JPMorgan Chase & Co.

advertisement
UN Security Council
Topic: B
Cyberterrorism
UNSC Topic B
Argentina
Cyberterrorism is the act of terrorism on the internet. This act of terrorism effects
computers, networks, or the public internet. Terrorists act in this way to get the
governments attention on an issue or because of any other ideological or political
objective. Cyberterrorism can be small hacks in a computer to mass disruption in a
system where it leaves it inoperable. Today the internet is a complicated web of
technology and it is vulnerable to attack.
As cyberterrorism spreads throughout the world, there are many concerns that
Argentina could be a target. Argentina is concerned by other countries like the U.S.
hacking into our system because we have learned that the NSA spy program has been
spying on most Latin American countries. In 2011, a group crashed a government
website in Chile and after the attack Cristián Borghello, the director of an Argentine
agency that promotes computer safety says "There is still a bit of incomprehension in
Latin America regarding the security needed when handling information and computer
resources." His comments state that not many know exactly how to protect themselves
from cyberterrorism. As Agustin Rossi stated in 2013, "We have established that we will
hold a meeting in Brasilia before the end of the year to intensify our complementarity in
the matter of cyber defense.” This meeting would have made actions clear on what
Argentina would do to protect itself from cyberterrorism.
Argentina would like to propose solutions for countries in order to protect
themselves against cyberterrorism. We suggest using military actions. That is to provide
cyber warfare training to officers. This training could be provided by other countries
who have the expertise and knowledge of what to do when attacked. In Argentina,
Brazil will be providing us with the training needed. This could protect countries from
hackers and allowing everyone to fight back against whomever. These actions would
provide your country with the protection needed to fight in the cyber warfare. Also our
military has stated that including defensive measures to protect your own networks
and offensive measures is a good idea. This would protect everyone's computer systems
while fighting back to stop cyberterrorism.
Bibliography
"Argentina, Brazil agree on cyber-defense alliance against US espionage."
http://rt.com/news/brazil-argentina-cyber-defense-879/. Autonomous Nonprofit
Organization. 15 September, 2013. Web. 26 November, 2014.
"Latin America Could be Vulnerable to Cyberterrorism." http://dialogo-americas.com.
Adrián Martínez. 31 May, 2011. Web. 27 November, 2014.
Lewis, James and Katrina Timlin. "Cyber Security and Cyber Warfare 2011."
http://unidir.org/files/publications/pdfs/. Nd. 5. Web. 26 November, 2014.
"UNSC Resolution 2178 Unanimously Passed but Obama was Diplomatically
Rebuked." http://m.strategic-culture.org/. Strategic Culture Foundation. 30
September, 2014. Web. 30 November, 2014.
UNSC Topic B
Submitted by:
Commonwealth of Australia
“Attacking a growing cyber terrorism threat” was the headline of The Australian, which is a
newspaper, on March 22 2014. As you may have guessed, Australia is firmly against Cyberterrorism. We
in Australia have had a published policy on Cyber Security for 6 years. We have a computer emergency
response team of Australia, also known as CERT Australia, devoted to Cyber Security. CERT Australia
helps find and catch hackers and cyberterrorists. The Attorney General Robert McClelland started
enforced Cyber Security and every Attorney General after him has done the same. Australian
government has helped computer systems, locally and nationally with Cyber Security. Hackers and
cyberterrorists can take down anything anywhere. For Example, one smart criminal can take down huge
companies at a coffee shop. In Australia, there has been many bank hackings that disrupt stock
exchange. Some big names are Virgin Blue, Australian Stock Exchange, Commonwealth Bank and
National Australia Bank. We need to stop cyberterrorism before it gets out of hand.
The to a society without cyberterrorism and cybercrime is to stop it in its tracks. I mean I think
the UNSC should sign a document that creates a team of cyber police force. It would keep international
cyberterrorists at bay or in jail. We should also sign another document to make countries keep
cybercrime against the law. It would prevent forming an alliance of cyber criminals. I think Attorney
General George Brandis would be in support of the proposal along with Prime Minister Anthony Abbott.
Once again, Australia is firmly against Cyberterrorism.
