UNODC Background Guide SWCHSMUN 2012

advertisement
SWCHSMUN 2012
UNODC Background Guide
Sir Winston Churchill HSMUN Conference
SWCHSMUN 2012
Table of Contents
Current Membership in the UNODC ……………………………………………………………………….Page 3
Committee History …………………………………………………………………………………………………Page 3
Topic 1: Latin American Drug Trafficking ………………………………………………………………..Pages 3-5
Topic 2: Opium in Afghanistan ……………………………………………………………………………….Pages 6-11
UNODC Background Guide | SWCHSMUN 2012
Topic 3: Combating Digital Crime …………………………………………………………………………..Pages 12-20
2
Current Membership in the UNODC
Colombia
Republic of the Congo
Denmark
France
Ghana
Guatemala
India
Iran
Israel
Italy
Japan
Laos
Mexico
Myanmar
Namibia
Netherlands
Peru
Poland
Romania
Russia
Saudi Arabia
Sierra Leone
South Korea
Spain
Swaziland
Turkey
United Kingdom
United Republic of Tanzania
United States
Committee Description
The United Nations Office on Drugs and Crime (UNODC) was formed in 1997 by combining the United
Nations Drug Control Program and the Center for International Crime Prevention to better tackle the
interdependent issues of drug trafficking and organized crime. Building off the goals of the previous
organizations, the UN Office on Drug and Crime acts as the chief opponent of “uncivil society,” tackling
the difficult topics of global terrorism, organized crime, human trafficking, money laundering,
corruption, and illicit drug trade.
The UNODC functions as a multifaceted UN agency, headquartered at the United Nations Office in
Vienna and spilling into 21 field offices across the world. Despite its complex organization, the UNODC
is tied together under the control of the Executive Director, a position currently filled by Italian native
Antonio Maria Costa. As the issues UNODC deals with become more globally integrated, the UNODC
has focused on multilateral strategies that are country or region-specific. At SWCHSMUN 2012 the
office will attempt to function as closely to the real UNODC as possible, and thus will call upon
delegates to put together region-specific solutions derived from the office’s three core tenets:
organizing specific
fieldwork, increasing the amount of research and understanding on drug and crime-related problems,
and finally, helping governments ratify international agreements and draft domestic legislation
relevant to these issues. Delegates will be able to draft resolutions on specific global UNODC initiatives
in addition to policy memos to other United Nations organizations. Measures passed in this committee
should have an intimate knowledge of the issues at hand, exhibit collaboration with other nations in
the committee, and involve creative methods of addressing this year’s topics. The UNODC handles
some of the most sensitive global issues, and delegates should be prepared to research and discuss
what can often be uncomfortable subjects.
Topic 1: Latin American Drug Trafficking
Background Information
The Latin American drug trade throughout history has reaped a major impact on not only Central,
South and North American countries, but also regions such as Europe, Asia, and Africa. Currently, the
modern market of drug trade has converted its organizational standards into significantly smaller
branches that are more specialized and are responsible for a specific aspect in the trade, as opposed to
the larger “drug lord” cartels that were seen up to the 1970s. They have also been able to form new
and constantly changing trafficking routes in order to be able to export the drugs to the location of the
highest demand. Because of the downsizing of these organizations and continually changing paths, it
has become a struggle to effectively detect and eliminate them.
UNODC Background Guide | SWCHSMUN 2012
Afghanistan
Algeria
Australia
Austria
Belarus
Bolivia
Brazil
Cameroon
Canada
Chile
3
The three major cocaine producers in the world remain to be Colombia, Peru, and Bolivia which is
largely known as the Andean region of Latin America. This area alone has been able to produce 750
tons of cocaine, which are shipped to various places around the world. This multi-billion pound
industry in Latin America has increased 16% due to increases in supply and demand. Marijuana, heroin,
and opium are also a main source of revenue towards drug trafficking in Latin America, spanning
through the countries of Paraguay, Mexico and Colombia.
In 2008 almost 6,000 people died in Mexico alone due to drug related violence demonstrating that the
Latin American drug trade plays a major role in the political, social and economic matters in this region.
Colombia, as well as other Latin American countries, are highly influenced and corrupt through major
drug cartels and organizations, which often leads to continuous money laundering throughout the
world.
Possible Solutions
While researching drug trafficking in Latin America, delegates should take a multi- faceted approach to
this problem. It is very important to be able to understand drug trade and despite being located and
concentrated in Latin America, affects the entire world. The drug trade involves several aspects not just
smuggling, for example several aspects that would influence this issue would include, the various types
of drugs being smuggled from marijuana to synthetic drugs, addiction, money laundering, organized
crime, gang activity and violence.
Because this is such a diverse topic, possible solutions must be able to cover the multiplying effects of
drug trafficking. There have been many efforts being pursued by the
UNODC and Latin American Governments to attempt to control this pressing issue such as, “Products
for Peace” which focuses on prevention and the use of alternative development in the cultivation of
crops that have been proven to be able to produce illegal drugs like the poppy and coca plant. Many of
the people who are growing and producing these illegal substances are poor farmers who are unable to
support themselves without the economic benefits of these products. Alternative development is an
option, but one must analyze the use of microfinance and sustainable development programs in
conjunction. Border control with the help of joint task forces have been proven to successfully halt
some drug trafficking between neighbouring states and countries. Drug Trafficking is made up of
multiple different problems and solutions should be diverse and address each aspect of this issue.
