Background Guide - TJHSST Activities

TechMUN 2015
MS Disarmament and International Security Committee
MS DISEC
Thomas Jefferson High School Model United Nations Conference
TechMUN 2015
Middle School General Assembly
Chair: Laura Chu
Chair: Prathik Naidu
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
Dear Delegates,
It is our utmost honor and pleasure to serve you as your co-chairs for the DISEC
Committee of TechMUN 2015! Our names are Laura Chu and Prathik Naidu and we are both
sophomores at TJHSST. We both began
participating in Model UN in freshman year and
have been active participants ever since, from
both a delegate and a staff member’s perspective.
Although TJ is primarily a STEM driven
school, Laura’s academic passions lie in
humanities and international affairs, and she has
developed an unparalleled love for Model UN. In
addition to MUN, she enjoys public speaking and serving her community through tutoring and
mentoring. She is the current class President and is active in Forensics Speech, Operation
Communication, Kids Are Scientists Too, Encouraging Empowerment Through Education, and
Namaste. She enjoys running on the cross country
and track team, playing flute in the McLean Youth
Orchestra, and hanging out with her friends!
Apart from being on the Model UN team,
Prathik’s interests are centered around biology and
chemistry. He is an active member of the
Biotechnology, Bioinformatics, and Biology
Olympiad clubs at TJ and competes in the Chemistry
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
Olympiad competition. In addition, he enjoys pursuing scientific research and takes part in many
science fairs. Apart from his typical-TJ-student activities, Prathik enjoys playing the piano and
clarinet, hanging out with friends on the basketball court, rooting on the Baltimore Ravens, and
of course, just making the most out of the very little free time he has!
DISEC will be comprised of our international community's most crucial issues in the
status quo and will relate to humanitarian concerns, economics, ethical dilemmas, and political
controversy. We expect high levels of active debate, diplomatic interaction, effective leadership,
and cooperation amongst delegates to write creative and implementable solutions. We highly
encourage all of you to research to the best of your abilities to be fully prepared for committee.
Please keep in mind to cite all information that you draw from external sources--we do not
tolerate plagiarism. As your chairs, it is our goal to make your TechMUN 2015 experience one in
which you can develop your skills, gain new experiences, meet new people, and above all, have
fun! Please do not be too concerned about awards or not being the “best” delegate; the
experience and knowledge you gain is an invaluable award in and of itself, and any one of you is
the best delegate if you simply do your best.
If you have any questions/comments/concerns or would simply like to introduce yourself,
please feel free to contact us at [email protected]. We look forward to an
enthralling and memorable conference with you all!
Best wishes,
Laura Chu and Prathik Naidu
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
Committee Introduction
Welcome to the Disarmament and International Security Committee (DISEC), the First
Committee of the General Assembly. DISEC serves as a forum for member states to discuss
topics ranging from internal conflict resolution to nuclear proliferation. The overarching goal of
DISEC is to debate and work towards resolving issues in order to promote, establish, and
maintain international peace.11 It is important to note that, like other general assemblies of the
United Nations, DISEC is unable to impose sanctions, dictate a Member State’s actions, or
authorize armed intervention.10 Instead, DISEC is a collaborative environment where nations can
discuss and solve global issues that are recognized in the UN Charter and are of utmost
importance.
Debating the topics in this committee will allow your country to present its stance on the
issues at hand and work with other nations to develop comprehensive and implementable
solutions. Your country’s ideas are the backbone for the resolutions developed in committee, and
it is essential that these resolutions are in accordance with both the goals and limitations of
DISEC.10
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
Topic I: The Future of Cybersecurity and Cyber Warfare
History and Background
The birth of the Internet originally began as a United States Department of Defense
military projects commissioned by the Advanced Research Projects Agency Network
(ARPANET). ARPANET was a successful advancement that allowed the U.S. military to share
data and information across large distances in just a few seconds.5 The development of highspeed e-mail communication also contributed to the increasing interest in a global cyber network.
With the boom in personal computer and server technologies around the mid-1980s, the Internet
became integrated with these computers and was available to the public in the 1990s.1 The
continuing improvements in the Internet through the creation of websites made people’s lives
easier, but at the same time contributed to the evolution of network security. Modern
developments in security have made the Internet more secure, but there continues to be breaches
in networks that needs to be addressed, given the widespread use of the Internet.