Bibliography
http://www.theaustralian.com.au/technology/attacking-a-growing-threat-cyber-terrorism-threat/storye6frgakx-1226025058588
http://www.ag.gov.au/RightsAndProtections/CyberSecurity/Pages/default.aspx
www.staysmartonline.gov.au
www.cert.gov.au
UNSC Topic B
Submitted by: Chad
According to NATO (2008), cyber terrorism is “a cyber attack using or exploiting computer or
communication networks to cause sufficient destruction to generate fear or intimidate a society into an
ideological goal.” Cyber terrorism is a serious problem that affects many people in the world. Just a few
stats about cyber terrorism. 4/5 of the major industries reported being a victim of a cyber attack. 300
billion dollars is put in just to fight of hackers. July 21, 2014, 200,000 computers had been hacked just to
hack the White House website. Luckily the attempt was caught quick enough to terminate the attack.
About 50 percent of all the users on the Internet are victims of cyber attacks.
Some quick facts about Chad. 54% of the people in Chad live in poverty. 80% rely on farming for
money. Only 2.1% of Chad has access to computers and Internet. Cyber terrorism still impacts Chad
though. Chad and many other African countries also are very vulnerable to these attacks. Chad also
does not have a strong defense system against these attacks. The motive behind these attacks are either
fame or for money. A year ago a student had hacked 100 government websites in Kenya. This comes to
show that hackers don’t have to be a select few but can be anyone; it also shows us that anyone can
learn to hack. This incident also tells us that Africa as a continent does not have good defenses against
these attacks.
A defense system should be in place for countries having cyber attacks that do not have a good
defense system. Government officials from countries all over Africa that are trained or are being trained
can put a defense system for all men and women to help secure their computers or other electronics.
Other countries might be willing to support these countries after the information given.
http://en.wikipedia.org/wiki/Chad
http://www.ruralpovertyportal.org/country/home/tags/chad
http://en.wikipedia.org/wiki/Cyberterrorism
http://searchsecurity.techtarget.com/definition/cyberterrorism
http://resources.infosecinstitute.com/cyberterrorism-distinct-from-cybercrime/
http://abcnews.go.com/WNT/story?id=130807
http://en.wikipedia.org/wiki/Telecommunications_in_Chad
http://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=2&ved=0CCYQFjAB&url=http%3A
%2F%2Fwww.ccwa.org%2Fwp-content%2Fuploads%2F2014%2F03%2FUNSC_TopicB.docx&ei=0PlxVO3UHpLbggTLowM&usg=AFQjCNGfVOVOmam73LBsDvS0C8RuOk_TyQ&bvm=bv.80185
997,d.eXY
http://www.contadorharrison.com/african-countries-must-deal-with-cyberterrorism/
UNSC Topic B
Submitted by: France
As of right now, in 2014, cyber terrorism has become a growing concern around the
world and France would like to come to a resolution upon that. According to IBM Global
Security Analysis Lab, about 90% of the time the hackers are amateurs or cyber
joyriders, 9.9% of the time they are professional hackers for hire or corporate spies, and
.1% of the time these evil hackers are world-class cyber criminals. Terrorist leaders in
the Middle East such as ISIS (Islamic State of Iraq and Syria) are taking advantage of
one of the world’s greatest tools, the internet. While the internet is very useful,
unfortunately groups, such as ISIS, or just regular people in general are using the
internet as a threat or to uncover innocent people’s security rights. It could happen to
anybody, and that is why we must not let cyber terrorism gain its power throughout the
world.
France believes that people deserve their privacy, especially on the internet. It is a
disruption to this belief when cyber terrorism occurs. Concerned, France would like to
try to limit internet usage of anyone with a criminal background. Although, it may not
seem simple, France believes it can be pulled off as long as other countries present try
to do the same. Although, some cyber terrorists are normal people who have no
criminal background whatsoever; we could monitor internet usage, also creating jobs in
the process, so that any suspicious activity could be reported.
As for the countries who do not allow citizens to use the internet, such as North
Korea, this action that prevents people from using the internet may be protecting
people’s security but it is preventing people from using a greater tool. even though
people are using it against us, people should have a right to use it, but also protect their
security. It would be wonderful to grant internet peace to everyone, but it is just not
possible. This will be a successful solution.
Machines would do the monitoring, and the people would work the machines. We
would train people to be able to work the machines, so there would rarely be a
malfunction. This project would be a huge endeavor to get funds needed, so we would
need donations. If we do this, nobody will ever get away with suspicious activity that
could lead to cyber terrorism or terrorism in general.