UNODC Background Guide | SWCHSMUN 2012
United Nations Involvement
In the mission of attempting to control drug trade in Latin America, the United Nations has
been the main organization in eliminating and spreading awareness about this persistent problem.
The UNODC was founded as a UN organ in 1997, when both the United Nations Drug Control Program
and International Crime Prevention combined. This specific organization is now “mandated to assist
Member States in their struggle against illicit drugs, crime and terrorism”. The three main sub- groups
or pillars of the UNODC are field based projects, research work in order to increase understanding on
drug and crime issues as well as to, aid States in the passing of treaties and other legislation in regards
to drugs, crime, and terrorism. Because of the formation of the UNODC and its three pillars the United
Nations has been successful in several different projects in Latin American to reduce drug trafficking.
These projects include the development in drug rehabilitation, improvement of information exchange,
crop monitoring systems, and alternative development programs.
Major Treaties and deals held in effect of the UNODC include Convention against the Illicit Traffic in
Narcotic Drugs and Psychotropic Substances and the 1961 Single Convention on Narcotic Drugs, the
1971 Convention on Psychotropic Substances. In coordination with the International Narcotics Control
Board, the UNODC has been able to release several annual World Drug Reports that map out certain
trends in drug abuse and trafficking.
4
Bloc Positions
 European/Western: Western nations are always and will be continually concerned about the
issue of the growing illicit drug trade market, because for many of these cartels, these
organizations are targeting these countries for revenue. Look back at past treaties and other
actions these nations have taking and weather is has been helpful in the past or not.
 Latin America: Many Latin America countries will have very strong position regarding drug trade
because this issue directly involves them. For this position it is especially important to look at
what the countries policies are in regards to what the certain country has actually done to
prevent or in some cases encourage drug trafficking. This certain issue will be highly focused on
these countries.
 Middle East/Asia/Africa: Having many drug issues themselves most Middle East, African, and
Asian nations will be able to relate to the crisis that Latin America in today. Because their lack of
many resources many countries in this region are still experiencing difficulties in combating
their own drug problem. Be able to look back into that past and see what actions the United
Nations has been able achieve and certain problems or precautions as a result of them. Also
look for certain organizations that have been successful in your country that would the
applicable the drug trafficking in Latin America.
Questions to Consider:
 What drugs are targeted as marketable drugs? And in the case of alternative crops what would
also still be economically viable?
 What other countries and people are involved with Latin American drug trafficking?
 What are some of the illegal effects that are usually associated with drug trade?
 What has the United Nations done in a helpful sense? Prevention, combating, awareness, and
recovery?
Bibliography:
 http://www.unodc.org/unodc/en/illicit-drugs/index.html
The UNODC’s view on the world’s illicit drugs and their prevention.

https://www.cia.gov/library/publications/additional-publications/heroin-movementworldwide/latin-america.html
A short summary of all of the various illicit drug and the problems the cause in Latin America.
 http://www.economist.com/world/americas/displaystory.cfm?story_id=11294435
A history of major drug trafficking trends specifically in the Andean area.
UNODC Background Guide | SWCHSMUN 2012
 http://www.unodc.org/unodc/en/press/releases/2008-06-18.html
A survey yielding results regarding the production of cocoa.
5
Topic 2: Opium in Afghanistan
Background Information
UNODC Background Guide | SWCHSMUN 2012
Opium has been rooted into the Afghanistan culture since 3400 B.C. when it was first cultivated in
lower Mesopotamia. It has spread to all provinces in Afghanistan, making it the largest producer of
illicit opium in 1999. Opium’s major exporters reside in the “Golden Crescent”, which is comprised of
Afghanistan, Pakistan and Iran. Strict eradication campaigns in Pakistan and Iran have caused the
production of opium to drop, leaving Afghanistan as the sole provider of the drug. The nation of
Afghanistan currently provides 75 percent of global opiates. Due to Afghanistan’s reliance on the drug
as a major export, opium has affected the state, society, economy and politics.
Many people around the world feel that opium and the poppy flower is a curse, but the farmers in
Afghanistan view it as a godsend. Approximately 1.7 million people are involved in opium production in
Afghanistan, including twenty-eight provinces. Many surveys have shown that rural farmers are
choosing the opium poppy as a commodity due to long war and drought. The UNDP reported that the
country is the second poorest nation in the world. In 2003, the value of opium production was $2.3
billion dollars which represents more than half of Afghanistan’s legal GDP. Also, the raw value of opium
is several times higher than normal crops. Even though opium production was deemed illegal in the
1988 “United Nations Convention against Illicit Traffic in Narcotic Drugs”, farmers still produce the drug
because it is the only way for them to make a living.
Production of opium in Afghanistan has been associated with insurgency and corruption. Thirty years
of conflict in Afghanistan has embedded the opium trade into the culture of the local people. The drug
trade has played a significant role in corrupting the government and police and promoting the
restoration of the Taliban. This organization is mostly run by closely knit families and villages, making it
very difficult to infiltrate. These insurgents then work with corrupt government officials for the purpose
of solely gaining a profit. The Taliban has focused their opium production in south-west Afghanistan.
The profit made by the production of opium has helped to fund Taliban restoration and military
operations.
