Topic 1: International Standards For Medicinal Research

advertisement
CSTD
PACMUN 2015
Pacific Model United Nations
The Commission on Science and Technology
for Development
Director: Karthik Krishnan
Chair: Alexandra Ash
Assistant Director: Daljit Kaur
1
CSTD
PACMUN 2015
TABLE OF CONTENTS
Committee Introduction ................................................................................................ 4
Topic 1: International Standards For Medicinal Research ........................................ 4
Introduction ................................................................................................................ 4
History ......................................................................................................................... 5
Past UN Action ........................................................................................................... 6
Current Situation ........................................................................................................ 6
Bloc Positions ............................................................................................................ 7
North America: ........................................................................................................ 7
South America: ........................................................................................................ 8
Europe and Oceania: .............................................................................................. 8
Asia: ......................................................................................................................... 8
Middle East: ............................................................................................................. 9
Africa: ....................................................................................................................... 9
In General: ............................................................................................................. 10
Case Studies ............................................................................................................. 10
Case Study 1 .......................................................................................................... 10
Case Study 2 .......................................................................................................... 10
Guided Questions .................................................................................................... 10
Sources ..................................................................................................................... 11
Topic 2: Assessing Cyber Security ........................................................................... 12
Introduction .............................................................................................................. 12
History ....................................................................................................................... 12
Past UN Action ......................................................................................................... 13
Current Situation ...................................................................................................... 14
Bloc Positions .......................................................................................................... 15
North America: ...................................................................................................... 15
South America: ...................................................................................................... 15
Europe and Oceania: ............................................................................................ 15
Asia: ....................................................................................................................... 16
Middle East: ........................................................................................................... 16
2
CSTD
PACMUN 2015
Africa: ..................................................................................................................... 17
In General: ............................................................................................................. 17
Case Studies ............................................................................................................. 17
Russia .................................................................................................................... 17
Cyber Attack on Ebay ........................................................................................... 18
Guided Questions .................................................................................................... 18
Sources ..................................................................................................................... 19
3
CSTD
PACMUN 2015
COMMITTEE INTRODUCTION
The Commission on Science and Technology for Development (CSTD) is a subsidiary
of the Economic and Social Council (ECOSOC) and has been active since 1993. It specializes in
advising the General Assembly (GA) and ECOSOC on issues having to do with science and
technology in order to aid developing countries. This committee meeting will advise the GA
and ECOSOC on the following topics: 1) International Standards for Medicinal Research and 2)
Addressing Cyber Security.
We are excited to see how the delegates will address and resolve these issues. We hope
the discussions during committee sessions will be both diplomatic and thought-provoking. We
hope delegates will find this Background Guide informing and they will have fun debating! The
Dias welcomes any questions, and we look forward to seeing you at PACMUN.
TOPIC 1: INTERNATIONAL STANDARDS FOR MEDICINAL RESEARCH
INTRODUCTION
While creating new medications, scientists must research and experiment with different
ingredients to make sure that these medications are effective, and cause more benefit than harm
to patients. Oftentimes, the medicine will be thoroughly researched before it is approved for
animal testing, and once proven safe for animals, the medication will be tested on a relatively
small number of humans in several trials for reliability, safety, and effectiveness. Once a
medication passes the human test stage, it is released into the general public for prescription or
over-the-counter (OTC) use. Multiple trials on a medication before release allow researchers to
correct mistakes and prevent fatalities and injury. However, standards for the research and
testing of new medications are not the same throughout the world. Poor standards for
medicinal research can lead to significant loss of life, especially if a medication is being
administered worldwide. However, delaying the release of a medicine so that each country
planning to use it can test and retest it due to it not fitting their standards can have the same
effect.
Currently, many organizations such as the World Health Organization (WHO) and the
International Standards Organization (ISO) have guidelines or standards set in place for
medicinal research--however, these tend to be unenforced or nonspecific. This allows for
differing standards in different countries, which is also a result of differing income levels,
faculties, and access to tools and resources for medicinal research and testing. For instance, a
state with a higher GDP can allocate more funds to researching and testing medicine, and will
also have better facilities and more tools than a country with a lower income. Also, oversight
on medications is less stringent in some states, which can allow for unsafe drugs to be released
to the public. This dangerous situation occurs globally, and the implementation and
4
CSTD
PACMUN 2015
enforcement of international standards for medicinal research can drastically reduce the
number of lives lost to unsafe medication.
HISTORY
The history of patent medicine stems from the late 17th century when ruling class in
many Western European countries declared certain proven types of medical elixirs legitimate
in comparison to the others. Since 1925 however, the patenting of medicines has been
emphasized for many reasons. One is that in order for a medicine to be deemed legitimate by
the public, the creator had to disclose its ingredients for the public to approve (today, approval
is done by various agencies such as the United States’ Food and Drug Administration). Another
reason is that patenting medicine allows an individual to distinguish his or her medication
amongst other products. This also means that his or her product would be patented and
branded for consumer popularity. Lastly, the producer has proprietary control over the
medicine he or she produces for a certain number of years. Even in Latin, patent medicine is
nostrum remedium, or “our medicine,” emphasizing the importance companies place on owning a
medicine/process they have pioneered for profit and popularity.
The patenting of medicine evolved with the scientific method of medical production.
Medicine emerged from a series of early pseudoscientific methods such as alchemy and work
done by apothecaries in order to produce elixirs that would help the ailing patients of the time.
While some of these elixirs worked, many were not reliable, nor were they scientifically
legitimate. Before modern medicine emerged in the 19th and 20th century, “magical” methods,
particularly the occult, allowed individuals to avoid patenting their methods for a while. In
many ways this is a hazard due to the fact that elixirs and potions that are not scientifically
tested can have drastic effects on human health or merely be utterly useless in terms of truly
curing anything at all.