Relevant Action
Cyber security efforts in the international community have been centered around the
creation of global security centers and the promotion of cooperation. The first major action
against cyber attacks was the creation of 18 Cooperative Cyber Defense Centers of Excellence
by NATO.3 These centers build focus on research and training on cyber security, but also
analyze the legal aspects of cyber attacks. NATO works directly with these centers to provide the
necessary resources to ensure high quality training of individuals for cyber defense and
prevention efforts.10
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
The UN is known for being a forum of communication and collaboration among
member-states and thus, would like to focus cyber security on building cooperation on the issues
at hand. In December 2011, Resolution 66/24 was adopted by the General Assembly and urged
member states to take action on improving cyber security based on the recommendations from
expert bodies.10 A report titled, “On the Developments in the Field of Information and
Telecommunications in the Context of International Security” goes into detail about the
importance for promoting cyber stability, transparency, and confidence.3 The report recommends
that nations streamline their communication systems and allow for information sharing to ensure
global protection from cyber attacks through a collaborative effort.
The main issue of the UN’s promotion of collaboration is that many nations are sensitive
to cooperative international measures because of the distrust with other nations. With
collaboration comes the threat of stolen practices and confidential information that must be
accounted for when discussing cyber security measures. However, in general, the collaboration
of resource between nations have proven to be very successful in the response and recovery of
cyber attacks.4 For example, Australia and New Zealand have collaborated on cross border early
warning and response approaches to potential cyber attacks.7 This effort has been productive and
effective in ensuring cyber security for both nations. Similarly, combined efforts towards cyber
security research have the potential to save money while allowing nations to have access to the
best methods of cyber protection.10
Main Problems and Possible Solutions
The advent of new technologies and the rapid pace of Internet innovation creates
widespread social and economic benefits both on an individual and international scale. Many
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
nations are becoming more reliant on cyberspace because it is the backbone for day-to-day life in
modern society.4 However, although the Internet is praised for its ability to enrich personal and
professional lives, it is also faced with challenges from those who have the capacity to abuse its
interconnectivity. Ensuring that the international cyberspace is secure and safeguarded is
imperative for preventing high-consequence cyber attacks that have the potential to disrupt
national security, economic vitality, and even public health systems.4 As malicious individuals
begin to use more advanced methods and tools for hacking, the number of cyber attacks
continues to grow on a daily basis.
Currently, a majority of cyber attacks stem from criminals who focus on stealing
confidential data for the purpose of gaining a financial benefit. The Norton Report, published by
the Symantec organization in 2009, discovered that the direct cost of these cyber attacks has
increased from $110 billion to $113 billion in just 1 year.13 Accounting for the long-term
economic effects the attacks, a McAfee security report estimated nearly $575 billion worth of
direct loss coming from property theft, market manipulation, and financial crime.12 In 2013,
there were more than 800 million records of cyber attacks, a number that continues to grow and
impact both the economy and security of member states in the UN.9
One of the greatest challenges with respect to cyber crime is the lack of a standardized set
of cyber laws on a global scale. Variations in cyber security laws and policies within memberstates allows malicious attackers to take advantage of these “hotspots” for executing their
operations. For example, Brazil currently implements weak laws for cyber crime management
and loose policies for the protection for intellectual property.10 The lack of stringent cyber laws
have led to the development of a hacker population that faces little to no risk of prosecution.6
These areas, termed “rogue states”, serve as a safe zone for hackers to successfully execute
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
attacks of malicious intent because the regions do not many cyber abuse regulations. Because
cybercrime is an issue that spreads beyond the host nation, the growth of cybercrime in one
region can lead to a multitude of negative impacts on the security of other nations.1
Another important aspect of ensuring cyber security is the protection of critical
infrastructure systems within nations. Sectors such as energy, public health, and water must be
protected from any potential security threats to ensure the stability of nation’s infrastructure.7
The Stuxnet malware, which was a cyber operation conducted by the U.S. to shut down
centrifugation systems in Iran’s nuclear plants, shows the power of cyber attacks on critical
infrastructure.13 However, each nation’s technologies and implementation of critical
infrastructure tend to be different, which means a one-size-fits-all security measure can not
sufficiently combat cyber attacks on a global scale. Instead, cyber security solutions must have
the ability to focus on every nations specific risks in the cyber space but at the same time remain
effective internationally.
Questions to Consider:
1. How can international cooperation be implemented while accounting for some nation’s
distrust?
2. How can DISEC account for future changes in networking technologies and the risks
posed by these advancements?
3. How can cyber security standards be implemented on an international scale to prevent the
risks from “rogue states”, which lack necessary cyber infrastructure?
4. How can a solution prevent individual cyber crimes within nations while being broad
enough to cover international cyber warfare?
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
Works Cited
[1]
"After Snowden: The Road Ahead for Cybersecurity." AEI. AEI, 22 May 2014. Web. 06
Feb. 2015.
[2]
"Cyber Security Infographic." NATO Review. NATO Review, n.d. Web. 06 Feb. 2015.
[3]
"Cybersecurity: A Global Issue Demanding a Global Approach | UN DESA | United
Nations Department of Economic and Social Affairs." UN News Center. UN, 12 Dec.
