Counter Terrorism Committee (CTC)

advertisement
UCMUN 2014 Counter Terrorism Committee
Introductory Letter
Welcome to the 2014 UCMUN Counter Terrorism Committee. My name is Christopher
Baker and I will be your director this conference. I am looking forward to meeting you all in person.
Terrorism is the national security issue that has dominated our lifetime and threatens to dominate
the next generation. Our two topics are cyber terrorism and drone strikes. As you will soon learn
cyberterrorism is an emerging threat, and one that has not been widely addressed by the
international community. Drone strikes are emerging as the go to tactic for counter terrorism but
their use is mired in controversy. These topics will challenge your critical thinking and test your
ability to communicate. I am excited to see how you will deal with these challenges.
I am a Junior Political Science major and this is my third year in UCMUN. I am also a
member of the Honors Program and Special Program in Law and I will be happy to answer any
questions you have about those programs. I have spent all three years in the Counter Terrorism
Committee first as an Assistant Director, then, as the Director. I am also the Assistant Director
General this year. Outside of UCMUN I am a member of the UCONN competitive Moot Court
team and the UCONN sailing team. I also coach high school fencing in New London and teach
sailing during the summers. After I graduate UCONN I am planning on pursuing my Masters in
Public Administration and a career in Municipal and State Government. I’m looking forward to
meeting you all this is going to be an exciting conference!
Christopher Baker
Director of Counter Terrorism Committee 2014
Christopher.Baker@uconn.edu
UCMUN 2014 Counter Terrorism Committee
Simulation
Simulation
Role of the Delegate
You the delegates are in control of exactly how much, and what, you get out of this
committee. You will debate using the rules of parliamentary procedure. The delegates will have to
act with courtesy and respect, as well as understanding, if the committee is going to be successful.
Delegates will have to find creative ways to reconcile conflicting opinions. It is also expected that
delegates will faithfully represent their country’s opinion. Equally expected is that delegates
representing their nation will be respected even when representing an unpopular position. By the
end of committee the delegates will be expected to write and pass resolutions helping to resolve the
issues facing the committee. In order to achieve this delegates will need to conduct independent
research and analysis. It is important for delegates to remember that this is an academic event. That
being said I expect all the delegates will have fun and make new friends.
Role of the Dais
The Dais is comprised of the Director and two assistant directors. At times the Dais may be
joined by the committee’s Topic Specialist and Administrative Assistant Director. The Topic
Specialist has prepare an in depth presentation on each of the topics and will be presenting during
debate. The Administrative Assistant Director is in charge of printing and checking the formatting
of Resolutions. The Dais will also be in charge of tending to the flow of debate and enforcing
parliamentary procedures. Any questions about parliamentary procedure should be directed to the
Dais.
UCMUN 2014 Counter Terrorism Committee
Committee History
Committee History
The Counter Terrorism Committee was created on September 28, 2001 by Security Council
Resolution 1373. The Committee was created in response to the September 11 attacks on the United
States. The committee as it exists in the actual United Nations is comprised of the fifteen members
of the United Nations. The CTC was established to,

Criminalize the financing of terrorism

Freeze without delay any funds related to persons involved in acts of terrorism

Deny all forms of financial support for terrorist groups

Suppress the provision of safe haven, sustenance or support for terrorists

Share information with other governments on any groups practicing or planning terrorist
acts

Cooperate with other governments in the investigation, detection, arrest, extradition and
prosecution of those involved in such acts; and

Criminalize active and passive assistance for terrorism in domestic law and bring violators to
justice. (United Nations)
In September, 2005 the Security Council established the Counter Terrorism Committee Executive
Directorate. The Executive Directorate is a team of 40 experts who help assist the committee in
making informed decision.
Works Cited
Nations, United. "UN Counter-Terrorism Committee." UN News Center. UN, n.d. Web.
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
Introduction
In the thirteen years since the terrorist attacks of 9/11 terrorism has become one of the most
salient issues on the world stage. In these thirteen years terrorist groups have evolved from primarily
regional organizations into sprawling international militias. Countering an international threat
requires international cooperation and that is the reason for the Counter Terrorism Committee. One
of the issues that the committee will be addressing at this conference is Cyberterrorism.