6
Map 1: Security Map (as of 30 March 2011) and Opium Cultivation in Afghanistan by Province, 2010
UNODC Background Guide | SWCHSMUN 2012
Map 2: Seizures of Heroin and Morphine, 2009 (countries and territories reporting seizures* of more
than 10 kg)
7
Addicts smoke heroin in a destroyed building in Herat on October 17, 2011. Ten years after the 2001 American
invasion to drive the Taliban from power, Afghanistan still produces 90 percent of the world's illegal opium,
funding the insurgency despite an expensive Western eradication program. (Aref Karimi/AFP/Getty Images)
UNODC Background Guide | SWCHSMUN 2012
Police officers from the district of Ar Gul, swing away with long sticks to eradicate a patch of illegally grown
opium poppies in the Badakhshan province of Afghanistan on July 16, 2009. In 2007, opium - the raw ingredient
used to make heroin - was grown on nearly half a million acres in Afghanistan, the largest illegal narcotics crop
ever produced by a modern nation. A government crackdown on poppy cultivation has spelled economic
disaster for many communities throughout the country. (AP Photo/Julie Jacobson)
8
UN Involvement
The increase in opium production has caused the United Nations to start cracking down on opium
producers. The UNODC released the Afghan Opium Survey on September 2, 2009. In the report it
stated, “The bottom is starting to fall out of the Afghan opium market”. The report also mentioned that
the growth of poppy plants in Afghanistan is slowly decreasing thanks to counter-narcotics operations
by NATO and the Afghan government.
The United Nations has created several multi-faceted resolutions that have been put into effect.
Resolution 59/161 was written on February 8, 2005. Its main objective was to implement the action
plan that was created in Kabul at the “International Counter-Narcotics Conference on Afghanistan”.
Resolution 2005/24 urged the utilization of the “Counter-Narcotic Implementation Plan,” which is
comprised of “Building counter-narcotic institutions and provincial structures, increasing the
awareness of the Afghan population about the problems and threats emanating from the illicit
cultivation of opium poppy and the production of and trafficking in illicit narcotic drugs, provision of
alternative livelihoods and creation of the national development budget and the counter-narcotic trust
fund to provide financial support, interdiction and elimination of heroin-manufacturing, laboratories
through the national anti-narcotic police force…”
In February 2004, the UNODC hosted an “International Counter Narcotics Conference on Afghanistan”.
The main goal of the conference was to achieve awareness that opiate-based drugs are the central
concern for the country. The conference also focused on increasing international support by
acknowledging the difficulties that Afghanistan faces while trying to combat drug production and
trafficking.
The problem of opium in Afghanistan requires comprehensive solutions. One way to tackle the
problem would be to transition to another type of crop. For instance, saffron is an ideal new crop for
Afghanistan. In an effort to destroy opium production, international groups along with the Afghan
government have been distributing saffron bulbs to farmers along the border of Iran. Farmers have
stated that the saffron is more profitable due to the increase demand. The price of saffron has nearly
doubled, reaching almost $1,360 per pound. Saffron has also many functional uses such as a spice,
fabric dye, perfume, and as a possible cancer suppressant. Since 2004, the United States of America’s
Agency for International Development (USAID) has been providing saffron bulbs and supplies to
farmers in the Herat province.
The topic of opium licensing has come up in many UN discussions. An opium licensing system will allow
licensed farmers to grow the opium poppy for medicinal drugs, such as morphine and codeine. This
program will use the Afghan Counter Narcotics law as a basis for the creation of the system structure.
Currently, the United States, Australia, Canada, France, Japan and the United Kingdom consume eighty
percent of all opiate-based products. There is a market in third world countries that do not have access
opium products. The creation of a Public Private Partnership between a pharmaceutical company and
the government of a third-world country would not impede upon other market countries, such as
Turkey and India. This will also make the medicine more affordable to poorer nations that are fighting
AIDs epidemics and other diseases.
The Illicit Crop Monitoring Program will assist farmers in the implementation of other types of cash
crops such as saffron. The monitoring program will be paired up with the Food and Agricultural
Organization, which will determine alternative crops that are viable in the specific area. It will ensure
UNODC Background Guide | SWCHSMUN 2012
Possible Solutions
9
that the specific cash crop fits the climate, geography and market. Overall, with the help of the UNODC,
we can usher in a new era where farmers do not have to rely on illicit crops to make a living.
Sarab village resident and opium addict Islam Beg offers his opium pipe to his grandson in the Badakhshan
province of Afghanistan on July 13, 2009. (AP Photo/Julie Jacobson)
European Union: Many members of the EU feel that Afghanistan is the main supplier of opium. They
also realize that much of the heroin on their streets originated in Afghanistan. Therefore, countries
such as the United Kingdom feel that it is in their best interest to stop the opium trade. Many of these
member countries also agree that “alternative development” is having very little impact due to the
widespread poverty and destruction.
Asian Bloc: The members of the Asian Bloc feel that the opium trade is detrimental to the international
community. Countries such as China believe in anti-drug campaigns to rid Afghanistan of their drug
problem.
Questions to Consider:
 Who directly benefits from the production of illicit opium products? What types of illegal crime
can directly be funded from the sales of illicit opium?
 How does opium and illegal drug trafficking effect the political and economical sectors of
Afghanistan? What incentives are there for farmers to switch from opium to another cash crop?
UNODC Background Guide | SWCHSMUN 2012
Bloc Positions
Western Bloc: Members of the Western Bloc agree that the opium produced in Afghanistan can be
directly traced to terrorist activities. The bloc strongly feels that the United States is justified in the
eradication of opium fields because it directly finances Taliban activity.