The main issue with patent testing is that the process takes quite a long time. The
patenting of medicines is a precursor to the numerous standards it needs to pass in order to be
available on the market. Patenting is merely a way in which companies can have ownership
over a chemical formula before it is tested. It may take months to years, depending on the
importance of the medicine. Even a couple of months can be costly for testing medicine for the
purpose of being used in areas that are currently plagued with disease. An example is the most
recent Ebola Epidemic that occurred in West Africa in 2014. Since June 17th, 2015, the World
Health Organization estimates around twenty-thousand people are suspected to have
contracted this virus, and eleven-thousand have died from it. Even worse, the incubation, or
process of catching a virus, for this period ranges from as little as two to twenty-one days. If
medicines are efficiently approved throughout the world to cure rampant diseases, while still
maintaining the scientific process of testing extensively, organizations such as CSTD and
WHO can work together and spread the medicine to the nations that need it the most. CSTD’s
role in the testing of medicines is that it is necessary to do so thoroughly, but in a time span in
5
CSTD
PACMUN 2015
which lives can be saved. Patenting emphasizes the scientific method of testing medicines,
which is highly important, but the lack of speed in testing allows millions of deaths to occur.
PAST UN ACTION
While the UN itself hasn’t necessarily pushed for faster testing techniques, they have
certainly been a product of discussion in the medical world. Many agencies such as the FDA
and the CDER (Center for Drug Evaluation and Research) have been looking into speeding up
research in times of dire need. The FDA has created an accelerated development/review in
which a medication is tested to a certain degree, and then tested even after its release into the
market. This allows the individuals plagued by the disease to use whatever form of medication
is effective and receive improved versions over time. Not only is this useful for taking care of
outbreaks, this method is also effective in not compromising the safety of drugs on the market.
The CDER also suggested using a wider range of experts to test medications in order to speed
up the process and receive extensive study on the medication itself.
Throughout pharmaceutical history, it has been tested under various standards and
perspectives, including the microbiological, chemical, pharmaceutical, and toxicological effects
of the drug. By increasing the testing range to a wider group of subjects, the CDER claims that
they can speed up the process by not having to rely on one entity to accomplish all these tests
in a longer period of time. The United Nations currently continues to supply medication that is
commercially available to countries that are plagued by disease, but the United Nations cannot
do so unless the medication is publicly available. By following the standards of the FDA and
CDER and applying the methods at hand, it is possible to move closer towards testing
medication more quickly and patenting it so that corporations have an incentive to create these
medications. Furthermore, the UN can take actions and contact international agencies and
involve everyone in understanding methods to speed up extensive medical research for use in
plagued areas.
CURRENT SITUATION
Patenting is used today in many of the same ways in which it was utilized in the past.
According to the European Commission, “patents are key in the pharmaceutical sector, as they
allow companies to recoup their often very considerable investments and to be rewarded for
their innovative efforts." Patents serve as a building block for companies to develop innovations
and gain profit in order to continue developing medicines. In the long run, patents can be
extremely useful. They allow companies to have proprietorship over the chemical formula in
which they have put millions of dollars of research. Using basic economics, it is clear that
unless companies gain a net profit on their research, they would be unlikely to continue it in the
future. Therefore, the patenting of medicine works very well for the long term.
6
CSTD
PACMUN 2015
The testing process for medication in more developed countries also follows the
scientific method. For most of the drugs, the medicine is first tested on rodents in order to
figure out how it is absorbed into the bloodstream. Then after it has been extensively tested on
rodents, it is either tested on other animals or moved directly to humans, depending on the
drug. When it is moved to humans, it is first tested on a select group of volunteers. If it passes
this portion of testing, it is then moved into clinical trials where an early form of the
medication is released into the market. If the medication was deemed as unsafe in the early
trials, the CDER will place a clinical hold and prevent it from going into further trials. If it
does pass these clinical trials, it is sold commercially and refined based on various factors such
as side effects and effectiveness.
Therefore, patenting is not really a problem (as many people assumed it was due to the
monopoly a company holds by owning ownership over a chemical formula). Patenting allows
companies to gain incentive to continue producing medicines. The true problem is that the
testing process of medicines by organizations such as the Food and Drug Administration in the
United States can be a lengthy one. Instead of patenting being much of the problem, it is the
lengthy testing of the medicine at hand that can be a problem for developing nations that lack
health-care for deadly diseases. Therefore, the focus should be on the testing method and how it
can be efficiently performed in order to effectively to combat this problem. Depending on the
medicine, it is first tested for any ingredients that have been banned by the FDA. These can
include carcinogenic substances such as cadmium, mercury, and lead. Monographs are
primarily used for this screening process. Once the FDA evaluates the ingredients of the
medicine, they view the medical trials the company has completed on rats, humans, and other
animals. This is often what may take a longer time by the company as they constantly tweak
their medicine before testing it out on humans. Obviously, humans should not be given
medicine that has not passed the aforementioned clinical trials. This is the complete dogma.
How should a company go about testing their pharmaceutical patent in a manner which is
thorough and responsive to a disease that breaks out in places without proper health-care,
while not testing for too long?
The first step would be for the United Nations and the CSTD to evaluate the methods
used by the FDA in order to figure out if a process of testing can be faster while maintaining
results that are thorough. This problem of lengthy testing has affected many serious outbreaks
in the 20th and 21st centuries, such as Ebola, Swine flu, syphilis, HIV, and many others, which
could be halted or prevented with fast-acting medicine and testing.
BLOC POSITIONS
NORTH AMERICA:
The North American bloc position is largely interrelated with the the Food and Drug
Administration as a large extent of medical research is completed and medicine is sold in the
United States. This is based on population and frequency of research institutions. North
7
CSTD
PACMUN 2015
American countries are likely not concerned with the speed of research methods/depth of
testing because epidemics have been less common in North America in the last 50 years
compared to many countries in Africa.
SOUTH AMERICA:
In South America, illegal and unregulated drug trials are becoming widespread. Many
patients are coerced by hospital or clinical staff to sign papers with terms or agreements that
they don’t understand. These papers are actually waivers and agreements to participate in
dangerous experimental drug trials. The doctors, nurses, and staff members of medical facilities
are often paid per patient who signs agreements to participate in trials, either knowingly or
unknowingly.