Cyberterrorism is a new evolution of terrorism. It is a matter of some debate whether or not a true
act of Cyberterrorism has been committed. Nonetheless, the events of 9/11 and subsequent attacks
have shown the international community that it cannot afford to sit back and wait for terrorism to
evolve. The Counter Terrorism Committee is charged with compiling a set of best practices for
nations in order to prevent terrorist attacks. With the world increasingly focusing on cyber security
there may not be a better time for this committee to compile its set of best practices for the member
states of the United Nations.
One of the most important steps in countering a new threat is to define it. One of the
biggest issues facing the committee will be how to define Cyberterrorism. In the academic texts
there are two schools of thought. One group of scholars asserts that Cyberterrorism is identical to
conventional terrorism carried out through cyberspace. There is a debate as to what conventional
terrorism is but it is generally accepted that it involves a catastrophic destruction of life or physical
property for a political or ideological goal by a non-governmental organization. According to this
definition there has never been a Cyberterrorism attack, and those who subscribe to this school
often believe that there never will be. The second school of thought is that Cyberterrorism can also
be an ideologically motivated attack through cyberspace on a target in cyberspace.
There is also a debate about the emergence of “hacktivism”. Hacktivists engage in cyberattacks in order to promote political or ideological goals. One of the most notable of these groups,
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
Anonymous, was responsible for an attack on several credit card companies and Pay Pal because
these companies refused to service Wikileaks. The committee will have to ask itself at what point
these hacktivists cross the line from criminals to terrorists. In order to compile a set of best practices
the committee will have reconcile this issue and synthesize an official definition for Cyberterrorism.
History and Description of the Issue:
Conventional Terrorism
Most people believe conventional terrorism to be a relatively recent phenomena. The reality
is terrorism has been employed as a tactic for well over one hundred years. In the first century A.D.
the Zealots were a group of Jewish insurgents who attempted to overthrow the Romans using
assassinations. The Hashashin in the Middle East during the 11th and 12th centuries. The Shiite group
used public assassinations to discourage their Sunni enemies from aggression. While it could be
argued that these attacks were very precise and lacked the indiscriminate violence of modern
terrorism, the opponents of the Russian Tsars in the 1870’s made no such discrimination. The
availability of gun powder and other explosive chemicals gave rise to a new terrorist weapon, the
bomb. The Russian group Narodnaya Volya (The People’s Will) detonated a bomb in the Winter
Palace killing or maiming 67 innocents. (Simkin) The bomb was detonated with the intent to kill
Tsar Alexander II, and only failed because he was late to
dinner. The bomb is the instrument that brought
indiscriminate violence to terrorism. Assassinations are
still a common terrorist tactic but it is the bombs that
we hear the most about.
The Irish Republican Army, commonly known as the
IRA, is another well-known terrorist organization that fought for Irish independence for much of
the twentieth century. The organization used bombs, assassinations, and armed attacks in an attempt
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
to drive out British forces and officials. The IRA, in various forms, has been active since the 1920’s.
Since the 1960’s alone the IRA was responsible for 1,800 deaths, 650 of those were non-combatants.
(Lavery) Though the IRA has ended its campaign of violence and is now seeking to promote Irish
interests through peaceful means, its use of bombs and guerrilla tactics almost certainly inspired
terrorist groups in the Middle East who would soon come to dominate the discussion of Terrorism.
The terrorist attack of September 11, 2001 stand out as one
of the biggest acts of terror in history. The attack changed the
security climate all around the world and resulted in two wars in the
Middle East. It was not the first time planes had been hijacked nor,
was it the first time they had been crashed into buildings but it was
the first time it had ever been so effective. 2,993 people lost their lives and 8,900 were injured. The
suicide attack began to gain notoriety. The idea of zealots willing to give up their lives to take
countless others with them captured the world’s attention and the definition of terrorism grew again.
The Jewish Zealots and Muslim Hashashin pioneered assassination as a weapon of terror,
the Narodnya Volya pioneered the indiscriminate use of the bomb, the IRA introduced the use of
insurgency, and the modern terrorist groups like Al Qaeda introduced the suicide bomber. The
definition and perception of what is and isn’t terrorism is constantly evolving. Many experts feel that
the next expansion of terrorism will be into cyberspace. There is some debate about whether this
will occur but it is a very real possibility and countries like the United States, China, and Russia are
already moving to head off the next threat.
