Documente Academic
Documente Profesional
Documente Cultură
C Terrorism
yber
President University Model United Nations
{Workshop}
PREVIOUS ATTACKS
The first known case of that can be justified as cyber terrorism happens in 1999. A serverdisabling attack on companies with an East Timor domain name occurs during their conflict with Indonesia. It was known in the end that the attacks were mostly caused by those who did not favor their independence. The second known case happens during the 2006 war between Israel and the terrorist group Hezbollah, in which Hezbollah employed some Russian hackers to attack Israels defense system. In 2009, there were coordinated cyber attacks against US and South Korean financial institutions, newspapers, and intelligence services and North Korea was suspected as the one who caused the attack.
CURRENT SITUATION
Different Capabilities on Content Control Content control is often done by states to ensure that their internet is free from radical elements and to prevent terrorist groups from gaining support through the web. Not all country has the same scale of operations, though. For example, the United States is not performing it as rigid as China. Yet to what extent a state could perform a content control policy is limited by arguments of Human rights, according to the Universal Declaration of human rights, every human has the right to seek, receive, and impart information. Some nations do not have any sort of content controls, due to lack of infrastructure, lack of knowledge, or extremely liberal policy. One the other hand, some countries tightly censor the internet. These differences in policies are troublesome for nations that would like to have uniform standards set in place in order to govern the internet. Vulnerabilities There are numerous parts of the worldwide infrastructure that are vulnerable to cyber attack. Currently, most nations ability to withstand these attacks is weak at best. Vulnerabilities exist in almost every facet of everyday existence. In modernized nations, almost every part of
2 | Page
1.
BLOCK POSITION
2.
3.
4.
5.
6.
USA The United States best interest is to ensure that there is a global culture of cyber security as mentioned in UN resolution 64/211. With regards to content control, the United States has a more liberal posture. Though the US will not tolerate websites that actively aid terrorism, there is a strong tradition of free speech. Any sort of resolution that seeks an outright ban to terrorist websites would be against the spirit of the United States foreign policy. Russia The Russian Federation is an advocate for a persons right to use and access information freely. However, Russian law will not allow for propaganda that serves to foment social, racial, national or religious hatred and strife. The Russian government believes in bolstering information infrastructure in order to increase the utilization of informational resources. China The Peoples Republic of China has a strong stance against preventing cyber security threats. They are a proponent of preventing harmful information from causing instability in the region, which means they will censor such information. Any efforts to curtail these operations should not be viewed favorably. Middle East Due to the recent instability in the Middle East a number of terrorist organizations have hosted themselves in region. The Middle Eastern countries should focus on mitigating this threat, while also protecting national sovereignty. Though these organizations do threaten the governments in this region, excessive foreign intervention will have negative consequences. Africa Africa only accounts for 3,9 % of world internet users, with only 6,7 % of people in Africa with access to the internet. This lags compared to the 27,7% in the rest of the world. However, Africa is still subject to cyber attacks, particularly in the communications industry. Europe
3 | Page
7.
1. 2. 3. 4.
What type of content should be restricted from the Internet? What are the mechanisms of restriction? Which to restrict and which are not? What are the mechanisms of sanction and/or penalty to belligerent states? How do security proponent countries able to continue enforcing constructive acts against cyber-terrorism? 5. How would international society work together to create equal capabilities between developed and developing countries in ensuring cyber security?
4 | Page