This malpractice has caused illness, permanent health problems, and even death. For
example, in 2008, during unauthorized clinical trials for GlaxoSmithKline, a pneumonia drug,
in Argentina, 7 babies died. Still, unregulated drug trials are an ongoing and increasing
epidemic affecting more people than ever. Since people are likely to trust doctors most, many
patients and caretakers sign papers without fully understanding their implications, and due to a
lack of education and awareness of these drug trials,
Unsanctioned drug trials like these are more easily accomplished in South America due
to the unregulated health care. South American countries should focus on regulating and
mandating health care and ensuring that patient rights are protected, and that all drug trials go
through legal lanes.
EUROPE AND OCEANIA:
Europe has a similar position to North America in its views of speeding up medical
research due to the fact that epidemics have not been as rampant as those in Africa since the
Black Death. While Europe plagued other nations through colonization, it rarely had major
internal epidemics to the degree of those in the New World (circa 1500) and West Africa today.
Oceania on the other hand is exposed to multiple tropical diseases that are investigated
less, therefore medications are prescribed less. If medical testing is sped up, tropical diseases
could be cured more efficiently. The places in Oceania most plagued by disease are island
nations, such as Micronesia, in contrast to more developed regions such as Australia and New
Zealand.
ASIA:
Asia has a generally strong standing in terms of medicinal research. Recently, medicinal
research spending has increased over United States spending, with Hong Kong at the center of
this researching boom. However, less developed countries still are victim to disease and low
8
CSTD
PACMUN 2015
medical supplies. More rural regions often resort to traditional medicines which may or may
not be helpful in treating illness.
These more rural areas don’t participate in research or trials because of a lack of
facilities and knowledge. In order to increase participation, more areas must be made aware of
new and potentially safer medications and vaccines, and be provided with education. In this
way, medicine and research can be standardized throughout every part of Asia, regardless of
level of development.
MIDDLE EAST:
In many Middle Eastern countries, regulations and standards exist and are enforced,
but pale in comparison to international standards. In ten Middle Eastern nations studied, eight
documents pertaining to medicinal research were found, three of which were from Saudi Arabia.
The remaining documents were from Lebanon, Egypt, Jordan, United Arab Emirates, Kuwait,
and Qatar. These countries had several ethical and medical research regulations, but lacked the
detail and enforcement that similar international documents had.
In addition to regulations of their own, many Middle Eastern countries also adhere to
guidelines presented by the GCC (Gulf Cooperation Council). In the GCC Guidelines for
Variation Requirements, many guidelines for medicinal research are presented, including
alerting the public about changes to medication name and manufacturing, and which documents
to supply in accordance to which change has been made to a medication. Given the Middle
East’s growing standards for medicinal research, the goal of Middle Eastern nations is to
continue and supplement this growth in order to manufacture on a larger scale and treat more
patients more effectively.
AFRICA:
The standards on medicinal research vary depending on the development level of the
country. A developing nation will have less stringent standards and less medicinal and medical
research facilities and education available. Therefore, in Africa, medicinal research standards
vary greatly. However, in a continent where HIV and AIDS has a long-standing epidemic, and
more recent ones, such as Ebola, have stricken large populations, it is imperative that standards
be raised and new medicines and vaccines are created to combat diseases.
There are many organizations, both domestic and transnational, which are focused on
improving standards, educating health workers and strengthening health systems, and fighting
disease. Two such organizations are Amref Health Africa and The South African Medical
Research Council. Amref is an organization dedicating to improving health and health practices
across all of Africa, and one of its main priorities is Research and Advocacy. The South African
Medical Research Council is in charge of South Africa’s medicinal research and education,
ethics, and funding. Through the help of Amref, more councils like The South African Medical
9
CSTD
PACMUN 2015
Research Council can be established so that more drugs and vaccines can be processed, tried,
and distributed.
IN GENERAL:
An example of an organization that improves the efficiency of research by pharmaceutical
companies is a contract research organization (CRO). A CRO provides assistance in the form of
outsourcing labor such as the creation of certain biologic reports and biopharmaceutical
development. In many ways, a CRO is a separate entity with the intention to help government
agencies through profit and private spending.
CASE STUDIES
CASE STUDY 1
A widely known case is the Ebola virus epidemic in West Africa. This virus causes
hemorrhages in the brain and has around a 70% mortality rate. When this outbreak occurred,
individuals were desperate to find a vaccine and/or cure for the disease. While many were
hospitalized and relieved of their symptoms, the Ebola virus has killed most of the individuals
that it has touched. This is a large concern for the doctors that have been exposed to Ebola
because they carry the risk of bringing the disease to North America.
That being said, if the Ebola virus was hit with the most tested medication on the
market today, we could have lowered the number of casualties of the disease altogether. Not
only would the death toll have been lower, but the chances of it spreading would have
substantially decreased as well. A tested disease needed to be used just then, as we could have
saved millions of lives with a beta-drug that would have been further tested over time.
CASE STUDY 2
The H1N1 (Swine flu) breakout in 2009 prompted many individuals to receive flu shots
the following years in order to prevent the growth of the virus itself. This definitely worked in
the developed countries as the H1N1 virus was almost completely curbed in the places where
flu shots were ubiquitous. In a way, by effectively promoting a medication early on, many
companies and organizations were able to effectively eradicate it from the United States for the
most part. That being said, the strain may be able to come back in a stronger form (as it did
come back in a stronger form from the 1919 H1N1 breakout) but if the nations afflicted by it
act in the same way and grant vaccines and medications that are tested to a certain degree to
the population, then countries will not be ravaged by the flu as they could have been.
GUIDED QUESTIONS
i.
How can we make it so poorer countries can afford to meet new standards?
10
CSTD
ii.
PACMUN 2015
What specific standards can increase the safety of medicines and medical procedures?
iii. How can we enforce these standards?
iv. What might cause a country not to accept standards or restrictions?
v.
What are your country’s existing standards on medicine, if any?