Defining Cyberterrorism
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
The “narrow” definition of Cyberterrorism states that it is conventional terrorism with
cyberspace as the weapon. While this definition appears to be fairly straightforward the reality is
somewhat more complicated. While this background guide has discussed common tactics and
weapons used by terrorists it has not yet discussed the motives that define terrorism. There is a
difference between a madman who wants to impress an actress
assassinating a public official, and a group that coordinates an
assassination to advance its political or ideological goals.
Motive as a variable opens a large grey area. If there is no
physical harm from an attack but it is intended to make a political statement and inflict economic
damage is that terrorism? Do people need to die or be at risk of dying for a terrorist attack to have
occurred? These are the questions that scholars and policy makers have to grapple with when
defining Cyberterrorism. If an organization of politically motivated hackers consistently shuts down
newspapers’ websites, at great cost to the papers, which publish critiques of the organization is that
terrorism? Or is it just a crime? There can be no doubt that the hacking is a cybercrime but is it also
cyberterrorism? If political motive and economic damage are enough then it is. If there needs to be
physical destruction or harm then it probably is not. Mohammad Iqbal writing for the Journal of
Computer & Information Law has assembled several commonly used definitions.
“1) Cyberterrorism is hacking with body count
2) Cyberterrorism is generally understood to mean unlawful attacks and threats of attack
against computers, networks, and the information stored therein when done to intimidate or
coerce a government or its people in furtherance of political or social objectives
3) Cyberterrorism is any attack against an information function, regardless of the means
4) Cyber-terrorism is defined as attacking sabotage-prone targets by computer that poses
potentially disastrous consequences for our incredibly computer-dependent society
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
5) Use of information technology as means by terrorist groups and agents is cyberterrorism
6) Cyberterrorism can be defined as the use of information technology by terrorist groups
and individual to further their agenda
7) Cyberterrorism is premeditated, politically motivated attack against information, computer
systems, computer programs, and data which results in violence against noncombatant
targets by subnational groups or clandestine agents
8) A bill passed by the New York Senate defines the crime of cyberterrorism as any
computer crime or denial of service attack with an intent to ... influence the policy of a unit
of government by intimidation or coercion, or affect the conduct of a unit of government”
(Iqbal pg. 406)
The bill and definition passed by the New York State Senate is considered by many to problematic.
Under the statute any nuisance hack, such as website defacement, could be considered an act of
terrorism. It is certainly true that website defacement is a cybercrime but it is questionable whether
or not it is a terrorist action. Balancing the distinction between cybercrime and cyberterrorism will
be very important when the committee debates the definition of cyberterrorism.
Hacktivism or Terrorism?
Most politically motivated actions are not acts of terror. The developed world and the
United Nations recognize citizen’s rights to political speech. Speech is a very broad an encompassing
term. It is well known that speech includes the spoken and written word, but it also includes physical
actions designed to convey a message. This speech is considered just as legitimate as written and
spoken speech and is subject to many of the same protections. There are certain exceptions where
the government may mitigate the disruption by issuing permits for events like marches and parades
but in most cases they cannot withhold a permit.
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
One of the most common examples of “physical speech” are sit-ins. “Sit-ins” are a form of
nonviolent protest where protesters occupy an area to draw attention to their cause. During the civil
rights campaigns of the 1960’s it was common place for groups of African Americans to stage sit-ins
at segregatory restaurants. Sit-ins do cause a disturbance to the location they are occupying but as
long as no laws are being broken they are considered protected speech. In 1942 a sit in was held at a
“whites only” diner in Chicago. When the groups
attempted to order they were turned down and the
police were called. Since there was no law in Illinois
allowing the segregation of restaurants no arrests were
made. In 1939, in protest of a New York City restaurant chain’s discriminatory hiring practices, a
group of union workers sat in at a restaurant ordering five cent coffees. Anyone who came to the
restaurant who was unaffiliated with the sit-in was unable to find a seat.