2011. Web. 06 Feb. 2015.
[4]
"Finding Solutions. Together." Five Concerns and Five Solutions for Cybersecurity.
Global Economic Symposium, n.d. Web. 06 Feb. 2015.
[5]
"Foreign Policy Cyber Security." The White House. The White House, 12 Feb. 2013. Web.
04 Feb. 2015.
[6]
"Global Economic Crime 2014 Survey." PwC. PwC, n.d. Web. 06 Feb. 2015.
[7]
"Homeland Security." Blueprint for a Secure Cyber Future. Homeland Security, n.d. Web.
06 Feb. 2015.
[8]
James, Randy. "Cybercrime." Time. Time Inc., 01 June 2009. Web. 05 Feb. 2015.
[9]
"January 2015 Cyber Attack Statistics." Hackmageddon. Hackmageddon, 5 Feb. 2015.
Web. 06 Feb. 2015.
[10] Lacosse, Michelle, Devin Disabatino, and Jeffrey Nadel. DISEC ILMUNC XXXI.
Philadelphia: ILMUNC, n.d. PDF.
[11]
"United Nations, Main Body, Main Organs, General Assembly." UN News Center. UN,
n.d. Web. 06 Feb. 2015.
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
[12] "2014 McAfee Report on the Global Cost of Cybercrime." 2014 McAfee Report on the
Global Cost of Cybercrime. Center for Strategic & International Studies, 9 June 2014.
Web. 06 Feb. 2015.
[13] "30 Years of Risky Business: A Cybersecurity Timeline -- GCN." 30 Years of Risky
Business: A Cybersecurity Timeline -- GCN. GCN Staff, 3 June 2013. Web. 06 Feb. 2015.
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
Topic II: Illicit Arms Production and Distribution
History and Background
The production and distribution of illicit arms has destabilized the global community, as
it provides insurgents, gang members, pirates, and terrorists with multitudes of firepower.7 Most
conflicts today involve illicit small arms that are cheap, light, and transportable.7 In fact, more
human rights abuses are committed with small arms than with any other type of weapon.7 Illicit
arms have led to the incidents and killings of UN employees and peacekeepers, workers for
humanitarian and non-governmental organizations, and a myriad of human rights violations.7 As
small scale trade continuously grows across borders, a large-scale trade has become established
in a vicious cycle where illicit arms are passed from one conflict to another.
The production of illicit arms has shifted to markets, and up to 8 million small arms are
estimated to being produced each year.7 As production has increasingly become licensed and
craft production has become more commonplace in private workshops, production is often
uncontrolled and unmonitored.7 Because surplus government weapons are susceptible to theft
and can enter the illicit arms circulation 3, leaking government stockpiles have also become a
large source of illicit arms.7 Arms then become illicit through domestic systems of mass
distribution, leakage and resale amongst other methods.7 In the past, a majority of the selling and
monitoring of small arms was legal and effective, however private intermediaries between trade
have become more common--these intermediaries supply arms to suppliers to the government, as
well as private entities.7 Traders, agents, brokers, shippers, and financiers have also come to
combine their respective jobs to create complicated networks of trade that are indistinguishable
from legal brokering.7 The Small Arms Survey 2014 showed a relationship between illicit market
prices in Lebanon and the number of fatalities in the conflict in Syria, and suggests that
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
monitoring ammunition prices can serve as useful data to governments, however price
monitoring is uncommon in the international community.2
A case study of a failed illicit arms trade attempt in 2003 illustrates the measures traders
use to smuggle arms.3 In the incident, an associate of Victor “The Devil” Infante, who was
largely active in weapons exportation, was observed delivering a Federal Express Package from
the U.S. to the Philippines.3 The airway bill the associate used claimed his package contained a
camera tripod.3 Upon investigation, however, the package was found to contain parts for M-16
and AR-15 assault rifles.3 Similarly, the UN Security Council has discovered international
networks involved in illicit trade and has exploited brokers and dealers who work through legal
loopholes, evade customs and airport controls, and falsify documents such as passports.7
Relevant Action
Public safety lies first in the responsibility of individual governments to ensure that
government arms do not enter illicit trade, however countries have worked within the UN to take
action against illicit arms through commitment to: the Firearms Protocol, an Instrument on
marking and tracing, and the Basic Principles on the Use of Force and Firearms by Law
Enforcement Officials.7 Within the UN Office for Disarmament Affairs, 130 countries have
signed the Arms Trade Treaty, however only 61 have ratified it.4 In 2013, DISEC also adopted
Resolution A/68/411, titled “Assistance to States for curbing the illicit traffic in small arms and
light weapons and collecting them”.1
Most notable, however, is the UN Programme of Action. Agreed upon in 2001, it remains
the primary international agreement for illicit arms control.8 As a means of implementing the
actions set out in the UN Programme of Action, the UN Programme of Action Implementation
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
Support System (PoA-ISS) serves as a “one stop shop” for those working within the UN to
combat illicit small arms trade.5 The PoA-ISS provides information such as advisory networks
for contact points, clearing-house functions such as project proposals, and basic documentation
such as PoA reporting.5 Although the UN has implemented various frameworks of action to
reduce illicit arms trade and individual nations have taken steps to monitor their borders, the
issue of illicit arms production and distribution still wreaks havoc across the international
community, and increased measures must be taken to protect civilians.