SOURCES
http://www.fda.gov/ScienceResearch/AboutScienceResearchatFDA/
http://journals.plos.org/plosntds/article?id=10.1371/journal.pntd.0001755
http://www.fda.gov/Drugs/DevelopmentApprovalProcess/HowDrugsareDevelopedandAppro
ved/ApprovalApplications/InvestigationalNewDrugINDApplication/ucm176522.htm
http://press.princeton.edu/titles/880.html
http://www.thenation.com/article/rise-unregulated-drug-trials-south-america/
http://www.usnews.com/news/articles/2014/01/02/us-medical-research-spending-dropswhile-asia-makes-gains
http://www.sciencemag.org/site/products/HKBIO-feature_121221_lores.pdf
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3576357/
http://www.clinsearch.net/dev/md_middle_east.html
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4242697/
http://sgh.org.sa/Portals/0/PDF/Cen_registration/Thc%20GCC%20Guidelines%20for%20V
ariation%20Requirements%20version%203.1.pdf
http://www.mrc.ac.za/about/about.html
http://amref.org/what-we-do/amref-strategic-directions/
11
CSTD
PACMUN 2015
TOPIC 2: ASSESSING CYBER SECURITY
INTRODUCTION
Through security measures, many states have increased domestic safety. However,
while a state might be physically safe, many states are unprepared to deal with attacks to their
cyber security. Cyber terrorism is becoming a much more prevalent form of attack as the world
begins to depend more on the internet. A person’s use of the internet to gather knowledge,
exchange goods and funds, and share information can be in danger when private information
can be hacked into. Perhaps even more terrifying, state infrastructure can be affected as well.
Currency, nuclear weapon launch codes, security hazards, and classified information are all at
risk of being hacked into if the information is computerized. However, having computerized
information can increase productivity and efficiency, allow for easier access and centralized
files, making it a necessary component of information storage and sharing today. Yet as the risk
of cyber terrorism increases, security measures to protect this computerized information must
be addressed.
Cyber terrorism can come in many forms. Whether it’s the stealing of currency from
online banking systems or the acquisition and usage of sensitive military information, it can
derail or otherwise negatively impact the growing or established infrastructure of a state. Some
states have measures against cyber attacks, but others, especially those new to the usage of
computerized information and the internet, don’t have the security needed to protect
themselves from cyber terrorism. With several recent cyber security issues in many states, it
has become urgent that the world assess what measures must be taken to prevent cyber
terrorism attacks.
HISTORY
Upon the creation of the internet, very few people understood the impact it would have
on people and states. The internet was first created by the United States’ Department of
Defense’s Advanced Research Projects Agency (ARPA) as a method for computers to
communicate amongst each other during the Cold War. The internet, which as that point was
called the Arpanet, was made in case the nation’s telephone system was attacked, the
government leaders would have another method of communication not so easily disabled. The
network slowly grew over the years, adding other smaller company’s package sharing methods
and connecting with more than just government officials. Arpanet slowly changed and was
built upon, leading to the new World Wide Web being made public in 1981.
This World Wide Web was not completely safe though, and an ominous warning was
delivered by a group of hackers in May of 1998. This group, titled “L0pht”, told a panel of
Capitol Hill senators that, “(they) are not safe, not the hardware, not the software, not the
network that connected them. The companies don’t care,” the hackers continued to say, “they
only want to meet deadlines, not secure their products. If you’re looking for computer security,
then the Internet is not the place to be… The Internet itself could be taken down by any of the
12
CSTD
PACMUN 2015
seven individuals seated before you with 30 minutes of well-choreographed keystrokes” stated
one of the hackers. While those senators acknowledged these statements, nothing was done,
and the world is still paying the price in rampant insecurity.
In the world today, many threats come through cyberspace. Cyberattacks initially were
directed towards a corporation and dealt with exposing risks, sabotaging systems or taking
information, but today they have expanded the threaten countries and national infrastructure.
International cyber strikes often range from stealing confidential information to destroying
infrastructure to disabling governments. In one of the first recorded international cyber-attacks
in 2007, Estonia's internet was completely disabled and all government sites were overloaded
and taken down by an outside source for 24 hours. This attack closely followed a disagreement
with Russia over the removal of an old war memorial, leading to a general assumption that the
attack was executed by Russia. But because of the insecurity of cyberspace, the origin of this
attack remains unconfirmed. Far above and beyond this attack is the virus Stuxnet, considered
to be the first and most deadly cyber-weapon to this day. Stuxnet was sent by an unconfirmed
source, highly suspected of being the United States and Israel, to attack Iranian nuclear
facilities. This virus spread from computer to computer via USB memory devices, wreaking
havoc and creating much damage. It was one of the first viruses that moved beyond virtual
destruction, to the realm of physical destruction, which gave it the title the “world’s first digital
weapon.”(Holden)
All of these effective attacks have emphasized the deep need for increased cybersecurity
in all countries. There has been little action in the past to address cybersecurity, but it is an
issue that is becoming more prevalent in this century.
PAST UN ACTION
There has been very little international action towards securing cyberspace. There have
been many United Nations publication that do document the concerns about cybersecurity and
the lack thereof. In resolution A/RES/53/70, the need for more research and discussion about
cyber/information security was introduced. This resolution later led to three separate Groups
of Governmental Experts (GGE) that researched and published all potential threats to the
cyber-sphere in 2010, 2011, and 2012/13.(UNODA…) Other publications documenting the
threats and status of the cyber-sphere come from the International Telecommunications Union
(ITU). (Touré)
In the midst of these publications, the United Nations Economic and Social Council
(ECOSOC) held a special event in December of 2011 on “Cybersecurity and Development” that
worked towards building awareness of the problem and identifying and discussing aspects of
the problem, as well as exploring options for a global response. Aside from ECOSOC, many
other branches of the UN have held conferences or are exploring international cyber security
options. These committees include but are not limited to the North Atlantic Treaty
Organization (NATO), United Nations Office on Disarmament Affairs (UNODA), and United
Nations Disarmament and International Security Committee (DISEC).
13
CSTD
PACMUN 2015
CURRENT SITUATION
The current situation for international defense against cyber-attacks is a sad one. Many
nations lack the funding and the materials for securing their cyberspace, leaving their
infrastructure vulnerable to any manner of attacks. Their infrastructure, banking, military, and
governments are left at risk to cyberattacks and cyber-terrorism, in which the aftermath could
be devastating. But many of these nations are unable to procure the necessary materials, which
lets the threat stagnate and grow.
Another concern of many nations is cyber-warfare. Cyber-warfare is a method of war
that is being explored by many countries as a substitute to conventional warfare, It is a
seemingly safer and easier alternative. In recent years the number of international cyberattacks has spiked, and the option of cyber warfare is becoming a real threat for many nations.