Sit-ins are considered by some to be analogous to Denial of Service attacks. DoS attacks aim
to overwhelm the target website’s servers through exceptionally high traffic. A successful DoS attack
can significantly slow or even crash the target website. A traditional DoS attack involves a large
group of computers repeatedly requesting information from a website by refreshing the page or
clicking on links. In the more common DDoS (Distributed Denial of Service) attack, “the initiating
party activates a network of computers under its control, called a botnet, to multiply the power of
the attack, thereby directing an exponentially increased volume of information requests to the target
server.” (Hampson) These botnets can be formed through the spreading of malicious software and
viruses or they can be created by willing volunteers.
One of the most recent examples of a DDoS attack was “Operation Payback” conducted by
members of Anonymous. In 2010, WikiLeaks published thousands of leaked documents. In
response a hacker known as “The Jester” launched a DoS attack that crashed the WikiLeaks website.
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
The Jester did this as retaliation for WikiLeaks “attempting to endanger the lives of our troops,
‘other assets’ & foreign relations.” (Hampson) In order to protect itself WikiLeaks began renting
bandwidth from Amazon. Amazon eventually reneged on the deal after receiving pressure from
Senator Joseph Lieberman. (Hampson) WikiLeaks’ problems were not over as major companies
critical for online payment like PayPal, MasterCard, Visa, and Bank of America all refused to process
online payments to the website. In retaliation Anonymous launched an enormous nine day long
DDoS attack against the companies who were denying donations to WikiLeaks. Their stated goal
was to raise awareness and punish what they perceived to be censorship. (Hampson) The attacks
successfully crashed the Mastercard and Visa websites. PayPal’s website was significantly slowed and
PayPal estimates the damage of the attack to be 3.5 million dollars. Visa and MasterCard did not
disclose their financial damages though during the prosecution of several of the hackers it was
revealed that they believed it to be millions of pounds. (Martin and Duell)
Operation Payback is held up as an example of a new phenomenon called hacktivism.
Because of the laws protecting websites and computers hacktivism is rarely legal. The question
becomes at what point does “hacktivism” cease being a crime and start becoming cyberterrorism?
Anonymous advocates nonviolence but is politically motivated economic intimidation enough to
qualify as cyberterrorism? Or is it just a crime?
Current Status
The strictest definition of cyber terrorism is an act of conventional terrorism carried out
over the internet. Estonia, in 2007, is perhaps the closest our world has come to experiencing such
an attack. The cyber-attack on Estonia had its roots in the tensions between the Russian speaking
minority and the ethnic Estonians. When Estonia was liberated from Nazi occupation by the Soviet
Union a monument called the Bronze Soldier was erected in the main square of Tallinn. In April
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
2007. the Estonian government decided to move the statue to the capital’s military cemetery. The
decision was viewed by the Russian speaking community as a slight against their heritage and
sparked rioting and looting. During the turmoil, distributed denial of service attacks based in Russia
successfully targeted and shut down the website of every government ministry, two large banks, and
several websites of Estonian political parties. (Herzog) Initially Estonia attributed the attacks to the
Kremlin, but analysis of the attacks by NATO (of which Estonia is a member) and the European
Commission did not find evidence that attributed the attacks to the Russian Government. (Herzog)
The Russian speaking community in Estonia used internet forums to drum up nationalist
support inside of Russia and recruit hackers for the DDoS attack. The attack eventually included
computers from a variety of locations including the United States, Egypt, and Russia. (Herzog) The
attack was highly successful and, in addition to shutting down the Estonian Government’s online
presence, blocked ATM and credit card transactions within the country for several days. One of
banks targeted in the attack reported damages of one million USD. (Herzog)
The attack on Estonia served as a wakeup call to the international community and since then
the major powers of the world have redoubled their efforts to secure themselves against cyber
terrorism. In the next two years both NATO and the European Union established protocols for
dealing with cyber-attacks as well as computer emergency response teams (CERT) to help member
states. (Herzog) Individual nations like the United States, Russia, China, and Israel are among the
high profile nations to announce national cyber security initiatives since the attacks on Estonia.
