UN Security Council Topic: B Cyberterrorism Chad Approximately 3

advertisement
UN Security Council
Topic: B
Cyberterrorism
UNSC Topic B
Chad
Approximately 3 billion people now have online access, and that number is only growing following the
UNHRC’s unanimous declaration of Internet access as a human right in their Report of the Special
Rapporteur on the Promotion and Protection of the Right to Freedom of Opinion and Expression (General
Assembly1). Of those 3 billion users, approximately 46% have been victims of cybercrime over the past
12 months. To carry out approximately 1.5 billion cyberattacks each year, criminals have used over 6.5
million unique domains. Unfortunately, only a few were detected with seed software. Cyberterrorism, or
“the intentional use of computer, networks, and public internet to cause destruction and harm for personal
objectives” (Global Mobile Internet Penetration2), has become a real threat, as “almost all governments of
the UN Member States have been attacked between 2011 and 2012 at various levels, from defacement to
DDoS, from phishing to data theft” (Global Mobile Internet Penetration2). As the threat of cyberattack
grows for both the UN and the world’s population, concerns have escalated in the Security Council and
preventive measures are being taken. In these past three years alone, INTERPOL has delivered a
Cybercrime Complex, the EU has built a cybercrime center within the EUROPOL structure, the African
and Arab Conventions on Cybersecurity and Combating Information Technology Offences were held, the
Shanghai Cooperation Organization and Commonwealth Cybercrime Initiative were formed, and FIRST,
OIC CERT, GCC CERT, APC CERT, and other incident response organizations were enacted.
In African countries, the twenty-first century has introduced the Internet in small numbers among citizens.
Only a quarter of a million people, or about 2% of Chad have available access to the internet at this
moment (Telecommunications in Chad4), however Cyberterrorism still poses a threat. Currently, Chad
has no censorship or monitoring of Internet usage, and therefore unfortunately lack the institutions and
mechanisms to prevent the terrorism from occurring. Cyberthreats have escalated in Sub-Saharan
countries over the past few years, targeting government trade and defense establishments coming under
attack. “These attacks need proactive measures by African governments and collective effort in policies.
As we all know, Internet has no geographical boundaries” (Post Navigation5). The key challenges African
UNSC Topic B
countries currently face is the lack of awareness from users and the appropriate national organizational
structures to deal with cyber incidents. Chad has yet to speak on the subject matter due to the low
percentage of its population currently facing the dangers of Cyberwarfare, and currently has no
restrictions on internet use. However, seeing the threats to other African countries that have seen
Cyberviolence troubles the Chad government. Siyabonga Cwele, the minister of state security in South
Africa, comments, “But the main cybersecurity threats in South Africa are not related to national security
at all: they are criminal and, more specifically, related to fraud. Phishing is the most common form of
attack, with the distribution of malware, such as worms, being the second-biggest problem” (Minister
Speech3). Chad fully endorses any UN funded efforts to prevent Cyberterrorism, including government
monitoring of Internet usage and the funding of cybercrime detection agencies and complexes, but
currently has no plan nor probable cause to wage Cyber war on plausible attackers as Internet usage is so
low.
1. As Global Mobile Internet Penetration , Increases The Cybercrime And , and Cyberterrorism Vector I. Global Cybercrime Has an
Estimated Cost of US$ 110 Billion per Year (n.d.): n. pag. Web. http://www.un.org/en/sc/ctc/docs/2013/2013-05-24_ITU-Session%20I.pdf
2. "General Assembly." Southeast European and Black Sea Studies 7.2 (2007): 331-33. Web.
http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_en.pdf
3. "Minister Cwele Speech at the 4th Ordinary Session of the Conference of the Plenipotentiaries in Harare, 10 July 2014." Minister
Cwele Speech at the 4th Ordinary Session of the Conference of the Plenipotentiaries in Harare, 10 July 2014. N.p., n.d. Web. 15 Oct. 2014.