10

How is it that the farmers receive so little from illicit drugs, even though the cost of opium is
considerably higher? What does this show about the structure of the society?
Bibliography:
http://www.unodc.org/documents/cropmonitoring/Afghanistan/Afghanistan_opium_survey_2009_su
mmary.pdf
Afghanistan Opium Survey 2009- The survey describes the effect of opium on the economy and
political system.
http://siteresources.worldbank.org/SOUTHASIAEXT/Resources/Publications/4488131164651372704/UNDC_Ch1.pdf -Provides an overview and introduction to opium in Afghanistan.
http://www.usip.org/files/resources/taliban_opium_1.pdf -Describes how opium benefits the Taliban.
UNODC Background Guide | SWCHSMUN 2012
http://www.nytimes.com/2008/07/27/magazine/27AFGHAN-t.html?_r=3&pagewanted=2&hp –
Compares and contrasts Afghanistan to other countries and tries to establish if it is a narco-state.
11
Cyber Crime
Internet-related crime is a very contemporary issue; the Internet has only started to become widely
accessible in the last fifteen years. As a result of this, the international response has been much slower
as it is oftentimes difficult to even fully define the problem, let alone articulate laws to combat it. For
the sake of avoiding unnecessary semantics within the United Nations Office on Drugs and Crime
(UNODC), the body will attempt to categorize digital crime into three categories: crimes that target
computer networks or devices directly for personal gain (Cyber Crime); crimes facilitated by
computers or networks, targeting a third party that is independent of the device or network (Cyber
Terrorism). A third category of Internet-related crime does exist but focuses on the exploitation of
children through pornography and child grooming (sexual solicitation of children by adults). Though
serious, this last category falls more under the jurisdiction of other UN bodies and is being addressed
independently of the UNODC. Cyber Crime, for UNODC purposes, will refer to examples of crimes that
primarily target networks or devices in and of themselves. These crimes typically tend to be less
destructive than acts of cyber terrorism as they usually target just one, or a small group of individuals
via a single computer or network, thus victimizing only those using the affected computer or network.
While Cyber Crime is not to be taken lightly, it is decidedly less dangerous than its counterpart,
Cyberterrorism. Typically, the aim of Cyber Crime is little more than small personal gain, the crimes
tend to victimize individuals rather than governments or nations and in a way Cyber Crime may be
harder to keep tabs on and stop than Cyberterrorism as a result of its smaller, less ambitious nature
and the ease with which cyber criminals may operate.
Examples of Cyber Crime would include: malware; computer viruses; denial of service attacks; fraud
and identity theft; and phishing scams. Malware is short for malicious software and is designed to
infiltrate a computer system without the informed consent of that system’s owner. The terminology is
used to refer to a variety of forms of the aforementioned software such as viruses, worms, Trojan
horses, spyware, dishonest adware and crimeware. Malware is the element that typically enables all
other forms of cyber crime as it is what physically attacks the computer itself and enables further
crimes to be committed.
Crimeware is software that is designed to specifically automate cyber crime. This form of malware
perpetrates identity theft in order to access a computer user's online financial services accounts and
payment information from online retailers for the purpose of taking funds from those accounts or
completing unauthorized transactions that benefit the programmer controlling the crimeware.
Viruses, worms and Trojan horses are actually fairly similar in their aims though their methods differ.
Virus is a term oftentimes erroneously given to all malware-related computer issues, but a true virus
has no reproductive ability and must be spread from one computer to another via some form of
executable code. A virus needs a host, typically some type of file or directory and in order to be spread
that file or directory needs to be carried over to the target computer via a floppy disk, CD, DVD, USB
UNODC Background Guide | SWCHSMUN 2012
Topic 3: Combating Digital Crime
Introduction
With the worldwide proliferation of the Internet, countries face a new and constantly changing
problem in Internet-related crime. The ramifications and difficulties in combating Internet-related
crime are much more nuanced than they may appear at first blush. The problem extends well past the
lighter examples such as the American recording industry’s battle against pirated music or Twitter’s
battle with Iranian cyberterrorists. Rather, as the world transitions to an increasingly digital model that
sees larger amounts of sensitive information, intelligence and national and international
communication utilizing the Internet, security becomes an integral issue.
12
Digital Piracy/Copyright Infringement
There are other examples of cyber crime as well, though in these instances the international
repercussions may be less than the issues posed to individual countries, for instance, copyright
infringement. In a way, copyright infringement serves as a microcosm for the entire issue of cyber
crime. The parties victimized by copyright infringement are typically individuals and businesses, mostly
authors, musicians and those associated with television and motion pictures. Despite international
copyright laws, however, the parties responsible for the dissemination of copyrighted materials are
often located in countries without strict laws and restrictions on Internet activities. Countries in Eastern
Europe and former Soviet states are some of the biggest digital offenders, serving as a safe haven for
UNODC Background Guide | SWCHSMUN 2012
drive or (as has become more problematic recently) it can now be sent over the Internet. Viruses
almost always cause some form of damage, though sometimes it is negligible if noticeable at all;
typically it is limited to just the corrupting or modifying of files, programs or directories
on a given computer.
A worm acts in much the same way as a virus, only it needs no host file. Rather, a worm is a selfreplicating program that uses a network to send copies of itself to other computers on that network
without any intervention. Worms almost always cause some sort of harm to the network, even if just
by consuming bandwidth. A Trojan horse is a non-self-replicating malware that appears to perform a
desirable function for the computer user but instead offers unauthorized access to the user's computer
system.