The USA and Iran have been utilizing cyber espionage and sabotage for years in attempts to
end their conflict, yet it has been unsuccessful and only resulted in more tension between Iran
and the Western bloc. Meanwhile in war-torn Ukraine, Russia has been accused of waging a
cyber-campaign against the country for the purpose of extracting classified military documents.
While currently these campaigns still qualify only as attacks, they could easily escalate to
warfare, resulting in destruction of infrastructure, banking, government, and countries, leaving
disasters in their wake.
This worry has instigated discussion about creating a convention, similar to the Geneva
Conventions that would outline rules for cyber-attacks between nations and the legal responses
and protocols. This proposal has varied reactions though, and no clear answer on how effective
such a document could be in the future.
The final concern in cyberspace is cyber terrorism. A broad term with many varied
definitions, cyber-terrorism is most commonly described as a politically motivated attack
targeting information, computers and sensitive data. Minor acts of cyber terrorism are
common, and vulnerabilities in companies and governments are exploited daily by those
outside aggressors. An example includes the 2013 hack of the New York Times, Twitter, and
Huffington Post, which disabled their websites for multiple hours. A Syrian hacker group, who
had a history of infiltrating organizations that it considers hostile to the Syrian president
Bashar al-Assad, took credit for the attack shortly after its execution. The companies reassured
their customers in a statement declaring that they had not taken any personal information,
unlike cases in the past where they group had compromised sensitive information. But there has
been an even more pressing question posed by countless states in the wake of attacks such as
this: what would a large scale cyberterrorist attack look like, and what measures must be taken
to defend against that unknown? These questions are the concerns of many nations and
companies, and is something that greatly threatens developing nations.
14
CSTD
PACMUN 2015
Cyberspace is vulnerable to many different natures of attacks, both physical and virtual.
The need for protection against this cyber threat is growing more necessary as these
weaknesses are exploited by terrorists, individuals, and opposing states. Governments,
militaries, financial institutions, hospitals, they just begin the list of people who use the internet
to process, store and share confidential data. Cybersecurity is utilized by countries to protect
against the possibilities of cyber-attack or cyber warfare.
BLOC POSITIONS
NORTH AMERICA:
Canada and the United States are well-versed with technology, and have complex
systems put in place to combat cyber terrorism. However, that doesn’t mean that the threat of
their cyber networks being hacked or sabotaged is nonexistent. The biggest threat is hacking
done through cloud-based storage systems. However, as terrorist groups grow, the threat of
cyber attacks is a prominent concern. Mexico’s cyberspace is still developing, but there are
many issues with pirated software, which is prone to vulnerability. Due to all of the pirated
software in use by devices in Mexico, cyber attacks have gone up 40% in 2012.
SOUTH AMERICA:
While its cyberspace is still growing, South America’s online presence has increased
exponentially. As a result, Brazil, Chile, Colombia, Ecuador, and Peru have taken cyber security
into their plans for the future. However, there is still much research to be done. The general
trend in South American countries seems to be increasing protection, especially in cases of
monetary or identity theft, but also protecting against spyware use in government operations.
Columbia, Argentina, Chile, and Venezuela face the most risk based on their current standards
of security and risks.
EUROPE AND OCEANI A:
The European Union (EU) is working to increase cyber security by creating cybercrime
and alert platforms and reinforcing their Network and Information Security Policy. While the
EU has strong plans against cyber security and most of its members have developed strong
cyber networks, the European countries not included in the EU, such as Russia, Ukraine, and
Turkey, are not included in its plans.
Russia has a more private network with allegations of surveillance, even against memes,
and has created Kaspersky Anti-Virus systems. Russia seeks to prevent information and
communication tools being used for military purposes, and is against UN Charter Article 51,
which guarantees a country’s right to use self-defense if attacked, being applied to cyberspace.
15
CSTD
PACMUN 2015
Russia is allegedly also in a cyber conflict with Ukraine, which is trying to strengthen its
defenses. Also, Russia and China have signed a pact to cooperate on cybernetic threats aimed at
them. Turkey is seeking to build a national framework to defend against cyber attacks, and has
a rapidly growing cyber network. Its biggest threats are information and identity theft, and a
lack of awareness and infrastructure.
In Australia, a country with a more developed cyber network, cyber security is a top
priority. Their main concerns are attacks from other states as well as monetary loss from fraud.
In New Zealand and other island states in Oceania, the cyber network is becoming much more
developed, and the main threats are scamming, identity theft, and lack of awareness by citizens.
ASIA:
Population-wise, Asia has about 45.7% of all the world’s internet users, and that number
is still growing. China, North and South Korea, and Japan have particularly developed cyber
networks. China and North Korea have more private networks, where the information flow to
citizens is more restricted and monitored, not unlike Russia. South Asian countries, in
comparison, have cyber networks that are still developing. In these developing countries,
identity theft and scamming is common, and has caused significant monetary losses through
hacking and theft.
China and North Korea have a very strong cyber security policy, but it restricts the
information available to citizens. However, China has more information available and is looser
in its restrictions than North Korea. This strategy is to protect against espionage and foreign
attack. Meanwhile in Japan and South Korea, citizens have the freedom to use the internet how
they wish as long as it doesn’t conflict with their laws. Both have several policies in place to
prevent identity theft and fraud, and have had campaigns to promote citizen awareness of cyber
security. The biggest threats to Japan are cyber crimes and hacktivism over cyber terrorism or
warfare. However, South Korea has increased cyber security recently, with claims that its in
order to defend against North Korea.
MIDDLE EAST:
In the Middle East, all nations have developed cyber networks except for Iran,
Palestine, Saudi Arabia, Syria, and Yemen, which are still developing, and Iraq, which is still
entering the cyber world with only 9% of its population using the internet. Majority-wise, most
Middle Eastern countries have very developed cyber networks.
However, there are also added terrorism threats coming from extremist factions that
can be found lurking in war-torn areas. While many countries, especially more developed
nations, do have policies protecting against cyber attack, others are just starting create these
16
CSTD
PACMUN 2015
policies or have none at all. The biggest threats to these states are terrorism attacks, threats of
espionage, or identity theft and monetary fraud.