4. "Post Navigation." Contador Harrison. N.p., n.d. Web. 15 Oct. 2014. http://www.contadorharrison.com/african-countries-must-dealwith-cyberterrorism/
5. "Telecommunications in Chad." Wikipedia. Wikimedia Foundation, 10 Dec. 2014. Web. 15 Oct. 2014.
http://en.wikipedia.org/wiki/Telecommunications_in_Chad
UNSC Topic B
Jordan
We the Hashemite Kingdom of Jordan have growing concerns in terms of how the internet is
monitored to halt terrorist activities. Our nation understands that in a post 9-11 world that the
need for international security is much higher. We have also been experiencing attacks as well
due to our position among our fellow Middle Eastern nations. It is true our nation houses many
people of not only Palestinian descent but also Syrian, and because of such sensitive people
under our protection we must be able to offer safe refuge to those crossing our borders while also
monitoring those who enter in order to better protect our base population. Jordan has also
experienced a number of suicide bombings (most notably one in 2005 in our capital) and attacks
on our people based on our compliance with the United States. These attacks based on such
banal reasons are halting the growth of our blossoming nation.
We praise the Saudi Arabia Intelligence Services and their conference in Riyadh for their
deliberations over the new reaches the internet can provide to malicious people. As Arab nations
we must not stand for any act of violence done by our people. The internet can now be used to
access millions of people, steal data, and propose detrimental attacks. As Prince Sultan Bin
Abdel Aziz expressed at this conference, “[there is a need for] immediate action to cull the
rampant growth” (Zeid Nasser). Much of our censorship used to protect our people is being
curbed by the internet and the quickness at which people can reproduce hostile information
(Responses to Cyber Terrorism, 40).
The major concern we now face is how new measures decided upon the security of the
internet will encompass us and our people and not only the larger nations of Europe and the
United States. Iraqi groups have blatantly singled us out and made clear their disdain for our
politics. We now fear for our own people that, with our growing access to the internet, they may
not be safe. Jordan requires that we open access to the inter webs and allow for all nations to
UNSC Topic B
access terrorist based information in order to help our people in a swifter, faster manner – we
have all experienced breaches, hackings, leaks, and planned out acts of terror. Let us not wait for
another one - if we act here today and open the search histories to all nations we can act quickly
and more efficiently on all fronts in order to stop this bastion of fear and death before it sprouts
into a greater threat.
Center of Excellence Defence Against Terror. Responses to Cyber Terrorism. N.p.: IOS Press,
2008. Print. Nato Science for Peace and Security 34.
"Jordan Profile." BBC News. BBC, n.d. Web. 7 Oct. 2014. <http://www.bbc.com/news/worldmiddle-east-14631981>.
Nasser, Zeid. "Cyber-terror Makes a Comeback in the News." Zeid Nasser's Tech & Media Blog.
Blogspot, 11 Dec. 2007. Web. 7 Oct. 2014.
<http://zeidnasser.blogspot.com/2007/12/cyber-terror-makes-comeback-in-news.html>.
UNSC Topic B
Luxembourg
The misuse of cyberspace for terrorist purposes is not subject to specific control but is
part of the general measures against terrorism in Luxembourg. Under a scheme of deployment of
existing human and material resources to match the scale of the problem as observed in
Luxembourg, a unit of the Grand-Ducal Criminal Investigation Department (Police Judiciaries),
the "new technologies section", was specially assigned the task of cybercrime prevention. This
unit’s only purpose is to fight cyber terrorism, and it is given the right to access any information
that is needed without mentioning any investigations are going. Cyber terrorism is punished by
law in Luxembourg under the law of 12 August 2003; these provisions define an act of terrorism
as an offence which, owing to its nature or context, can be seriously damaging to a country or an
international organization or body. Also other data processing area are criminalized under the
Article 509 of the Luxembourg Penal code. The punishments start from a minimum of 3 years to
a death sentence. Luxembourg even had a cyber-security. Even though Luxembourg has all this
regulations there has not been any cyber-terrorism crime detected in the country itself.