The many forms of aforementioned malware, as well as many undefined (in this guide), examples are
the tools through which other cyber crime can be committed, acts such as identity theft, fraud,
phishing scams and denial of service attacks. As has been previously stated, crimeware, Trojan horses
and other malicious software can be used to steal identities, gain access to financial resources and
commit various acts of fraud. Likewise, phishing is used to much the same end as crimeware and Trojan
horses, but rather than taking the form of malware it takes the form of a website, email or in some
cases instant message that resemble the look and feel of an established business or institution but
serve only to steal an individual’s information, passwords or credit card information when entered.
While these attacks may victimize one individual or several across a network, the ramifications of these
acts can be much further reaching. Fraudulent transactions have effects on not only the victims of the
identity theft but also presents issues for banks and businesses and serves to drain resources from
government and police bodies that must then investigate (typically without much success) the crimes.
Another form of Cyber Crime is a Denial of Service attack. As of this point in time, Denial of Service
(DoS) attacks still constitute cyber crime rather than cyberterrorism but the distinction is becoming
increasingly less defined. A DoS attack is an attempt to make a computer resource unavailable to its
intended users. Although the means to carry out, motives for, and targets of a DoS attack may vary, it
generally consists of the concerted efforts of a person or people to prevent an Internet site or service
from functioning efficiently or at all, temporarily or indefinitely.
The most recent example of such an act was the December 2009 hacking of the Internet site Twitter by
a self-proclaimed group of Iranian terrorists. The attack was especially pertinent as a result of Twitter’s
influence during the conflict over the Iranian elections in June 2009, but the aims and intentions of the
group attacking the site arguably fell more in line with terrorist objectives than with those of a cyber
criminal. While DoS attacks have traditionally fallen in line more with the objectives of cyber criminals
in the past, it is worth noting that as the world transitions to a more internet reliant model such attacks
also serve terrorist interests by undermining integral government servers and making necessary
services that had been made available through the internet inaccessible to large portions of a country’s
population. As of now, DoS attacks straddle the line between acts of cyber crime and acts of
cyberterrorism.
13
Digital Drug Trafficking
Drug traffickers are increasingly taking advantage of the Internet to sell illegal substances through
encrypted e-mail and other Internet Technology. Some drug traffickers arrange deals at Internet cafes,
use courier Web sites to track illegal packages of pills, and swap recipes for amphetamines in
restricted-access chat rooms.
UNODC Background Guide | SWCHSMUN 2012
hackers and those partaking in digital crime.
The issue of digital piracy of copyrighted materials is a fairly divisive one. Groups like the Recording
Industry Association of America (RIAA) as well as various watch-dog organizations and artistic groups in
mostly Western nations tend to paint the issue as one of the more grievous crimes being committed
across the internet. But despite the somewhat disruptive ramifications and the economic damage it
does, a good portion of the world feels that the problem is not large enough to merit exceedingly large
international attention. The problem is two-fold: the victimized parties tend to be a fairly wealthy
subset of people in Western countries and the means through which copyrighted materials are
circulated are not always clearly understood, clearly illegal or in a position to be well legislated
or regulated. For instance, the BitTorrent (oftentimes referred to simply as a torrent, BitTorrent also
refers to a specific torrent client as well) is a commonly used Peer to Peer (P2P) method of
downloading files and information and is commonly used to pass along copyrighted materials. The
BitTorrent is one of the most common protocols for transferring large files, and it has been estimated
that it accounts for approximately 27-55% of all Internet traffic (depending on geographical location) as
of February 2009. The issue with torrent files, however, is that they do not contain the actual copyright
information but rather serve more as a map or instruction manual for downloading smaller bits of the
file from other individuals and then reconstructing said file on the machine.
The BitTorrent protocol allows users to disseminate only a piece of a file in conjunction with other
users that have other complementary pieces. The result is that individuals can download files rapidly
without drastically reducing bandwidth. One of the other side effects is that as a result of the
incomplete pieces of copyright material being sent, it is difficult to prosecute for copyright
infringement. Whereas older P2P servers and other methods saw a more singular transfer where one
individual computer was sending one file to another computer, these transfers occur across numerous
machines and networks. The question of whether individual pieces of a copyrighted file still bear the
same restrictions as whole copyrighted files has been an issue in addition to the fact that the torrent
file itself is not, in and of itself, a violation of copyright laws but rather a set of directions for a
computer on how to break the law. In addition, the technology is also used for legal activities as well.
As such, making the protocol illegal (as some have suggested) would be highly impractical in addition to
infringing on the rights of individuals who utilize the technology for just purposes.
In addition to the technical issues, there are problems with the locations of copyright violators. Many
offending parties are located in states where laws regulating the use of the internet are either years
behind more developed nations or even purposely set up in a way to allow for such activities. As
mentioned above, countries in Eastern Europe, former Soviet states and an increasing number of
Middle Eastern states are seeing a spike in illegal activity on the internet, not just limited to copyright
infringement.
For the purposes of the UNODC, the committee will focus on only certain issues with regard to
copyright infringement. The committee will focus on conditions that foster the practice (in addition to
other illegal internet activities) but the practice itself is outside the scope of the UNODC and may be
left to individual governments and other agencies to police. Rather, the UNODC is interested in other
forms of Digital Crime that endanger a greater portion of the international community, not the pockets
of a select group of wealthy artists.