AFRICA:
Most countries in Africa are still growing their cyber networks, with Madagascar and
Malawi having developed cyber networks, and Egypt, Kenya, Morocco, Seychelles, and South
Africa having an over 50% population usage of the internet. As many countries are still in the
very early stages of development, cyber security is less of a threat. For other countries which
are in the process of developing, focus on a cyber infrastructure is the biggest cybernetic
priority.
Madagascar, while having a developed cyber network, has few systems or organizations
set in place to increase cyber security, but has criminalized it. Malawi also doesn’t have many
organizations set in place to prevent cyber attacks, but does have a policy recognizing the
importance of cyber security and is in the process of criminalizing cybercrime.
However, as a whole, the African Union has published a resolution on cyber security
that seeks to establish a framework for defending against cyber attacks and diminishing the gap
between poorer countries with little internet usage and wealthier countries with a majority of
the population using internet.
IN GENERAL:
Countries with developed cyber networks are concerned about attacks on identity,
frauds and scams, and cyber terrorism and attacks from other states. They typically have
systems and organizations set in place to combat cyber attacks, and citizens are often more
aware of cybernetic dangers. However, cyber attacks against developed cyber networks are
growing increasingly complex, and have not been eliminated.
In countries with developing cyber networks, the number of internet users are often
rising exponentially, but these users are often unaware of the potential risks that are present
online, such as identity theft and scamming. Also, these states don’t usually have developed
cyber infrastructure or protection, and are vulnerable to all forms of cyber attack.
CASE STUDIES
RUSSIA
In October 2012, the Russian antivirus firm Kaspersky Lab uncovered a cyber-espionage
malware dubbed “Red October” that had infiltrated Microsoft Word and Excel programs in
order to steal governmental, scientific, and diplomatic secrets worldwide. Red October had
been active since 2007. Not only did it steal sensitive and classified national security
17
CSTD
PACMUN 2015
documents, it also stole personal and identity information as well. Thankfully, Kaspersky
neutralized the threat, but information had already been stolen.
Red October has targeted nuclear research facilities, embassies, and even encrypted and
deleted files from Eastern Europe and Central Asia, but victims were also found in Western
Europe, North America, and worldwide. It had specific targets, often leaders of institutions or
companies or countries.
The fact that this attack went on for so long, uninterrupted, means that any number of
important documents could’ve been stolen. However, if more nations had a stronger cyber
security platform, the attack might’ve been stopped earlier or could have never even happened
at all.
CYBER ATTACK ON EBAY
Something that might be more familiar is the recent cyber attack on eBay on February March 2014. Over 145 million people had their private information, including names, address,
purchase history, email, date of birth, and password, stolen. However, it’s been reported that no
credit card information has been stolen.
Despite the lack of financial data being stolen, enough information was stolen from
customers that identity theft is a real concern. And sadly, it’s not the first time eBay has been
hacked or threatened by hackers, or that similar firms and other retailers have been targeted. In
fact, there are even YouTube videos that teach people how to hack into stores and steal credit
card and identity information. This is a constant threat to not only online buyers, but also to
anyone who has shopped anywhere. For example, in 2013 Target had a credit card breach that
ended in over 40-70 million people impacted and a $10 million lawsuit against Target.
Many companies don’t have cyber security systems in place, and when these companies
are global, the effect of hacking can ripple across the world. Only with a proper, enforced cyber
security infrastructure can we prevent attacks like this in the future.
GUIDED QUESTIONS
i.
What are the biggest threats to cyber security globally and domestically (in the country
you represent)?
ii.
How does your country currently address threats to cyber security?
iii. How developed is your country’s cyberspace and security?
iv. What methods of combatting threats to cyber security would be globally accepted?
18
CSTD
v.
PACMUN 2015
What are the effects, both positive and negative, of increasing cyber security either
globally or domestically?
SOURCES
"African Union Convention on Cyber Security and Personal Data Protection." AFRICAN
UNION CONVENTION ON CYBER SECURITY AND PERSONAL DATA
PROTECTIONAFRICAN UNION (n.d.): n. pag. African Union Legal Instrument. African
Union, 27 June 2014. Web. 28 Sept. 2015.
<http://pages.au.int/sites/default/files/en_AU%20Convention%20on%20CyberSecurity
%20Pers%20Data%20Protec%20AUCyC%20adopted%20Malabo.pdf>.
Allen-Ebrahimian, Bethany. "The ‘Chilling Effect’ of China's New Cybersecurity Regime."
Foreign Policy. Wordpress, 10 July 2015. Web. 28 Sept. 2015.
<http://foreignpolicy.com/2015/07/10/china-new-cybersecurity-law-internetsecurity/>.
"Australian Cyber Security Centre 2015 Threat Report." (n.d.): n. pag. Australian Cyber Security
Centre. Australian Government, 2015. Web. 28 Sept. 2015.
<https://www.acsc.gov.au/publications/ACSC_Threat_Report_2015.pdf>.
"Australian Cyber Security Centre 2015 Threat Report." (n.d.): n. pag. Australian Cyber Security
Centre. Australian Government. Web.
<https://www.acsc.gov.au/publications/ACSC_Threat_Report_2015.pdf>.
Bekdil, Burak Ege. "Turkey Seeks National Plan for Cyber Threats." Defense News. TEGNA,
21 Feb. 2015. Web. 28 Sept. 2015. <http://www.defensenews.com/story/defense/policybudget/cyber/2015/02/21/turkey-cyber-tubitak-cybersecurity-ssmsoftware/23636627/>.
Bennett, Cory. "Romania Defending Ukraine's Cyberspace." The Hill. Capitol Hill Publishing
Corp, 13 May 2015. Web. 28 Sept. 2015.
<http://thehill.com/policy/cybersecurity/241889-romania-defending-ukrainescyberspace>.
Chernenko, Kommersant Yelena. "Turkey Seeks National Plan for Cyber Threats." Russia
Beyond the Headlines. Rossiyskaya Gazeta, 19 Aug. 2015. Web. 28 Sept. 2015.
