many companies pay for this
information since it allows them to perfect their software and security programs. .
{Hackers have been one of the main exploiters of cyber-terrorism,
endangering ecommerce and other transactions on the web.}
Attacks on States: Cyber Terrorism, Hacktivism or Warfare?
Based on the normative definition of cyber terrorism, there has
been no report of a cyber-terrorist attack. No cyber-attack has yet
led to intentional loss of civilian life, but the technology to take
over a country’s world-wide web services, remotely alter
mechanical functions or even hack unmanned drones is
undeniable. The international renowned hacktivists group Anonymous, founded in 2003, is
just one of many groups dedicated to fighting Internet censorship around the world.
Anonymous utilizes distributed denial of service (DDoS) attacks to cripple websites of
companies that advocate Internet censorship. During an attack, the servers are constantly
asked for services and information from hundreds of sources until they cannot process the
inquiries and freeze. Once their targets are disabled, Anonymous edits the pages to display its
iconic message and makes public private information ranging from passwords and addresses
to classified security documents on the web. Like other hackers, Anonymous publishes the
methods and botnets used the attack after it has been accomplished. Anonymous claims
responsibility for hacking at for least 15 countries’ government websites in the first eight
months on 2012.6 Some of their most famous operations include This attack is known in
cyber circles as the beginning of the First Cyber War and a wake-up call to cyber security
worldwide. Estonia became the first country in the world to be the targeted and defend itself
from a cyber attack.
Cyber-invasion : Estonia is the most cyber-integrated country in the world. The government is one of the
largest
Internet service providers, and users have wide access to wireless connections. About 90
percent
of financial transactions in Estonia are done online, and even government processes and
bureaucracies have migrated to virtual services. On April 28, 2007, after a period of protest
because of the relocation of a Soviet statue, an attack crippled the nation. Estonia experienced
the equivalent of a carpet-bombing of DDoS, which forced the government to close the
country’s electronic borders and take extraordinary measures to regain control of its
cyberspace. The government was not prepared for an attack of this magnitude; the longest
attacks lasted 10 hours, which in cyberspace's relative time frame can seem like an eternity
The attack was a virtual manifestation of popular discontent by ethnic Russians for the
relocation of a bronze statue from a public park to a cemetery. The ethnic Russians felt the decision undermined the country’s Soviet legacy and dishonoured the memory of fallen
World War II soldiers. The attack was received from multiple thousands
of zombie computers around the globe. Although one
of the Internet protocol (IP) addresses was traced to the Kremlin, the Russian government
denied any involvement with the event.
Cyber-Weapons : The biggest malware sabotage of the 21st century, the Stuxnet virus, affected the Iranian
nuclear centrifuges. Normally, malware or spyware needs an executer, just as a gun requires
someone to pull the trigger before it will fire. Malware requires someone, somewhere, to be
in front of a monitor typing lines of code and executing the program, a remote trigger. In June
2010, cyberspace experienced the Stuxnet virus, a new type of weapon never seen before.
Stuxnet was not designed to affect an operating system (OS) or to spy on industries or people,
nor did it make computers or servers explode as the media sometimes imagines.
It was a self-operating malware—there was no one on the other side of a screen giving it
commands.
The virus was introduced to a computer from a portable drive. It then propagated to the
network the computer was connected to, leaving little trace of its existence. Stuxnet kept
going until it reached a portable drive that was then connected to an offline computer used to
program the reactors’ valves.
Once inside, the program reprogrammed the rate of the responses, which caused the
centrifuges to overheat and stop functioning or explode.
It took Siemens, the maker of the valves, two years to fix the vulnerability the program
targeted. Siemens operates in140 countries and is one of the biggest conglomerates in the
world.
Their parts are used by civilian and military applications alike. At first, the virus was thought
to be a terrorist attack meant to cripple the Iranian state. It was later confirmed it was a joint
government effort against the plant and was classified as a cyber-weapon. Similar strands of
viruses have since been tracked, each stronger and smarter than its predecessors.
International Action :
There is growing concern about the global effects cyber terrorism brings. The Internet has
allowed many groups to access resources with the purpose of committing terrorist attacks
through electronic means. European legislation has begun to address the topic through legal
instruments such as the Cybercrime Convention in 2001 and the establishment of the Council
of Europe Convention on the Prevention of Terrorism in 2005.The United States has also
begun to tackle this issue through funding intelligence offices within the U.S. Army and the
creation of the Centre for Infrastructural Warfare Studies.
{Cyber Command of United States Military.}
The International Telecommunications Union (ITU) :
ICTs were a particular area of interest for member states long before the League of Nations,
the UN’s predecessor, was even considered. Collective concern over the communication was
solidified in 1865 with the establishment of the International Telegraph
protection of means of Union. In 1943, the organization was renamed the International
Telecommunications Union(ITU), and it joined the United Nation’s ranks in 1947. The ITU
is the oldest and one of the largest agencies in the UN system, incorporating all 193 member
states and enlisting help from both private and public sectors.9 Based in Geneva, the agency
has 12 offices around the world. From transmitting waves to the receiving devices such as
radio consoles and cell phones, ITU is tasked with monitoring, managing and developing
communication technologies and standards of use and distribution of all aspects of ICTs.