14
The rise in Internet drug trades could also be attributed to the newfound ability to eliminate face-toface communication. These virtual exchanges exude a safer environment for the transactions that may
entice otherwise disinclined individuals to more comfortably purchase illegal drugs. The more criminal
effects that are often associated with drug trades are severely minimized and the filtering process that
comes with physical interaction fades away. Furthermore, drug recipes (such as those meant for
making methamphetamines and other similar chemical drugs) were carefully kept secrets. But with
modern computer technology, this information is now being made available to anyone with computer
access.
Examples of Cyber-Terrorism
One of the biggest issues in the battle against digital crime, specifically with regard to Cyber Terrorism,
is the lack of documented methodology in performing a digital attack. As a result, portions of the
international community and proponents of less stringent internet restrictions have made the claim
that cyber terrorism is more an issue of hype than of legitimate threat. While this opinion has not been
widely adopted by the international community, it does still serve to undermine the issue in much the
same way as the dissenting opinion on man-made environmental change manages to muddy that
debate.
Recent examples of Cyber Terror are numerous, though the ramifications of each act range in terms of
degree of severity. Over a decade ago in 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies
with 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers
and we're doing this to disrupt your communications." Intelligence authorities characterized it as the
first known attack by terrorists against a country's computer systems.
Also in 1998, one of the first successful Cyber attacks was performed when Spanish protestors
bombarded the Institute for Global Communications (IGC) with thousands of bogus e-mail messages. Email was tied up and undeliverable to the Internet Service Provider’s (ISP) users, and support lines
were tied up with people who couldn't get their mail. The protestors also spammed IGC staff and
UNODC Background Guide | SWCHSMUN 2012
Cyber Terrorism
Cyber terrorism is a distinction given to acts that utilize a computer or network to attack a third party.
There are known examples of cyber terrorism, but much like with cyber crime and all forms of digital
crime as the internet evolves, the methods and creativity of digital crime continues to evolve with it.
The definition of cyber terrorism as given by Kevin G. Coleman of the Technolytics Institute is “the
premeditated use of disruptive activities, or the threat thereof, against computers and/or networks,
with the intention to cause harm or further social, ideological, religious, political or similar objectives.
Or to intimidate any person in furtherance of such objectives.”
Coleman’s definition fits in with the UNODC-prorposed categorization of cyberterrorism, acts such as
the previously mentioned attack on Twitter by Iranian cyberterrorists are meant more to undermine a
site and cause general panic than to cause any sort of actual damage (besides a negligible hit to ad
revenues) but acts of cyber-terrorism targeting larger more integral servers and computers could
potentially yield nightmarish results.
Currently, the UN response to Cyber Terrorism has been lacking and any response from the
international community has been mostly limited to Western countries. The Secretary of State for the
United States, Hillary Clinton, recently called upon the North Atlantic Treaty Organization (NATO) to
formalize a plan to combat cyberterrorism, but much like the rest of the international response, the
member states of NATO lack regional influence to combat digital crime at its site. In order to fully
engage the issue, the entire international community must come together, as unlike many other
issues that face the world, even the smallest of countries can have a major role in regard to Internetrelated crime.
15
UNODC Background Guide | SWCHSMUN 2012
member accounts, clogged their Web page with bogus credit card orders, and threatened to employ
the same tactics against organizations using IGC services. They demanded that IGC stop hosting the
Webs site for the Euskal Herria Journal, a New York-based publication supporting Basque
independence. Protestors said IGC supported terrorism because a section on the Web pages contained
materials on the terrorist group ETA, which claimed responsibility for assassinations of Spanish political
and security officials, and attacks on military installations. IGC finally relented and pulled the site
because of the "mail bombings."
In 1999, an act of cyber terror occurred against NATO computers. The computers were flooded with
email and hit with a denial of service (DoS) attack. The hackers were protesting against the NATO
bombings in Kosovo. Businesses, public organizations and academic institutions were bombarded with
highly politicized emails containing viruses from other European countries.
In 2000, the first documented use of malware as several worms were released that took advantage of
holes in Microsoft operating systems, though the first truly dangerous worms failed to materialize until
2003 when a worm called the Slammer (a.k.a. Sapphire) worm infected thousands of consoles in about
30 minutes across numerous countries including the US, the Republic of Korea, Finland and Japan. The
worm managed to affect numerous networks including airlines and banks and even disabled a security
monitoring system at a nuclear power plant in Ohio.
2001 saw an Australian man gain remote access to sewage systems in Maroochy Shire and dump
thousands of gallons of sewage into the local waterways. At about the same time, terrorists in Romania
illegally gained access to the computers controlling the life support systems at an Antarctic research
station, endangering the 58 scientists involved. Fortunately, however, the culprits were stopped before
damage actually occurred.
More recently, there has been a spike in cyber-crime as each day thousands of people gain access to
the internet. The Russian Business Network (RBN) was registered as an Internet site in 2006. Initially,
much of its activity was legitimate. But the founders soon discovered that it was more profitable to
host illegitimate activities and started hiring its services to criminals. The RBN has been described by
VeriSign as "the baddest of the bad". It offers web hosting services and Internet access to all kinds of
criminal and objectionable activities, with individual activities earning up to $150 million USD in one
year. It specialized in and in some cases monopolized personal identity theft for resale.