Bloc Positions
NATO and the European Union
NATO and the European Union have each established strong protections for their member
states. These infrastructures are not available to non-member states but could provide a blue print
for a United Nations program. These states would likely support efforts making it easier to trace and
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
arrest hackers from outside their reach. In the attacks on Estonia there were a few arrests made
domestically but many of the foreign nationals were beyond the reach of reprisals. (Herzog)
States with Strong National Cyber Security
States who have already established strong national programs to protect against cyber-attacks
are less likely to support contributing to a larger international level of protections. These nations
include countries like the United States (also a NATO member), Russia, China, Israel, and others.
These nations also enjoy a distinct military advantage in the field of cyber warfare which could,
hypothetically, be hampered by protections established by the United Nations.
States Vulnerable to Cyber Attacks
All nations are increasingly relying on the internet and networks to develop their
infrastructure. This is especially true for smaller nations as well as developing nations. When Estonia
was attacked 97% of its banking transactions were handled online. (Herzog) This is not unusual
especially in smaller nations, where it is easier to network the much smaller infrastructures. These
nations have a vested interest in creating stronger rules governing cyber terrorism as well as a
framework for international aid in the response.
Committee Mission
Cyber terrorism is widely considered by cyber security and foreign relations experts to be
one the next great terror threats that will face the international community. The Counter Terrorism
Committee is in a unique position to get out ahead of the threat. The committee will meet and work
to define cyber terrorism and consider potential safeguards for member nations. In working to
define cyber terrorism the committee will need to weigh the consequences of accepting a loose
definition of cyber terrorism against those of a strict definition. If the definition is too loose it risks
restricting freedom of speech and the freedom of the internet. If the definition is too strict it may
hurt countries abilities to respond. The committee will also have to weigh the needs of smaller more
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
vulnerable nations with those of large nations who have already established protections. Cyber
terrorism is a new and emerging issue and it will be up to the committee to decide how and if the
international community will protect itself.
Questions to Consider
1. Does your country have cyber warfare capabilities that could be hindered by UN
involvement?
2. Does your country have any experience with cyber-attacks or cyber-activism?
3. How dependent on internet networks is your nation’s infrastructure?
4. Is your country part of NATO or the European Union?
5. How should the UN define cyber terrorism?
UCMUN 2014 Counter Terrorism Committee
Topic A: Cyber Terrorism
Works Cited
Herzog, Stephen. "Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational
Responses." Journal of Strategic Security 4, no. 2 (2011): 49-60.
Lavery, Brian. "I.R.A. Apologizes for Civilian Deaths in Its 30-Year Campaign." The New York
Times. The New York Times, 16 July 2002. Web.
Martin, Arthur, and Mark Duell. "Hacker Whose Cyber Attacks Paralysed PayPal." Mail Online.
Associated Newspapers, 25 Jan. 2013. Web.
Mintz, S., & McNeil, S. (2014). Terrorism in Historical Perspective. Digital History. Web.
Mohammad Iqbal, Defining Cyberterrorism, 22 J. Marshall J. Computer & Info. L. 397 (2004)
Noah C.N. Hampson, Hacktivism: A New Breed of Protest in a Networked World, 35 B.C. Int'l
& Comp. L. Rev. 511 (2012)
Simkin, John. "The People's Will (Narodnaya Volya)." Spartacus Educational, Sept. 1997. Web.
UCMUN 2014 Counter Terrorism Committee
Topic B: The Use of Unmanned Aerial Vehicles as a Counter Terrorism Method
Introduction
Even before terrorism forced itself into global security conversation countries were
developing new means of combatting it. Countries have executed commando raids, air strikes,
invasions, and police actions all in the name of countering terrorists or partisans. The latest trend in
counterterrorism is the use of Unmanned Aerial Vehicles for surveillance and air strikes. Unmanned
Aerial Vehicles, also known as UAV’s or drones, have existed since World War II, however, it is
only with recent technological advances in aerospace engineering and computer programming that
they have become precise enough for use in countering terrorism.
Part of the Counter Terrorism Committee’s mission is recommending “best practices” in the
field of counter terrorism. No other counter terrorism method is as controversial as drone strikes.
The United States and Israel have both set precedents of bombing and spying on terrorist
operations in countries that they are not at war with. In many cases these countries are not consulted
prior to the attack and have not consented to strikes and surveillance occurring within their country.