France is highly against terrorism, so we think the internet should be a safe place
to use for everybody. The internet was never meant for cyber terrorism and hacking, it
was meant for a group of people around the world to be able to talk to each other in
peace, but sometimes when people take advantage of this, it can be a disruption to our
daily lives, so that is why France believes that people should be able to use the internet
without any further disruptions in the cyber world, therefore creating happy, simple, lives
for people of all nations. The internet was once a happy place, but now we must restart,
UNSC Topic B
and recreate the happy, safe place it once was, without the worry of another hacking or
starting cyber terrorism.
Works Cited
"The World Factbook." Central Intelligence Agency. CIA, n.d. Web. 10 Nov. 2014.
<https://www.cia.gov/library/publications/the-world-factbook/geos/fr.html>
Sproles, Jimmy, and Will Byars. "Statistics on Cyber Terrorism." Cyber Terrorism. N.p.,
n.d. Web. 27 Nov. 2014. <http://csciwww.etsu.edu/gotterbarn/stdntppr/stats.htm>
“UNSC Background Information.” CCWA. Word. 15 Dec 2014
“France” data.worldbank.org Web. 25 Nov. 2014
“The Security Council” http://www.un.org/en/sc/ United Nations. Web. 25 October. 2014
UNSC Topic B
Jordan
Jordanian officials are committed to fighting cybercrime and
cyberterrorism. We believe that fighting cybercrime will leave the
country better equipped to battle cyberterrorism. Jordan is working
with international organizations and private corporations to fight these
crimes. We are building a new cybercrime/cyberterrorism center under
the Ministry of Information and Communications Technology. In 2013
the number of cyber-crimes reached over 1,000, 75% of the victims
were women. Many of the crimes include fraud and extortion. “The
authorities’ need to prevent this type of crime,”said Lt. Col. Sahm alJamal, director of the cyber-crime unit of the Public Security
Directorate’s criminal investigations department. A new
cybercrime/cyberterrorism center will be built in Amman by the
Jordanian Ministry of Information and Communications Technology.
Minister Azzam Sleit spoke at a workshop on his hopes and beliefs
this new center will fulfill. "We hope to assist response teams in
cybercrime incidents across different sectors," Sleit said. The new
center will brighten the future of internet safety and help create new
cybercrime laws as well as reinforce the current ones.”
I believe as a country we need to have public relations, law
enforcements, and international cooperation. We should provide
advertisements warning people of the danger of these terrorists to
help people avoid being victims of cybercrime. These advertisement
would appear on social media, and broadcast on television and the
radio. Jordan should work with international law enforcement
organizations so we can create new laws and improve enforcement of
existing laws. We can also work with the United Nations and
International Telecommunications Union to help fight cybercrime and
cyberterrorism out of the borders of our country. The resolution I
propose must not include special exemptions for Israel. This resolution
must be approved by the Parliament and King Abdullah II of the
UNSC Topic B
Hashemite Kingdom of Jordan before any action to take place. Jordan
is committed to a strong, regional and international fight against
cybercrime and cyberterrorism. We believe our new cybercrime center
in Amman gives us strong defenses against internet based threats.
"Jordan to Open Cybercrime Centre in Amman." AlShorfa RSS.
N.p., n.d. Web. 03 Dec. 2014.
UNSC Topic B
Submitted by:
South Korea
Cyberterrorism is a growing problem in the world as more and more people depend
upon modern technology for everyday activities. The United States Federal Bureau of
Investigation (FBI) defines cyberterrorism as, "the premeditated, politically motivated attack
against information, computer systems, computer programs, and data which result in
violence against noncombatant targets by sub-national groups and clandestine agents"
(www.crime-research.org). Cyberterrorism can lead to the hacking of air control and causing
planes to crash, and remotely launching nuclear weapons (www.mtholyoke.edu). Since 1999,
South Korea, Japan, and the US have been the targets of cyber attacks from North Korea
(dailycaller.com). On March 20, 2014 there was a major attack in South Korea that "led to
the crippling of several South Korean financial and media company websites," says Cho
Jong Ik. The South Korean government later deduced that North Korea was the cause of the
attack, based on the realization that the attackers had the same IP address as past attacks from
North Korea (en.nknet.org). In an effort to defend their government against North Korean
hackers, South Korea has strongly admitted that they are making plans to build a cyber tool
specifically made to destroy North Korea's nuclear capabilities (www.bbc.com). Although
they do not condone cyberterrorism, South Korea does find it necessary to defend their
government against attacks and threats from North Korea.