As of now, there are not any solutions proposed or any other extended actions that need
to be taken on the national level. As of the international level, we can have a World cyberterrorism police commissioner under the supervision of the major participating countries in the
UN, with a pledged oath that the committee will never use its power to spy or ruin the privacy of
the people, and if doubted by the UN representatives the committee will be overthrown after a
vote and all the workers would be tried internationally with the crime of terrorism and treason.
The purpose for the committee would be to protect the world from cyber-terrorism and protects
people’s privacy and world stability.
UNSC Topic B
Work Cited

Corren, Michael. "Experts: Cyber-crime bigger threat than cyber-terro." Cnn.com. Cable
news network, 24 Jan. 2005. Web. 8 Oct. 2014.
<http://www.cnn.com/2005/TECH/internet/01/18/cyber.security/>.

Council of Europe. Cyberterrorism - the Use of the Internet for Terrorist Purposes. N.p.:
Council of Europe, 2008. Print.
UNSC Topic B
United Kingdom
The introduction of the World Wide Web has been one of the most important and beneficial inventions
in human history. It has broken down trade barriers, allowed growth, and has connected people in a
way not even imaginable a few mere decades ago. The internet has been used as a way to project what
was an indistinct voice in the world to the spotlight of international attention. The outreach is all
encompassing with all nations depending on the web and other cyber technology for commerce and
national intelligence. However, this digital world is under constant attacks from hackers and radical
groups who seek to interrupt the global process without leaving the comfort of their chairs’. Like all
threats to security, economy and liberty, it is the job of the United Nations to respond to and prevent
such attacks from occurring.
The United Kingdom is heavily dependent on the use of digital materials to conduct its daily affairs.
Therefore, it is no surprise that attacks and terror to this infrastructure is treated with absolute
seriousness. In 2010, National Security Strategy viewed cyber-attacks as a Tier 1 concern and set aside
over £650 million to help create a defense. The United Kingdom is proud of its commitment to cyber
security and recommends that the United Nations take the same strength of commitment. Funds should
be set aside and cooperation between more protected countries and nations new to the Web should
exist to ensure a strong and uniform response plan for the threat of cyber-attacks. By agreeing by
standards and regulations about the use of cyberspace, similar to the ones agreed upon at the London
Conference on Cyberspace, the international community can define, identify and respond to cyberattacks in a clear and systematic way. With the joint community of nations agreeing upon similar
standards, the funds can be allocated to less prosperous nations for use in education and equipment for
use in encryption. The goal is ultimately for the United Nations to work in concurrence with one
another to deny a safe haven for criminals in cyber space.
Cyber- attacks are unfortunately a guarantee in the Information Age even with the necessary knowledge
and equipment. That’s why it is critical to establish communications between nations about any possible
threats to the cyber security of the world as a whole. Naturally, the UK hopes that countries will view
this strategy less as an infringement to national sovereignty and more as an open forum on cyber
security. By use of this open forum, nations can request internationally accredited cyber specialist, a
group of skilled computer engineers that can help establish a stronger and more secure digital system
for nations that might be overwhelmed by the process. This international cooperation can extend to
convicted cyber criminals facing an international court for crimes that spanned nations and aspects of
life, providing a support network for all participating members Additionally, the United Kingdom
recommends a program adopted in the nation where individual users and businesses alike can report
threats to an easily accessible department dealing with cyber security. By this strategy, users still have
all the liberties and rights to cyberspace that they experience now, but with the security of knowing
that they can report any problem they face to the government with convenience. It is the hope of the
United Kingdom that the Web can be used as a source of commerce, intelligence and pleasure by all the
members of the world with every nation more at ease about the threat of cyberterrorism .
UNSC Topic B
Australia
As a result of the Arab Spring in 2010, the Middle East has become a land characterized by
rebellions and revolutions. Notable among these is the uprising in Syria, a bloody conflict which
has pit Alawite leader Bashar al-Assad against a Sunni majority, the people of Syria. As of April
2014, 190,000 Syrians have died from the conflict and 6.5 million have been displaced. In order
to restore peace in Syria, it is not only the United Nations Security Council’s privilege but its duty
to “...investigate any dispute, or any situation which might lead to international friction or give
rise to a dispute, in order to determine whether the continuance of the dispute or situation is
likely to endanger the maintenance of international peace and security” (Article 34). Whether
this means providing humanitarian aid to the refugees or engaging in military action against
Syria, UNSC is prepared to do what it must to prevent the conflict from worsening.