In 2007, Estonia saw one of the strangest examples of a cyber terror attack when an unknown group
perpetrated a massive cyber attack in response to the removal of a World War II monument from the
city of Talinn. The attack took the form of a DoS in which selected sites were bombarded with traffic in
order to force them offline; nearly all Estonian government ministry networks as well as two major
Estonian bank networks were knocked offline. In addition, the political party website of Estonia's
current Prime Minister Andrus Ansip featured a counterfeit letter of apology from Ansip for removing
the memorial statue. While a single man was convicted of launching the attacks in 2008, the initial
belief from Estonia was that it had been perpetrated by Russia, meaning this attack actually served to
destabilize the relationship between two states, a far graver consequence than the denial of service on
numerous Estonian government websites.
In November 2007, another former Soviet state was victimized by cyber criminals when the website of
Ukrainian president Viktor Yushchencko was attacked by a radical Russian nationalist group, the
Eurasian Youth Movement. Though many of these attacks seem superficially unimportant or lacking
grave consequences, they also demonstrate a propensity for much greater damage. Whether it’s
disabling a country’s financial systems, stealing vital intelligence or destabilizing diplomatic
relationships in a region, cyber terrorism bears a very real and threatening prospect in the future and
one that must be addressed.
16
Problems Combating the Issues
Currently the biggest issue facing the international community in the battle against digital crime,
specifically in regards to Cyber Terrorism, is the fragmented legal front put forth by the rest of the
world. There exists no universal set of laws or regulations for the Internet, rather it is up to each
individual state to establish its own laws and police the internet as it deems fit.
This results in a broad range of regulation spanning from nearly non-existent laws and regulations in
some countries to nearly fascist regulations in other. For instance many of the states in the former
Soviet bloc have next to no law policing the Internet. The result of this lack of consistent regulation is
that a number of illicit and highly illegal digital crimes are perpetrated within their borders against the
rest of the world on a daily basis.
UNODC Background Guide | SWCHSMUN 2012
Quantifying the Risk of a Cyber Attack
To understand the potential threat of cyber terrorism, two factors must be considered: first, whether
there are targets that are vulnerable to attack that could lead to violence or severe harm; and second,
whether there are actors with the capability and motivation to carry them out. While a great number
of nations employ very advanced digital security, the ability to attack vital computer systems is evolving
as fast, if not faster, than the corresponding security measures. The United States, who many consider
to be at the forefront of digital security, has been victimized a number of times by cyber attacks on
their intelligence servers. Countries like China, Greece, India, Israel, and the Republic of Korea have all
been in the spotlight before by the US media for attacks on information systems related to the CIA and
NSA. Though these attacks are usually the result of curious young computer programmers, the United
States has more than legitimate concerns about national security when such critical information
systems fall under attack. In the past five years, the United States has taken a larger interest in
protecting its critical information systems. It has issued contracts for high-level research in electronic
security to countries such as Greece and Israel to help protect against more serious and dangerous
attacks.
While even the most proactive of states are at a digital security risk, lesser developed countries
choosing to utilize the Internet for sensitive national functions find themselves situated in very
precarious territory. And as states continue to transition into a web-model that sees even more of their
integral services as well as good portions of their country’s private commerce come online, the areas of
vulnerability that can be exploited by cyber criminals continue to grow.
The second of the two factors in assessing the risk of a cyber attack is the capability and motives of the
perpetrators. As has been evidenced by numerous examples and advancements in computer-related
technology, the capability to stage digital attacks increases on a daily basis, as do many of the motives
(as fueled by regional and international conflict). A distinction has to be made among the three basic
types of cyber terrorists. The professionals, those who, by order of their sponsors, aim at inflicting
physical or cyber damage onto victim’s resources, the amateurs, who find pleasure in applying cyber
graffiti defacing corporate or government websites, and the thieves, who have immediate personal
economic benefit from their actions.
The professionals are cyber terrorists who operate behind a variety of façades – political extremists,
religious fanatics, revolutionaries, and the like. The fact remains that cyberspace allows the
cyberterrorists anonymity, and the potential impact of their attacks, as well as their timing, is
unpredictable. It must be recognized that the technical education, the experience and the expertise of
the cyber terrorists, especially of the professionals, parallels that of the networks design experts. In
addition to this technical background, cyber terrorists also develop knowledge on the network
architecture of the victim’s resources. It must also be recognized that professionals are not malevolent
volunteers, but well sponsored operatives of political, military, or economic interests, either state or
private.
17
Interpol
The UNODC is clearly the primary UN agency to combat digital crimes but it is vital that the UNODC
cooperate with Interpol, the international police agency based out of France. Interpol hosted the 7th
International Conference on Cyber-Crime in September 2007 in New Delhi, India. Representatives from
many of Interpol’s 188 member countries assembled in New Delhi to discuss and coordinate strategies
to combat cybercrime and cyber-terrorism and to draw upon Interpol’s signature I-24/7 program that
UNODC Background Guide | SWCHSMUN 2012
Conversely, China has some of the strictest Internet regulations in the entire world. Chinese citizens
have access to a very subjugated version of the Internet where information is heavily controlled and
activity is highly monitored. Even the perception of wrongdoing on the Internet in China can lead to
incarceration and social sites such as Facebook are completely illegal.