The General Assembly passed resolution A/RES/68/178 in December 2013 urging nations, in
particular the United States, to follow all existing international laws and respect state sovereignty
when countering terrorism. Despite this drone strikes from the United States in Pakistan have not
ceased. The United States and Israel are not the only nations with drones, as of November 2013 87
nations had drone technology and the number is only growing. (Taylor) So far only the United
Kingdom, United States, and Israel have fired missiles from drones but the rest of the world is not
lagging behind. With the escalation of drone technology the committee will have to look at the ways
in which drones are used and recommend a set of best practices or guidelines.
History and Description of Issue
UCMUN 2014 Counter Terrorism Committee
Topic B: The Use of Unmanned Aerial Vehicles as a Counter Terrorism Method
UAV’s have their roots in the German flying bombs used in World War II. Closer to cruise
missiles than modern drones, the V-1 and V-2 flying bombs flew to their targets, guided by radio,
and crashed into them in order to detonate their payload.
The German research and technology that went into these
“flying bombs” proved invaluable to the United States
and Soviet Union during the space race. The first modern
drones were deployed by the United States in Vietnam as
Figure 1: V-1 Flying Bomb
surveillance and intelligence gathering devices. (Hastings)
Vietnam was the beginning of the realization that drones could replace fighter pilots on difficult and
dangerous missions. (Hastings) The loss of a drone is much more preferable than the loss of a more
expensive plane and a pilot in whom the military has invested significant resources and training.
During Vietnam the U.S. military would also develop attack drones but they would not see
action. The first use of drones to carry out an air strike came from Israel which quickly developed a
drone program to help monitor the Gaza Strip and West Bank. These drones were also used to carry
out assassinations. (Hastings) Israel’s development jumped out ahead of the United States’ program
and ended up selling several drones to the United States. These drones would be used to carry out
over 300 missions in the First Gulf War. After 9/11 new emphasis was placed on developing drone
technology as a precise counter terrorism weapon. In 2002, the leader of Al-Qaeda in Yemen was
assassinated by a Predator drone strike. Since then the use of drones for assassinations of terrorist
leaders has become common place.
The United States has two fleets of drones. One is controlled by the United States Air Force.
This fleet operates exclusively in Afghanistan and (while the U.S. was still engaged) Iraq. The strikes
and surveillance by the USAF are not a great source of controversy. The USAF has a team of
independent lawyers that sign off on every strike based off of a series of guidelines that are publicly
UCMUN 2014 Counter Terrorism Committee
Topic B: The Use of Unmanned Aerial Vehicles as a Counter Terrorism Method
published. The real controversy about the U.S. drone program comes from the Central Intelligence
Agency’s strikes in Pakistan, Yemen, and Somalia. The key differences are the lack of transparency
in these strikes. There are CIA lawyers who sign off on the strikes but their independence is
questionable. (Hastings) Also concerning their policy on collateral damage from the strikes is
classified.
From 2004 to 2014 there have been 390 drone strikes in
Pakistani territory and 339 of those strikes have occurred since
2008. (Ross and Serle) These strikes have killed somewhere
between 2,347 and 3,792 people of whom 416-957 were
Figure 2: Predator Drone firing a missile
civilians. (Ross and Serle) The difficulty in compiling these
numbers comes from the C.I.A.’s reluctance to reveal
information about the strikes or even confirm that one has happened. This means that the reporting
is left to NGO’s and the Pakistani government which sometimes results in conflicting information.
These strikes in Pakistani territory are almost universally condemned by the Pakistani government
and rarely involve any cooperation between the two governments. (Hastings) Pakistani Prime
Minister Awaz Sharif has repeatedly called for an end to the strikes, “The chapter of daily drone
attacks should stop. We respect the sovereignty of other countries, but others should also respect
our sovereignty.” (Walsh and Masood)
The drone strikes are occurring primarily in North Waziristan, a “loosely governed”
province and a Taliban stronghold. (Amnesty International) The argument from the U.S. is that it is
protecting itself from forces that wish to do it harm and are not truly under the control of the
Pakistani government. This has not however reduced concerns that the U.S. is conducting
extrajudicial executions and potentially committing war crimes with the strikes. (Amnesty
International) Pakistanis argue that the drone only serve to stoke anti-western sentiment and bolster
UCMUN 2014 Counter Terrorism Committee
Topic B: The Use of Unmanned Aerial Vehicles as a Counter Terrorism Method
the Taliban’s cause. There is concern in the international community that a precedent for drone
strikes is being set by the United States. Many security experts are worried that the precedent of
striking within uncooperative nation’s borders could become a frequent tactic of superpowers like
Russia and China, both of whom are rapidly developing their drone programs. Strikes, like the ones
occurring in Pakistan, becoming mainstream counter terrorism tactics could result in a significant
degradation in the strength of sovereignty for the targeted nations and international law.