Along with North Korea, China has also been confirmed to have a cyber army of
180,000 spies, which has been used to attack the United States about 90,000 times a year
(www.thedailybeast.com). Canada is also a reported victim of cyberterrorism in China,
causing the government to eventually cut off their internet access in order to keep China
from accessing and stealing any more of their classified information (Syed Balkhi). Though,
a recent article written by Xinhua states that a Chinese envoy urged the UN and its Security
Council to take "effective measures to tackle cyberterrorism." Liu Jieyi made this statement
at a Security Council meeting in mid-late November 2014 (usa.chinadaily.com). Also, in
June of 2013, United States president Barack Obama, Chinese leader Xi Jinpig, and Russian
president Vladimir Putin discussed ways to fight cyberterrorism, and the Chinese leader
stated that the Chinese government has been a target of cyberterrorism too (rbth.com). In
2007, Russia was accused of unleashing a cyber war on the country of Estonia, after a spat
with Russia on the removal of a war memorial. This cyber war caused Estonia to "cut access
to its sites from abroad" in order to stop the attacks from causing any more of their sites to
crash and become inaccessible (The Economist Newspaper). In March of 2013, "South
Korea's financial institutions as well as the Korean broadcaster YTN had their networks
infected in an incident said to resemble past cyber efforts by North Korea" (www.nato.int).
IMPACT, International Multilateral Partnership Against Cyber Threats, is an alliance
of 152 countries set to defend against cyber threats, including Ukraine, Brazil, India,
Afghanistan, Iran, Iraq, Sierra Leone, Guatemala, and many more. The alliance is also a "key
partner of the International Telecommunication Union (ITU), a United Nations' (UN)
specialized agency, in the effort to ensure the safety of cyberspace for everyone." IMPACT
was formed in 2008 at the World Cyber Security Summit. In that same year, IMPACT signed
a Memorandum of Understanding with ITU, stating that they would work together on
UNSC Topic B
creating ITU's Global Cyber security Agenda (GCA) (www.impact-alliance.org). ITU is an
agency of the United Nations that is set on coordinating "telecommunication operations and
services throughout the world." ITU was first founded in 1865 as the International Telegraph
Union (what is.techtarget.com). The organization is currently working to make sure that
cyberspace is once again safe for all. Through these two organizations, the UN is working
hard to protect the world against cyber terrorists. In the next 3-4 years, South Korea along
with the UN would like to guarantee that cyberspace is once again safe and that
cyberterrorism is no longer a global issue by being diligent in their efforts.
Bibliography
1. Elmusharad, Dr.Mudawi. “Cyber Terrorism: the new kind of Terrorism.”
http://www.crime-research.org/articles/Cyber_Terrorism_new_kind_Terrorism/.
Computer Crime Research Center 2001. Web. 15 December 2001.
2. Peterson, Josh. “North Korea ready for cyberwar.”
http://dailycaller.com/2013/04/05/north-korea-ready-for-cyberwar/. The Daily Caller
2014. Web. 15 December 2014.
3. http://www.mtholyoke.edu/~lwpoole/politics116/cyberterrorism.html.
4. Cho Jong Ik. “Ha Tae Kyoung Interview on the Growing Cyber-Terrorism Threat from
North Korea and the South’s Response.” http://en.nknet.org/writings/nk-vision/no47/hatae-kyoung-north-korea-cyber-terrorism-threat/. NKnet 15 May 2013. 15 December
2014.
5. Boyle, Joe. “South Korea’s strange cyberwar admission.”
http://www.bbc.com/news/world-asia-26330816. BBC 2014. Web. 15 December 2014.
6. Posner, Gerald. “China’s Secret Cyberterrorism.”
http://www.thedailybeast.com/articles/2010/01/13/chinas-secret-cyber-terrorism.html.
The Daily Beast Company LLC, 2014. Web. 15 December 2014.
7. Balkhi, Syed. “25 Biggest Cyber Attacks In History.” http://list25.com/25-biggest-cyberattacks-in-history/?view=all. List25 LLC, 2011. Web. 15 December 2014.
8.
Potosky, Dan. “US, Russia, China meet to tackle cyberterrorism.”
http://rbth.com/international/2013/06/07/us_russia_china_meet_to_tackle_cyberterrorism_26
867.html. Russia Beyond The Headlines, 2014.