ITU’s mandate is to maintain open and secure means of communication and bring them to as
many people as possible, thus reinforcing “everyone’s fundamental right to communicate.”
The agency is organized into three different sectors: radio communications, standardization
and development. Its work is supported by study groups in which members discuss and
define the frameworks applied to present and emerging telecommunications developments
that are later adopted as recommendations, much like GA resolutions. To stay informed and
inform others of their findings and work, ITU hosts meetings around the world that bring
members and non-members together.
As the threats to cyberspace grew wider and globalized, ITU convened experts to compile a
comprehensive international cooperation framework for cyber security. In May 2007, the
agency launched the Global Security Agenda (GSA). The experts identified five layers
required
for efficient cyber security11:
To carry out its agenda, the ITU turned to the International Multilateral Partnership Against
Cyber Threats (IMPACT), a not-for-profit cyber-security organization that links academia,
industry and international bodies to provide a comprehensive service.
Based in Cyber java, Malaysia, IMPACT provides access to expertise, facilities and resources
to effectively address cyber threats and protect ICTs’ infrastructure. Currently, 144 member
states enlist IMPACT’s guidelines and services, including some of the biggest cyber security
companies in the world such as Microsoft, Kasper sky Lab and Symantec.
IMPACT became the official ICT security provider for the United Nations in 2011.
Recommendations for Creating a Resolution :
When creating a resolution, delegates must keep in mind the political, economic and social
factors that influence their stance on cyber terrorism. Delegates must take into consideration
both the benefits and negative aspects of the proposed solutions and weigh and discuss a
balance between the two. Sovereignty and existing codes of conduct, resolutions and
domestic regulations must also be taken into consideration.
It is also important that delegates work together in regional and international working blocs to
discuss the impact this issue may have in the future. Debate and consider the previous GCA
points and goals and how to implement the programs in their states, bearing in mind that
cyber terrorism is an international threat and no state can elude it through unilateral action.
Questions to Consider :
1. How does the threat of cyber terrorism influence your country? Your economy?
Your society?
2. What is your country’s point of view regarding access to cyberspace?
3. Has your country taken any steps toward defining cyber terrorism?
4. If a treaty is approved, what measures and actions would your country have to take
to implement it successfully?
5. How does the Internet’s conceptual lack of borders impact possible international
solutions to cyber security and cyber terrorism?
6. How can legislation and regulations on cyber security protect the privacy of
information while still enabling massive worldwide communication and collaboration
through the Internet?
Research Aids :
UN Security Council, www.un.org/en/sc/
The website for the United Nations General Assembly provides information on the largest
organ of the United Nations and all its main committees.
Good to Know, www.google.com/goodtoknow/
Google’s initiative to educate users on data management and Internet security provides
information for data management on the Web that is basic to all security systems. Its Jargon
Buster section is a great tool for becoming familiar with IT terms.
Atlas, www.Atlas.arbor.net The website ATLAS tracks attacks and their targets every day. It also offers a map of global attack density. ATLAS maintains a real-time database of malicious botnet command and control servers that is continuously updated. This information comes from malware analysis, botnet infiltration and other sources of data.
ITU, www.itu.int
IMPACT, www.impact-alliance.org The ITU and ITU-IMPACT websites provide useful information about the programs and the spread of cyber-security among member states as well as the measures taken to keep cyberspace safe and secure.
Global Centre for ICT in Parliament, http://www.ictparliament.org/
The Global Centre for Information and Communication Technologies in Parliament was
created through the UN Department of Economic and Social Affairs (UNDESA) with the
Inter- Parliamentary Union (IPU). The center works with national governments to strengthen
their information societies and to establish a framework for the defence of these networks.
Although not exclusively a source for information concerning cyber security, the Global
Centre for ICTP offers insight into methods of international cooperation concerning the
borderless world of cyberspace
The International Cyber Protection Alliance, https://www.icspa.org/home/
The International Cyber Security Protection Alliance is an external organization established
to
coordinate an international system of defence against cyber threats. The organization
provides
information on methods of combating online terrorism and defending cyber security.
CRITICAL THINKING :
Currently there is little on cyber terrorism in international laws and treaties, including definition. Is an agreed-upon definition important to protecting the world from cyber
terrorism?
What does your country believe should be included in such a definition?
Terms and Concept : Cyberspace: A metaphor for a non-physical terrain created by computer systems that contain
objects and different modes of transportation and delivery.
Cyber Terrorism: Convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attack against computers, networks and the information stored therein to intimidate or coerce a government or its people to further political or social
objectives.
Cyber Terrorist Attack: The use of Internet-based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks
Distributed Denial of Service (DDoS): An attack during which servers and routers are
continuously asked for services until they can no longer process the requests. This is one of the most widely used and effective attacks.
Botnet (zombie computers): Collection of compromised computers a hacker remotely accesses and uses to carry out attacks. They are called “zombie” because they are remotely
operated without the owner’s knowledge or consent.
Hacktivist: A person who uses computer and technological resources as a means to promote political ends.
Malware/spyware: A program meant to infect an operating system. Viruses, Trojan horses, adware
and spywares can infect all the computers in a network and are often designed to self propagate.