<http://www.defensenews.com/story/defense/policybudget/cyber/2015/02/21/turkey-cyber-tubitak-cybersecurity-ssmsoftware/23636627/>.
"Cyber Security Issues in Asia." TaylorWessing. Taylor Wessing LLP, Jan. 2015. Web. 28 Sept.
2015. <http://unitedkingdom.taylorwessing.com/globaldatahub/article_cyber_security_asia.html>.
19
CSTD
PACMUN 2015
"Cyber Security Primer." What Is Cyber Security? University of Maryland University College,
n.d. Web. 28 Sept. 2015. <http://www.umuc.edu/cybersecurity/about/cybersecuritybasics.cfm>.
"Cybersecurity: A Global Issue Demanding a Global Approach | UN DESA | United Nations
Department of Economic and Social Affairs." UN News Center. UN, 12 Dec. 2011. Web.
28 Sept. 2015. <http://www.un.org/en/development/desa/news/ecosoc/cybersecuritydemands-global-approach.html>.
"Cybersecurity." Digital Agenda for Europe. European Commission, 28 July 2015. Web. 28 Sept.
2015. <https://ec.europa.eu/digital-agenda/en/cybersecurity>.
"Cybersecurity Overview." Homeland Security. Homeland Security, 22 Sept. 2015. Web. 28 Sept.
2015. <http://www.dhs.gov/cybersecurity-overview>.
"Cybersecurity Policy." Council on Foreign Relations. Council on Foreign Relations, 28 Sept.
2015. Web. 28 Sept. 2015. <http://www.cfr.org/cybersecurity/cybersecuritypolicy/p27480>.
"Cyberwellness Profile Madagascar." (n.d.): n. pag. International Telecommunications Union.
United Nations Statistics Divison, 12 Aug. 2014. Web. 28 Sept. 2015.
<http://www.itu.int/en/ITUD/Cybersecurity/Documents/Country_Profiles/Madagascar.pdf>.
"Cyberwellness Profile Malawi." International Telecommunications Union. United Nations
Statistics Divison, 12 Aug. 2014. Web. 28 Sept. 2015. <http://www.itu.int/en/ITUD/Cybersecurity/Documents/Country_Profiles/Malawi.pdf>.
Davis, Joshua. "Hackers Take Down the Most Wired Country in Europe." WIRED. WIRED,
27 Aug. 2007. Web. 28 Sept. 2015.
<http://archive.wired.com/politics/security/magazine/15-09/ff_estonia>.
"EU International Cyberspace Policy." European Union. European Union, n.d. Web. 28 Sept.
2015. <http://eeas.europa.eu/policies/eu-cyber-security/>.
Gjelten, Tom. "Security Expert: U.S. 'Leading Force' Behind Stuxnet." NPR. NPR, 26 Sept.
2011. Web. 28 Sept. 2015. <http://www.npr.org/2011/09/26/140789306/securityexpert-u-s-leading-force-behind-stuxnet>.
Greenemeier, Larry. "Here's What a Cyber Warfare Arsenal Might Look Like." Scientific
American Global RSS. Scientific American, 6 May 2015. Web. 28 Sept. 2015.
<http://www.scientificamerican.com/article/here-s-what-a-cyber-warfare-arsenalmight-look-like/>.
20
CSTD
PACMUN 2015
"The History of Cyber Attacks - a Timeline." NATO Review. NATO, n.d. Web. 28 Sept. 2015.
<http://www.nato.int/docu/review/2013/cyber/timeline/EN/index.htm>.
Holden, Dan. "Is Cyber-Terrorism the New Normal?" Wired.com. Conde Nast Digital, n.d.
Web. 28 Sept. 2015. <http://www.wired.com/2015/01/is-cyber-terrorism-the-newnormal/>.
"How Does Cyber Warfare Work?" Forbes. Forbes Magazine, 18 July 2013. Web. 28 Sept.
2015. <http://www.forbes.com/sites/quora/2013/07/18/how-does-cyber-warfarework/>.
"Internet World Stats." Internet World Stats. Miniwatts Marketing Group, n.d. Web. 28 Sept.
2015. <http://www.internetworldstats.com/>.
"The Invention of the Internet." History.com. A&E Television Networks, n.d. Web. 28 Sept.
2015. <http://www.history.com/topics/inventions/invention-of-the-internet>.
Kang, Tae-jun. "South Korea Beefs Up Cyber Security With an Eye on North Korea." The
Diplomat. The Diplomat, 1 Apr. 2015. Web. 28 Sept. 2015.
<http://thediplomat.com/2015/04/south-korea-beefs-up-cyber-security-with-an-eye-onnorth-korea/>.
"Kaspersky Lab Identifies Operation "Red October," an Advanced Cyber-Espionage Campaign
Targeting Diplomatic and Government Institutions Worldwide." Kaspersky Lab.
Kaspersky Lab, 14 Jan. 2013. Web. 28 Sept. 2015.
<http://www.kaspersky.com/about/news/virus/2013/Kaspersky_Lab_Identifies_Opera
tion_Red_October_an_Advanced_Cyber_Espionage_Campaign_Targeting_Diplomatic_a
nd_Government_Institutions_Worldwide>.
Krasavin, Serge, Dr. "What Is Cyber-terrorism?" Computer Crime Research Center. Computer
Crime Research Center, 2002. Web. 28 Sept. 2015. <http://www.crimeresearch.org/library/Cyber-terrorism.htm>.
"Latin America Cyber Security Market Research Report." Micromarket Monitor.
MicroMarketMonitor, n.d. Web. 28 Sept. 2015.
<http://www.micromarketmonitor.com/market/latin-america-cyber-security2019134744.html>.
"Latin American and Caribbean Cybersecurity Trends and Government Responses."
Organizations of American States (2013): n. pag. Trend Micro Incorporated. Trend Micro
Incorporated, 2013. Web. 28 Sept. 2015. <http://www.trendmicro.com/cloudcontent/us/pdfs/security-intelligence/white-papers/wp-latin-american-and-caribbeancybersecurity-trends-and-government-responses.pdf>.
21
CSTD
PACMUN 2015
Lee, Dave. "'Red October' Cyber-attack Found by Russian Researchers." BBC News. BBC
News, 14 Jan. 2013. Web. 28 Sept. 2015. <http://www.bbc.com/news/technology21013087>.