9.
www.impact-alliance.org. “IMPACT.” http://www.impactalliance.org/home/index.html. IMPACT, 2014. Web. 15 December 2014.
10.
Riley, Chris. “the history of cyber attacks-a timeline.”
http://www.nato.int/docu/Review/2013/Cyber/timeline/EN/index.htm. Nato Review
Magazine, no date. Web. 15 December 2014.
11.
Xinhua. “Chinese envoy urges effective measures to tackle cyberterrorism.”
http://usa.chinadaily.com.cn/world/2014-11/20/content_18948012.htm. China Daily
Information Co, 1995. Web. 15 December 2014.
12.
Rouse, Margaret. “International Telecommunication Union.
whatis.techtarget.com/definition/International-Telecommunication-Union-ITU. TechTarget,
1999. Web. 15 December 2014.
UNSC Topic B
Russia
Cyberterrorism is a problem that faces almost every major world government
today. The position of Russia on this issue is that new laws are required to
prevent the proliferation of cyberterrorism and warfare. We hope that these laws
will be implemented quickly.
Cyberterrorism is defined in the Oxford English Dictionary as ‘the politically
motivated use of computers and information technology to cause severe
disruption or widespread fear in society.’ The 2007 cyberattacks in Estonia have
been attributed to Russian government actions in the past. However, no
evidence has ever been found that links the Kremlin to these attacks, and the
Kremlin denies any part in them. More recently, on October 7 JP Morgan
announced a cyberattack that compromised the ‘user contact information-name,
address, phone number and email address’ of up to 76 million households and 7
million small businesses, but nothing else had been compromised. Once again,
Russian hackers were blamed, and once again, no evidence connects the
attacks directly to the Kremlin, though it is likely that the attacks were Russian in
origin.
It is clear that this problem is a large one. For instance, the United States
Cyber Command received $447 million in funding earlier this year. However, no
adequate international legislation exists on this matter. For instance, last year
NATO introduced the Tallinn Manual, which outlines some basic regulations on
cyberattacks, including the principle that they can be regarded as usage of force
UNSC Topic B
and allows victim nations to respond with “commensurate countermeasures.”
However, many Russian officials have reservations about this manual. In the
words of Russian Defense Ministry official Konstantin Peschanenko, “The issue
of cybersecurity is a most topical one at present. It is particularly important to
prevent the militarization of the virtual space; whereas the Tallinn Manual is a
step in exactly that direction. Its approach to the issue at hand is far from perfect.
And the assessments made in it appear one-sided."
In conclusion, cyberterrorism is a grave threat and must be stopped. We
propose that new laws be implemented which strictly define cyberterrorism,
outline the proper responses to cyberattacks, and introduce harsher punishments
for cyberterrorism. Thank you.
Works Cited

Radin, Nelia B. "JPMorgan Chase & Co. - Current Report." JPMorgan
Chase & Co. - Current Report. JP Morgan, 02 Oct. 2014. Web. 25 Nov.
2014.

Schmitt, Michael N. "Tallinn Manual." Issuu. NATO Cooperative Cyber
Defence Center, 17 Mar. 2013. Web. 23 Nov. 2014.
Walker, Richard W. "Budget Bill Boosts Cybersecurity Spending InformationWeek." InformationWeek. Information Week, 17 Jan. 2014. Web. 25
Nov. 2014.
UNSC Topic B
Submitted by:
Ukraine
In recent years, cyberterrorism has been a major issue around the world. Cyberterrorism
is the act of terrorizing people through computers and the Internet. It includes but is not limited
to; cyber threats, network hacking, bomb threats distributed through social media, threats of
hacking, etc. According to wmur.com, FBI director James Comey said that cyberterrorism is one
of the top threats to Americans, besides extremism. Ukraine has currently been working to take
down Russian Separtist websites according to ukraine.settimes.com, Glib Pakharenko, the
membership director of the Kyiv chapter of the Information Systems Audit and Control
Association (ISACA) told SETimes that co-operation between the civil sector and state agencies
is "obligatory for cyber strategy."
Ukraine was recently the victim of a cyber-attack. The attack was sent from the
Ukrtelecom Base in the Russian-controlled region of Crimea. Russian soldiers invaded the base
and illegally installed equipment, according to reports from people at the base. The soldiers
tampered with cables at the base and sent out a virus that attacked the cell phones of Ukranian
politicians (channel4.com).