The drone strikes in Pakistan are not the only precedent that the U.S. has set. In Yemen
between 2002 and 2014, the United States has conducted between 162 and 193 drone strikes with
the full cooperation of the Yemen government and
in coordination with Yemen ground troops.
Yemeni president Abd-Rabbu Mansour Hadi says
he allows and cooperates with the U.S. drone
strikes because his country lacks the technology to
carry out "these precise military missions." (Ghobari) With the Yemeni government committed to
ousting Al-Qaeda cooperation with the United States offers a cheap and easy way to bolster their
counter terrorism capabilities. The success of U.S. drone strikes in Yemen demonstrate that
cooperation can be a viable option in the fight against terrorism.
The U.S. is not the only nation heavily employing drones in a combat role. The United
Kingdom and Israel have also launched drone strikes. In particular, Israel has made extensive use of
drones for strikes and surveillance in Gaza and the West Bank. In November 2012 Israel launched
Operation Pillar of Defense and struck 1,500 targets in Gaza. The UN report on the incident found
that there were 165 Palestinians killed despite Israel having no boots on the ground. (Dobbing and
Cole) This is made possible by intensive surveillance and surgical strikes from drones. Despite the
UCMUN 2014 Counter Terrorism Committee
Topic B: The Use of Unmanned Aerial Vehicles as a Counter Terrorism Method
advantage in precision drones have over conventional airstrikes it is a recurring trend that civilians
are getting caught in the strikes and Israel is no different. (Dobbing and Cole)
It is important to understand that as drones are becoming more and more commonplace
nations are struggling to find the best ways to use them and to conceptualize the differences
between drones and conventional airstrikes. How much of a difference does seeing the target from
thousands of miles away make to a drone operator making a decision? How do you reconcile
neutralizing dangerous targets with risk to the civilian population? All of these questions are still
being decided and the committee will have to keep them in mind when devising a recommendation
of best practices.
Current Status
In December 2013 the United Nations General Assembly passed resolution
A/RES/68/178. The resolution deals with the legal and human rights concerns that have arisen
from the use of drones. The resolution does not regulate or directly oppose the use of drones
instead it urges nations “to ensure that any measures taken or means employed to counter terrorism,
including the use of remotely piloted aircraft, comply with their obligations under international law,
including the Charter of the United Nations, human rights law and international humanitarian law,
in particular the principles of distinction and proportionality.” (Haider) Distinction and
proportionality are important words to highlight. They refer directly to the scale of the drone attacks
and the distinction between civilians and terrorists.
UCMUN 2014 Counter Terrorism Committee
Topic B: The Use of Unmanned Aerial Vehicles as a Counter Terrorism Method
The rebuke from the General
Assembly has curbed the scale of
drone strikes in Pakistan but it has
not ended them. As of September,
2014 35 people have been killed in
U.S. drone strikes in Pakistan. An
attack in June broke a period without
drone strikes dating back December
25, 2013. This lull comes after the
General Assembly Resolution but it also corresponded to peace talks between the Pakistani
government and the Taliban which broke down shortly before the strikes began again. (Serle) In
Yemen, however, the attacks continue unabated and on a larger scale. While the attacks are
coordinated with the Yemeni government there is still the question of “distinction and
proportionality” as casualty rates per strike in Yemen have jumped to 8.3 compared to 4.7 in
Pakistan. (Serle)
Committee Mission
The Counter Terrorism Committee is charged with developing sets of “best practices” for
counter terrorism methods. Drone Strikes have emerged over the last ten years as the go to counter
terrorism tool for several nations and are being developed by others. Their use has been
controversial in Pakistan where the government opposes it. The United Nations has shown the
potential to influence the deployment of drones with resolution A/RES/68/178 and the Counter
Terrorism Committee can now expand on that work. The committee will meet and attempt to
devise a list of recommendations for the use of drones and find a resolution to the controversy in
Palestine.