Main Problems and Possible Solutions
In order to effectively monitor illicit arms circulation and curb the production of illicit
arms, realistic and cost-effective solutions are needed to ensure that the global community can
collaborate in addressing the issue. One of the inhibitors of effective solutions, however, is that
little data on the production, holdings, trade, legislation, and use of small arms is available.7
Without knowledge of the circulation of the illicit arms, only estimated statistics can be used to
take action against the illicit trade.7 Rather than increasing the bureaucracy of organizations
dedicated towards research, integration of research methods of small arms trade patterns in
existing bodies can assist efforts to better understand arms circulation. In addition, only a small
number of countries actively mark all weapons upon production to ensure proper recording of
weapons.7 An organized system of standardized arms labeling across national or international
borders could allow tracing of arms back to their owners. With the support of national
governments and enforcement from governments and bodies, the ability to trace illicit arms to
their owners could maximize national courts’ abilities to hold illicit traders accountable for their
actions.
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
In regards to the international community, a lack of a clear framework for all States to
guide decisions involving arms transfers can lead to inconsistent and misguided actions by
nations.7 Often times, the rule of law cannot be upheld in situations where armed violence is used
for resolving conflicts.7 Although standardized laws on an international scale may not be realistic
in terms of different country policies and circumstances, national governments should be
encouraged to develop policies that focus on limiting the stockpiling of government weapons
that are prone to leakage. Although the matter is controversial, destroying existing stockpiles
may dramatically reduce risk of stockpile leakage. For example, in Mozambique, civilians
benefitted from the “Transforming Arms into Tools” project founded by the Anglican Bishop
Dinis Sengulane.6 The project offered tools such as plows for farmers and school materials for
children in exchange for weapons that were later destroyed.6 Lastly, resources focused on
combating groups armed with illicit arms can often leave countries with little resources to
improve human and economic development, thus a balance in resource and funding distribution
from a variety of sources is essential to combat the issue of illicit arms trade in a cost-effective
manner.
Questions to Consider
1. Through what methods can the international community cooperate in more effectively
monitoring and tracking the distribution of both illicit and legal arms, as well as people
susceptible to being active in illicit arms trade?
2. How can nations take part in preventing legally created government weapons from
leaking into the illicit arm trade?
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
3. How can nations create or modify policies to prevent brokers and dealers from exploiting
loopholes avoiding legal consequences for trading illicit arms?
4. Because a country’s overall humanitarian and economic development can be essential to
reducing conflict as a whole, how can resources be distributed evenly to protect civilians
in armed conflicts involving the use of illicit arms while working towards national
development?
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015
TechMUN 2015
MS Disarmament and International Security Committee
Works Cited
[1]
General Assembly. "General Assembly." Assistance to States for Curbing the Illicit
Traffic in Small Arms and Light Weapons and Collecting Them(n.d.): 331-33. United
Nations. 9 Dec. 2013. Web. 27 Jan. 2015.
[2]
"Illicit Trafficking." Small Arms Survey. Small Arms Survey, n.d. Web. 26 Jan. 2015.
[3]
Schroeder, Matt. "The Illicit Arms Trade." Federation of American Scientists. N.p., n.d.
Web. 26 Jan. 2015.
[4]
"The Arms Trade Treaty." UNODA. UNODA, n.d. Web. 27 Jan. 2015.
[5]
"PoA-ISS." United Nations Programme of Action Implementable Support System. United
Nations Programme of Action Implementable Support System, 2012. Web. 27 Jan. 2015.
[6]
"Solutions for Stopping the Flow of Guns." Peace Education Fund. Peace Education
Fund, n.d. Web. 05 Feb. 2015.
[7]
"UNODA - Small Arms and Light Weapons." UNODA. UNODA, n.d. Web. 25 Jan.
2015.
[8]
"UN Programme of Action." Saferworld. N.p., n.d. Web. 27 Jan. 2015.
TechMUN at Stuart Thomas Jefferson High School for Science and Technology and JEB Stuart
High School Fairfax, VA | April 10-11, 2015