McSorley, Anita. "Seven Things You Need to Know about the EBay Cyber-attack."
Independent.ie. Independent.ie, 24 May 2014. Web. 28 Sept. 2015.
<http://www.independent.ie/business/technology/seven-things-you-need-to-knowabout-the-ebay-cyberattack-30301233.html>.
Nakashima, Ellen, Greg Miller, and Julie Tate. "U.S., Israel Developed Flame Computer Virus
to Slow Iranian Nuclear Efforts, Officials Say." Washington Post. The Washington Post,
19 June 2012. Web. 28 Sept. 2015. <https://www.washingtonpost.com/world/nationalsecurity/us-israel-developed-computer-virus-to-slow-iranian-nuclear-efforts-officialssay/2012/06/19/gJQA6xBPoV_story.html>.
New Zealand's Cyber Security Strategy. Wellington, N.Z.: Ministry of Economic Development,
2011. New Zealand Government. New Zealand Government, June 2011. Web. 28 Sept.
2015. <http://www.dpmc.govt.nz/sites/all/files/publications/nz-cyber-securitystrategy-june-2011_0.pdf>.
Nitta, Yoko. "Japan's Approach Towards International Strategy on Cyber Security
Cooperation." (n.d.): n. pag. Japan Science and Technology Agency. Research Institute of
Science and Technology for Society. Web. 28 Sept. 2015.
<http://lsgs.georgetown.edu/sites/lsgs/files/Japan_edited%20v2.pdf_for_printout.pdf>.
"Our Services." Cyber Security Africa. Cyber Security Africa, n.d. Web. 28 Sept. 2015.
<http://www.cybersecurityafrica.com/services.html>.
"Overview of NISC's Activities." National Center of Incident Readiness and Strategy for
Cybersecurity. National Center of Incident Readiness and Strategy for Cybersecurity, n.d.
Web. 28 Sept. 2015. <http://www.nisc.go.jp/eng/>.
Parks, Miles. "Target Offers $10 Million Settlement In Data Breach Lawsuit." NPR. NPR, 19
Mar. 2015. Web. 28 Sept. 2015. <http://www.npr.org/sections/thetwoway/2015/03/19/394039055/target-offers-10-million-settlement-in-data-breachlawsuit>.
Rueters, San Francisco. "New York Times, Twitter Hacked by Syrian Group." The Daily Star.
DISQUS, 28 Aug. 2013. Web. 28 Sept. 2015.
<http://archive.thedailystar.net/beta2/news/new-york-times-twitter-hacked-by-syriangroup/>.
Saeed, Muhammad Arif, and Muhammad Anum Saleem. "Cyber Security and Data Privacy Law
in Saudi Arabia." Financier Worldwide. Financier Worldwide Ltd., Apr. 2015. Web. 28
22
CSTD
PACMUN 2015
Sept. 2015. <http://www.financierworldwide.com/cyber-security-and-data-privacy-lawin-saudi-arabia/#.VgmoWHpVhBd>.
"Should There Be an International Treaty on Cyberwarfare?" US News. U.S. News & World
Report, n.d. Web. 28 Sept. 2015. <http://www.usnews.com/debate-club/should-therebe-an-international-treaty-on-cyberwarfare>.
Sonneland, Holly K. "Mexico City 2015 Blog: The State of Cybersecurity." Americas
Society/Council of the Americas. Americas Society/Council of the Americas, 13 May 2015.
Web. 28 Sept. 2015. <http://www.as-coa.org/blogs/mexico-city-2015-blog-statecybersecurity>.
Timberg, Craig. "These Hackers Warned the Internet Would Become a Security Disaster.
Nobody Listened." Washington Post. The Washington Post, 22 June 2015. Web. 28 Sept.
2015. <http://www.washingtonpost.com/sf/business/2015/06/22/net-of-insecuritypart-3/>.
Touré, Hamadoun I., Dr. Cybersecurity: Global Status Update. N.p.: Essential Library, 2015. UN.
UN, Dec. 2011. Web. 28 Sept. 2015.
<http://www.un.org/en/ecosoc/cybersecurity/itu_sg_20111209_nonotes.pdf>.
"UN." CCDCOE. N.p., 09 June 2014. Web. 28 Sept. 2015. <https://ccdcoe.org/un.html>.
"UN Official: Cyberwar Is a Reality the World Must Fight." Raw Story. N.p., 15 July 2015.
Web. 28 Sept. 2015. <http://www.rawstory.com/2013/07/un-official-cyberwar-is-areality-the-world-must-fight/>.
"UNODA - Developments in the Field of Information and Telecommunications in the Context
of International Security." UN News Center. UN, n.d. Web. 28 Sept. 2015.
<http://www.un.org/disarmament/topics/informationsecurity/>.
"The Use of the Internet for Terrorist Purposes." (2015): n. pag. United Nations Office on Drugs
and Crime. United Nations Office on Drugs and Crime, Sept. 2012. Web. 28 Sept. 2015.
<https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purpos
es.pdf>.
Watts, Susan. "Proposal for Cyber War Rules of Engagement." BBC News. BBC, 03 Feb. 2011.
Web. 28 Sept. 2015.
<http://news.bbc.co.uk/2/hi/programmes/newsnight/9386445.stm>.
Weimann, Gabriel. Cyberterrorism: How Real Is the Threat? Washington, D.C.: United States
Institute of Peace, 2004. United States Institute of Peace. United States Institute of Peace,
Dec. 2004. Web. 28 Sept. 2015. <http://www.usip.org/sites/default/files/sr119.pdf>.
23
CSTD
PACMUN 2015
Wolter, Detlev. "Arms Control Today." Arms Control Association. Arms Control Association,
Sept. 2013. Web. 28 Sept. 2015. <https://www.armscontrol.org/act/2013_09/The-UNTakes-a-Big-Step-Forward-on-Cybersecurity>.
Zetter, Kim. "An Unprecedented Look at Stuxnet, the World’s First Digital Weapon."
Wired.com. Conde Nast Digital, 3 Nov. 2014. Web. 28 Sept. 2015.
<http://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/>.
24
Download