One of the biggest problems facing the defense of digital crime is the disparity in perception by many
of the countries around the world. While larger more developed countries may view these crimes as a
matter of national defense and a major international issue, other countries choose to prioritize
development issues or other security issues above digital security. By some legal definitions, digital
crime does not even constitute an actual offense. A common example is when a person starts to steal
information from sites, or cause damage to, a computer or computer network. This can be entirely
virtual in that the information only exists in digital form, and the damage, while real, has no
physical consequence other than the machine ceases to function. In some legal systems, intangible
property cannot be stolen and the damage must be visible, e.g. as resulting from a blow from a
hammer. Where human-centric terminology is used for crimes relying on natural language skills and
innate gullibility, definitions have to be modified to ensure that fraudulent behavior remains criminal
no matter how it is committed.
Additionally, many states fight international efforts to modify their own internet laws as they feel it is a
violation of their sovereign right to police themselves and mete out their own justice. This can be
especially problematic when mixed with numerous Western states’ attitudes towards terrorism. The
United States, for instance, has pledged that regimes that support terror are akin to terrorists
themselves and will be opposed. Though this doctrine may be pragmatic when applied to physical
terrorism where violence is physically perpetrated, it could potentially destabilize a region if the same
doctrine is applied to cyber terrorism. Though this may seem like an outlandish possibility, a large
enough act of cyber terrorism could be all it takes to set off major international hostilities.
Additionally, there is a feeling by many lesser-developed countries that combating digital crime could
be a misappropriation of their already finite resources. As with maritime piracy, many countries are
already engaged in expensive defensive programs aimed at stamping out other forms of terrorism and
defending their country’s physical resources. Any expenditures to defend their digital resources may
not be fiscally possible, especially in light of the contemporary economic slowdown.
Finally, many human rights groups caution against a more regulated Internet for a number of reasons,
not the least of which is the violation of personal privacy that may occur as a result of increased
monitoring. While different countries have different concepts of personal freedoms and liberties, one
uniform solution would not likely satisfy the rights of all people in different countries around the world.
For instance, China imposes extremely strict restrictions that would constitute a complete violation of
American rights if applied to the United States. Even small measures such as new flexibility in the
American government’s monitoring the Internet activities of its citizens by the Patriot Act and Google’s
admission that it keeps search records for all its users have been met with harsh criticism. The broad
range of perspectives on digital crime and the disparity in laws and regulations with regards to the
internet, which is a non-tangible, intellectual concept to begin with, make combating the issue of
digital crime increasingly difficult.
18
allows all member countries to share essential information about international criminal activity.
Integrating Interpol’s expertise and existing networks into the UNODC’s programs for combating all
forms of digital crime is a fundamental step forward for the world community.
Conclusion
In order to formulate a plan to combat digital crime many obstacles must first be overcome; the least
of which is international consensus and the determination of whose place it is to police the Internet.
Many countries feel that the responsibility falls to individual states and police forces to monitor activity
within their own borders. This assumes a certain degree of altruism and that other states have the
resources to accomplish such tasks. While many states would undoubtedly attempt to police digital
crime in their own countries, the world community is not likely capable of such an independent
solution to this problem. Consensus would be hard to reach without building an international legal
framework for the Internet, a concept that would undoubtedly offend the sovereign sensibilities of
many countries and civil liberties of many people. For the UNODC to proceed, it must first determine
whether policing and combating digital crime falls under the jurisdiction and responsibility of the
UNODC, and if so what aspects of digital crime are relevant and which can be left up to individual
countries to police. Additionally, the UNODC needs to assess what, if any, measures can be utilized by
the international community in combating this nuanced and constantly evolving problem.
Useful Sources
Baranetsky, Victoria (2009) “What is cyberterrorism? Even experts can't agree” Harvard
Law Record.
"Defining Malware: FAQ". technet.microsoft.com. Retrieved 2009-09-10.
Denning, Dorothy E. (2000) Testimony before Special Oversight Panel on Terrorism, US
House of Representatives, Georgetown, Washington DC.
"Estonia fines man for 'cyber war'". BBC. 2008-01-25. Retrieved 2008-02-23.
F-Secure (March 31, 2008). "F-Secure Quarterly Security Wrap-up for the first quarter of
2008". Press release. Retrieved 2008-03-31.
Fafinski, S. (2009) Computer Misuse: Response, regulation and the law Cullompton:
Willan.
Jacobson, Roberta Beach (2001-11-27). "Copyrights and Wrongs".
www.articlestree.com. Retrieved 2007-04-07.
Kostopoulos, George K. (2008) “Cyberterrorism: The Next Arena of Confrontation”
UNODC Background Guide | SWCHSMUN 2012
Guiding Questions
 Is Digital Crime an issue that has plagued your nation? What, if any, attacks have been
perpetrated against your nations or groups living in your nation?
 Does your nation rely heavily on internet based services and agencies? Which of these
web-related entities could be potentially at risk and does your nation currently employ
any web-based security systems for protecting those assets? What initiatives are your country
currently pursuing with regard to this issue?
 What types of laws and restrictions does your country have in place with regards to
the internet? How have these laws changed recently and what is your country’s position
on an international legal framework with regards to internet activity.
 What are the penalties for web-based crimes in your country?
 What degree of social freedoms does your country currently offer and how would
your citizens respond to legislation that may infringe upon their civil liberties in the
context of the internet?
19
UNODC Background Guide | SWCHSMUN 2012
IBIMA Volume 6.
Poulsen, K. (2003, August). Slammer worm crashed Ohio nuke plant network. Security
Focus.
Williams, M. (2006) Virtually Criminal: Crime, Deviance and Regulation Online,
Routledge, London.
Weimann, Gabriel (2006). Terror on the Internet: The New Arena, the New Challenges.
United States Institute of Peace,U.S.
20
Download