UCMUN 2014 Counter Terrorism Committee
Topic B: The Use of Unmanned Aerial Vehicles as a Counter Terrorism Method
Bloc Positions
The Drone Powers and their Allies
The United States, Israel, and the United Kingdom have all adapted drone technology into
their national defense strategies at great expense. International restrictions on drones may be seen as
meddling or weakening the internal security of these nations. The United States and Israel in
particular benefit from securing their ability to strike targets in countries that are uncooperative.
France also joined the United States and United Kingdom in a Human Rights Council vote
(A/HRC/25/L.32) against a probe into the legality of drone strikes. (Goodman) The Republic of
Korea as well as Japan also joined this coalition. Some countries who abstained are traditionally close
allies of the U.S., U.K., and Israel. These countries include Italy, Germany, and Estonia. Delegates
representing these countries and other countries abstaining on the vote will have to decide whether
or not to support their traditional allies.
Pakistan, Yemen, and Allies
Pakistan, not unexpectedly, has led the charge against drone strikes. It sponsored
A/HRC/25/L.32 and has made repeated floor speeches calling for the end of U.S. drone strikes
within its borders. Yemen, which has been cooperating with the United States cosponsored the
resolution. While the government is cooperating with the U.S. on drone strikes it does not believe
that the U.S. should be able to strike to without permission and is preparing for a day when
cooperation with the United States will no longer be necessary to combat Al-Qaeda. (Ghobari)
Pakistan and Yemen were also joined in voting for A/HRC/25/L.32 by the Russian Federation,
China, Mexico, Brazil, South Africa, and other states who may have different reasons for opposing
the three drone powers ability to strike freely. These motivations may be the fear that drones will be
expanded to the United States’ war on drugs, principles of sovereignty, strong ties with Pakistan, or
some other reason. It will be up to the delegates to discover their country’s positions.
UCMUN 2014 Counter Terrorism Committee
Topic B: The Use of Unmanned Aerial Vehicles as a Counter Terrorism Method
Questions to Consider
1. Does your country possess drone technology?
2. Is it capable of offensive actions?
3. Does your country have a reason to fear strikes within its borders?
4. Is your country buying drones from another country or producing them independently?
5. Has your country’s sovereignty ever been threatened?
UCMUN 2014 Counter Terrorism Committee
Topic B: The Use of Unmanned Aerial Vehicles as a Counter Terrorism Method
Works Cited
Dobbing, Mary, and Chris Cole. "Israel and the Drone Wars." (n.d.): n. pag. Drone Wars UK,
Jan. 2014. Web.
Ghobari, Mohammed. "Yemen Asks U.S. for Drones to Fight Al Qaeda." Reuters. Thomson
Reuters, 22 Aug. 2013. Web.
Goodman, Ryan. "United Nations Human Rights Council Adopts Resolution Calling for Drone
Transparency and Accountability." Just Security RSS. NYU School of Law, 28 Mar. 2014.
Web.
Hastings, Michael. "The Rise of the Killer Drones: How America Goes to War in Secret." Rolling
Stone. Jan Wenner, 16 Apr. 2012. Web. 18 Sept. 2014.
International, Amnesty. "Will I Be Next? US Drone Strikes in Pakistan." (n.d.): n. pag. Amnesty
International, 2013. Web.
Serle, Jack, and Alice K. Ross. "Six-month Update: US Covert Actions in Pakistan, Yemen and
Somalia." The Bureau of Investigative Journalism, 1 July 2014. Web.
Serle, Jack. "CIA Drones Kill at Least 13 in Pakistan: The Bloodiest Strike for More than a
Year." The Bureau of Investigative Journalism. N.p., 16 June 2014. Web.
Taylor, Guy. "U.S. Intelligence Warily Watches for Threats to U.S. Now That 87 Nations
Possess Drones." Washington Times. The Washington Times, 10 Nov. 2013. Web.
Walsh, Declan, and Salman Masood. "Pakistan’s New Premier Calls for Drone Strike Halt." The
New York Times. The New York Times, 05 June 2013. Web.
Download