Ukraine would like the UN to pass a resolution to allow countries to put sanctions on
Russia and other countries with governments convicted of cyberterrorism. This is definitely the
best option because the UN is all about world peace. If countries are terrorizing each other, there
is no peace.
Bibliography:
http://rbth.com/science_and_tech/2014/03/10/anonymous_launches_cyber_attacks_in_defense
_of_ukraine_34945.html
http://www.nato.int/cps/en/natolive/news_57985.htm?mode=news
http://www.crime-research.org/library/Cyber-terrorism.htm
http://csciwww.etsu.edu/gotterbarn/stdntppr/stats.htm
http://www.channel4.com/news/russia-ukraine-cyber-attacks-crimea-mps-phones-internet
http://ukraine.setimes.com/en_GB/articles/uwi/features/2014/09/15/feature-01
http://ukraine.setimes.com/en_GB/articles/uwi/features/2014/12/02/feature-01
UNSC Topic B
Submitted by: United Kingdom
The predicament concerning cyber terrorism continues to revolve around
society. Unfortunately, hackers worldwide have used computers to perform more harm than
good. In 1990, for example, the National Academy of Science stated, “We are at
risk. Increasingly. America depends on computers… Tomorrow’s terrorists may be able to
make more damage with a keyboard than a bomb.” As well as the increased risk of
hacking, ISIS has inflicted additional trauma by posting YouTube videos for everyone to
see. These videos include executions, rigorous training videos, and moments of war. This
exemplifies that you don’t only need to hack and physically change someone’s online
profile, but you can spread fear through emotional states. The United Nations has reviewed
and sought to pass multiple resolutions, and in one article (properly stated “Article 2”), it
states that, “Any act intended to kill or inflict serious injury to any person, or anyone not
involved in a hostile situation, when the nature of this act is towards frightening a population
or manipulating a government to do or abstain from this activity.” Adding to the matter,
there have been numerous “Denial of Service” attacks towards U.S. government, one aimed
towards the CIA mainframe, and multiple attacks in foreign countries (Denial of Service
attacks are attacks intended to cut off users’ connection from the service).
The
United Kingdom does not and will never tolerate these events, and/or any future
events. The United Kingdom believes that international peace should be maintained in the
real world as well as the cyber domain. While man should progress and continue to
innovate with technology, so called “builders” should create a safe and peaceful
environment. To this extent, the United Kingdom believes that peace can be reached by
the means of jailing criminal offenders. As well as jail time, the United Kingdom believes
that defense is as important as aggressiveness in prosecuting criminal offenders. The
Secret Intelligence Service (M16) suggests that the United Kingdom should invest money in
defensive technology, and the Government has already allocated funds and money into the
Spending Rounds. Spending Rounds are the country’s budget. The United Kingdom
strongly insists that these policies should be practiced internationally, to confirm
international cyber security.
The United Kingdom only will seek measures for peace, and with the use of peaceful
electronic technology, disciplining criminals, and jailing offenders and felons up to life
sentences, we can internationally halt the actions of cyber terrorism, and maintain a healthy,
intellectual, and peaceful cyber domain.
UNSC Topic B
Works Cited
"Counter Terrorism." Sis.gov.uk. N.p., n.d. Web. 9 Dec. 2014.
"Denial-of-service Attack." Wikipedia. Wikimedia Foundation, 12 Nov. 2014. Web. 11 Dec.
2014. <http://en.wikipedia.org/wiki/Denial-of-service_attack>.
The Independent. Independent Digital News and Media, 6 June 2014. Web. 12 Dec. 2014.
<http://www.independent.co.uk/life-style/gadgets-and-tech/new-uk-laws-on-cyber-terrorismcould-jail-hackers-for-life-9499763.html>.
"International Convention for the Suppression of the Financing of Terrorism (adopted by
UNGA on 9 December 1999)." Legislativeonline.org. N.p., 9 Dec. 1999. Web. 9 Dec. 2014.
Spending Round (2013) Archived." N.p., n.d. Web. 11 Dec. 2014.
<https://www.gov.uk/government/topical-events/spending-round-2013>.
