Introduction

Hello delegates, my name is Ephraim Turner, and I will be your head chair for the 2012 Mission Viejo High School Conference in 1st DISC. I am a senior here at MVHS, and this is my second year as a part of our MUN program. I really enjoy MUN and am especially interested in global current events, also I run on our varsity cross-country team at Mission. I am looking forward to our 1st DISC committee and tackling the difficult topic of cyber security. This is a very important issue that addresses the United Nation’s hope of improving the lives and protecting all people in every nation. I hope that we have an exciting, yet informative debate as we strive to come up with excellent solutions to address this pressing issue. If you have any questions or concerns please, do not hesitate to email me at .

  1. Background of Topic

The technical improvement of the twenty-first century entailed cyber-security as a national and international security issue. This relatively new topic is related to the fundamental principles of international law as well as to concrete threats of war via espionage and sabotage. Around the world, cyber technology is becoming increasingly important for weapons systems, defense infrastructures and national economies. As such, military leaders consider cyberspace the next frontier of combat. The First Committee has to deal with the challenges of new and unheard-of possibilities to defend cyber-attacks as an act of war with the means of new technology. Currently, the international community only has a weak system of regulation and governance that covers this emergent threat. As global society becomes ever more dependent on cyberspace for both its most basic and its most critical functions, the economic and social impact from a full-scale cyber-attack could cripple a modern networked state.

  1. United Nations Involvement

The UN has responded to the issue of cyber-security in small steps, since the threat is relatively new. Although there have been no major actions taken dealing specifically and directly with cyber-security, the UN has passed several resolutions that have addressed the topic and attempted to increase awareness of this new threat. In 2001 the General Assembly passed a resolution on Combating the Criminal Misuse of Information Technologies, which called for more unified law enforcement regarding cyber-terrorism. Two Summits have been held by the UN, one in 2003 and the other in 2005, that focused mainly on the freedom of media on the internet and the governing of cyberspace. In 2008, another resolution was passed by the General Assembly, further supporting some form of standardization of punishment and raising awareness to ordinary citizens vulnerable to cyber-terrorism. The UN, in collaboration with the two Groups of Governmental Expertise (GGE), passed a resolution in 2010, once again stressing the importance of a dialogue among states to discuss the norms and limitations relating to cyber-terrorism and the state use of information and communication technologies. However, it is important to understand that no resolutions have been passed which directly set restrictions or rules on cyber-security or penalties for cyber-terrorism.

  1. Bloc Positions

The Committee has to formulate a precise resolution that states the conditions for using cyber weapons as already done for every other type of weapon. The member states will have to discuss the issue of the new possibilities the internet gives terrorists as well as governments and how the current structures can or should be regulated on an international basis.

Western Block- Since the Western Block is technologically advanced, they may feel strongly about strengthening the laws on this issue and using technology to their advantage.

Middle Eastern Block- These countries have very limited security and have an ongoing history of counterfeit legal documents.

African Bloc- Since this is an undeveloped block in government and technology, they have few issues with this topic. This may change as countries become more developed; also, more technologically advanced countries may exert influence on African nations.

Latin American Bloc- Similar to African bloc because they are undeveloped as well; although, they are advancing and changing so this issue may become apparent in a matter of time.

Asian Bloc- Due to large population and advanced technology, many documents have been counterfeited in the past and still are, making cyber security a key topic for this bloc.

  1. Possible Solutions

A past resolution was A/RES/64/211, which was the creation of a global culture of cyber-security and taking stock of national efforts to protect critical information infrastructures. This resolution was passed in the year 2009, further demonstrating how recent the development of this topic has been. Also, another past resolution is A/RES/58/199, which is about the creation of a global culture of cyber-security and the protection of critical information infrastructures. These resolutions encourage the application of security technologies, promote reinforcing infrastructure and also setting up national laws to protect against cyber-attacks.

  1. Guiding Questions

• Can we implement multi-national laws regarding cyber security?

• Should states be allowed to defend themselves in retaliation?

• How can governments be kept accountable for cyber-attacks?

• Should non-governmental cyber-attacks be treated as acts of war?

• What types of consequences should be employed in the event of a cyber-attack?

  1. Works Cited

http://www.elbmun.org/index.php

http://aiskharvardmun.wikispaces.com/file/view/DISEC.pdf

http://www.un.org/documents/resga.htm

http://fraudwar.blogspot.com/2009/03/counterfeit-documents-enable-dangerous.html

http://www.coe.int/t/e/social_cohesion/soc-sp/public_health/pharma_and_medicine/Declaration_Conference_Moscow_CountMed.asp

http://www.un.org/Depts/dhl/resguide/specil.htm#six