Australia believes that action against Assad is necessary to protect the Syrians.
Concerning Australia’s opinions about Assad, Foreign Minister Kevin Rudd proclaimed, “We
cannot stand by and watch this violence continue to unfold… I underlined that the Assad regime
had lost its legitimacy when it started deploying arms against its own people and that it was time
for Assad to leave.” In addition to speaking out against Assad, Australia decisively acted on the
behalf of the Syrian people. In March 2011, Australia imposed sanctions on key figures of the
Assad regime and refused to sell weapons to them . Three months later, Australia was also one
of the first countries to request Assad’s trial at the International Criminal Court. Australia’s
actions are a testimony to their opinions: they believe in supporting the people in Syria and are
willing to intervene with actions and words. Like most other developed countries, Australia
stands for the people because of both their personal convictions and the main tenets advocated
by the UN. As stated in the Universal Declaration of Human Rights, “Everyone has the right to
life, liberty, and security of person” (Article 3); according to Australia, the Syrian people deserve
the same.
It is UNSC’s job to preserve security around the world. In regards to the conflict in Syria,
it is their job to prevent a hostile government from using violence against their people. Although
Australia hasn’t formally sent troops to support the resistance, we intend to utilize both
diplomacy and economic sanctions to help oust Assad’s regime. Australia has already done
much to help extinguish the conflict in Syria, and we still intend to do more for the welfare of the
Syrian people in the future. As of now, Australia hopes for an end of conflict in Syria, and a
restoration of peace and prosperity in a place ridden with sorrow and destruction.
UNSC Topic B
France
In France, being one of the five permanent members of the UN Security Council and a leading
contributor in the UN, there are high expectations on how national security issues are handled.
In the recent years, the level of sophistication and intensity of cyber attacks have occurred
increasingly among most developing countries, including France. This gradual development has
urged other countries to reinforce their resilience to cyber attacks and establish national
security strategies to combat cyber related terrorist activity. France has strived to improve
national security policies by creating thoroughly developed security plans following the cyber
security scare of 2008. France elaborately reviewed its defence and national security policy of
2008 (White Paper). After review, new priorities identified itself. The preventing and
responding to cyber attack was identified as one of the key priorities in organization of national
security. The outcome of France's strategies have proved to be exemplary, in terms of cyber
crime terrorism France is at a reliable state.
In 2006, France passed new counter-terrorism legislation for the purpose of terrorismrelated investigations. This new legislation enabled the surveillance of communications and
police access to communication data from telephone operators, Internet-service providers and
Internet cafes. Following this legislation the Public Prosecutor v. Hicheur case developed. In
August 2007, Belgian authorities received information from their French counterparts
concerning the activities an identified terrorist plotting. This case illustrated how different
forms of Internet technology could facilitate the preparation of acts of terrorism. After
communications within and between organizations that promoted violent extremism were
collected by France they responded to this cyber scandal with strengthening of it’s National
UNSC Topic B
Security and jailed the people involved. The Prosecution claimed that the content exchanged
between the men/groups were in support of the jihadist network. As required under the French
Criminal Code, the court found reliable evidence that provided intellectual support and direct
logistical support to a clearly identified terrorist plan. France’s actions illustrated how
investigative techniques could be used to compile the necessary evidence to successfully
prosecute terrorist use of the Internet.
The Cybercrime Centres of Excellence Network for Training (Research and Education)
was established in 2010, which developed headquarters in four different countries, including
France as one of them. It aimed to to develop relevant training programmes and tools for use in
the fight against cybercrime. In the recent years cyber security has been deemed a priority for
French government. French Network and Information Security Agency was set up in July 2009.