"UNSC Background Guide." N.p., n.d. Web. 9 Dec. 2014
UNSC Topic B
Submitted by:
United States of America
In the past couple decades, cyber terrorism has become a big threat for the
USA. With the new technology in the 21st century cyber terrorism is a bigger threat
than ever before. Cyber terrorism is the use of computers as weapons that causes
widespread fear in society, economic problems, or physical problems. If a cyberterrorist hacks into power plants they can control electricity and gas. Cyber
terrorists can hack into government computer systems, or even into bank computer
systems and wipe out bank accounts. If they hack bank accounts it could cause the
economy to collapse. A major challenge for the USA in the next decade will be
cyber security or protecting ourselves from cyber terrorism. As the world becomes
more connected and reliant on computers, it is too much of a threat to overlook. An
estimate of how much cyber terrorism has cost is hundreds of billions of dollars. In
September of this year, China has been suspected of hacking into the United
States Postal Service seeking private information. China will not admit the attack,
but the US believes China was seeking sensitive information about government
employees.
In a 2009 speech President Barack Obama said “In short, America’s
economic prosperity in the 21st century will depend on cyber security. And this also
a matter of public safety and national security.” The US Homeland Security Agency
has proposed a plan called the Comprehensive National Cybersecurity Initiative.
The initiatives includes reducing national network entry points, so traffic is more
easily monitored, setting up an intrusion detection and prevention. This led to the
idea of EINSTEIN 3. Which is technology that monitors everything the USA’s
network and scans it for threats.
As the United States we believe the UN must develop laws against cyber
terrorism. The issue is so global that the only way to solve it is if the UN steps
in. USA believes to track the issue we have to have technology to monitor the
things coming into the country and check for threats. The UN needs to make sure
other countries have cyber security as well. If more people are protected the
countries who allow cyber terrorism or cyber terrorists will face consequences more
at a global level.
Cyber security is a big priority and the USA will do all they can to prevent
cyber terrorism in the future. Although the US have begun, the US knows there is a
lot of work that lies ahead to continuously be one step ahead of cyber
terrorists. Eventually terrorists will turn to cyber terrorism and there has to be
protection in place. Cyber terrorists are constantly changing threats making it
difficult to keep protection up to date. The USA believes that cybersecurity is one of
the most important things and will do all they can to help prevent it. In conclusion if
UNSC Topic B
the UN has laws and consequences in place about cyber terrorism it will globally
make a difference to better the safety of all countries and individuals.
Work Cited:
America's next Threat: Cyberterrorism? N.p., 26 Apr. 2013. Web. 4 Dec. 2014.
yourmoney.blogs.cnn.com/2013/04/26/americas-next-threatcyberterrorism/?hpt=ym_mid
Assessing the Risks of Cyber Terrorism, Cyber War and Other Cyber Threats. N.p.,
Dec. 2002. Web. 2 Dec. 2014. <http://www.steptoe.com/publications/231a.pdf>.
China Suspected of Breaching U.S. Postal Service Computer Networks. N.p., 10 Nov.
2014. Web. 11 Dec. 2014. <http://www.washingtonpost.com/blogs/federaleye/wp/2014/11/10/china-suspected-of-breaching-u-s-postal-service-computernetworks/>.
Computer Attack and Cyberterrorism: Vulnerabilities and Policy Issues for Congress.
N.p., 1 Apr. 2005. Web. 28 Nov. 2014.
www.history.navy.mil/library/online/computerattack.htm
The Comprehensive National Cybersecurity Initiative. N.p., 29 May 2009. Web. 5 Dec.
2014. <http://www.whitehouse.gov/issues/foreign-policy/cybersecurity/nationalinitiative>.
Cyber Threats and the US Economy. N.p., 23 Feb. 2000. Web. 25 Nov. 2014.
www.cia.gov/news-information/speeches-testimony/2000/cyberthreats_022300.html
Obama Says Cyberterrorism Is Country's Biggest Threat, U.S. Government Assembles
"Cyber Warriors" N.p., 18 Feb. 2014. Web. 3 Dec. 2014.
<http://www.ibtimes.com/obama-says-cyberterrorism-countrys-biggest-threat-usgovernment-assembles-cyber-warriors-1556337>.
Prospective Analysis on Trends in Cybercrime from 2011 to 2020. N.p., 2011. Web. 8
Dec. 2014. <http://www.mcafee.com/us/resources/white-papers/wp-trends-incybercrime-2011-2020.p
df>.
UNSC Topic B
Download