The national strategy for information systems defence and security was published in February
2011. Cyber Defence General Officer post was established in 2011 and the National cyber
security strategy was adopted in 2011. France is actively contributing to the formulation of
security strategies, even within international organisations. The UN is addressing the cyber
crime issue by initiating a Group of Governmental Experts (Jean-François Blarel is the french
representative) meeting from August 2012 to June 2013.
Based on France’s interaction with cybercrime within it’s own borders France has
become an active member in the anti-cybercrime community. France has clear motives to
prevent cyber terrorist from happening, as technology is becoming more sophisticated making
it difficult to identify criminal due to botnets and proxies. France outlined the domestic
approach to coordinating inter- agency responses to gather intelligence or otherwise take
UNSC Topic B
proactive action in connection with a perceived terrorist threat. France used “Phase 1:
Surveillance and intelligence services identify a threat by monitoring Internet activity.....Phase
2: The surveillance services notify the public prosecution services of the threat
identified.....Phase 3: The investigation is conducted based on the evidence gathered from the
sources outlined under phases 1 and 2.” France will not make any drastic changed to its
outlined plan of attack. The main plan for combating cyber terrorism is to refine the already
thought out plan, create more centers that target the tracking of cybercrime, and campaign to
gain support for the cause. France is a strong supporter and contributor to organizations that
target the issue of cyber crime.
UNSC Topic B
Republic of Lithuania
Cyberterrorism, which is the use of Internet based attacks in terrorist activities, including acts of
deliberate, large-scale disruption of computer networks, especially of personal computers
attached to the Internet, by the means of tools such as computer viruses. Lithuania, which had a
series of very serious cyber attack in 2008, feels very strongly about the passage of a stricter
international law regarding cyberterrorism. Lithuania does have a stringent national policy
regarding cyberterrorism. In 2006, the Government of the Republic of Lithuania approved the
National Strategy on State Institutions Information Systems Electronic Information Security until
2008. One of its goals is to establish an effective system for combating criminal acts in
cyberspace. In addition, the Government has approved the National Programme against
Terrorism for the period 2008-2016. The aforesaid inter-institutional programme focuses on the
prevention of and protection against terrorism. One of the Programme’s objectives is to enhance
the fight against the use of the Internet and cyberspace to commit acts of a terrorist nature.
Because of these laws, the misuse of cyberspace for terrorist purposes is criminalized. According
to the Criminal Code of the Republic of Lithuania (which defines criminal liability for particular
criminal acts it provides for) in some cases the use of cyberspace may be regarded as a means to
achieve criminal goals. This principle is applied also in respect of criminal acts of a terrorist
nature.
Due to the rapidity at which the Internet is expanding, it can easily be a new platform for
terrorism in the 21st century. Because of this, Lithuania urges the UNSC to see cyberterrorism as
as grave of an issue as any other form of terrorism.
UNSC Topic B
South Korea
Cyber terrorism to South Korea is a major issue, as South Korea is a country that ranks very
high in the amount of people who use the internet. South Korea also produces cutting edge
technology that is used worldwide. Recently throughout the years, South Korea has worked
closely with the United States, and has made them a target for many cyberterrorist attacks. In
2003, millions of South Koreans were taken offline by a worm nicknamed “Slammer.” To fight
cyber terrorism, South Korea has established an anti-cybercrime unit as a subsection of the
Korean National Police Agency. Every year since 2000, the agency hosts an international
conference, The Annual Symposium on Cyber Terror.
In the United Nations, South Korea and the United States have worked closely together
to pass legislation but have not yet passed anything. As the two leading nations in technology
and the world-wide web, the United States and South Korea work diligently when trying to pass
mandates pertaining to cyber terrorism. A mandate has recently been proposed and is currently
still being talked about in the UN.
South Korea urges the UN to pass a mandate that allows countries to prosecute cyber
terrorists in order to secure the safety of citizens. As technology advances, more and more
personal information are placed into databases, and without the ability to prosecute cyber
terrorists as criminals internationally, that information can be stolen and used to ruin lives.
People over the internet are also able to induce panic when they commit felonious acts, and
South Korea wishes to put an end to the panic and the acts committed.
UNSC Topic B
Download