Tstable of Content

Total Page:16

File Type:pdf, Size:1020Kb

Tstable of Content ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 North Atlantic Treaty Organization London International Model United Nations 18th Session | 2017 tsTable of Content 1 ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 Table of Contents Table of Contents WELCOME TO THE NORTH ATLANTIC TREATY ORGANIZATION .............................................................. 3 INTRODUCTION TO THE COMMITTEE .................................................................................................................. 4 TOPIC A: FORMING A NATO STRATEGY IN CYBERSPACE ............................................................................. 5 INTRODUCTION ............................................................................................................................................................... 5 HISTORY OF THE PROBLEM ............................................................................................................................................. 6 Timeline of notable attacks ....................................................................................................................................... 7 1998 – 2001 “MOONLIGHT MAZE” ....................................................................................................................... 7 2005 – 2011 TITAN RAIN & BYZANTINE HADES .................................................................................................. 8 2007 Estonia DDoS Campaigns ................................................................................................................................ 9 2008 Russia – Georgia War ...................................................................................................................................... 9 STATEMENT OF THE PROBLEM ...................................................................................................................................... 10 December 2015 BlackEnergy3 Malware in Western Ukraine ................................................................................ 10 2016 US Election Hacking Campaigns ................................................................................................................... 11 The Attribution Problem.......................................................................................................................................... 12 Is this Cyber War? .................................................................................................................................................. 12 Defining ‘Critical National Infrastructure’............................................................................................................. 13 Collective Security Assurances ............................................................................................................................... 13 Regulating Attack Toolkits ...................................................................................................................................... 14 Building Readiness .................................................................................................................................................. 14 ‘BLOC POSITIONS’ ........................................................................................................................................................ 16 QUESTIONS A RESOLUTION SHOULD ANSWER .............................................................................................................. 16 SOURCES ....................................................................................................................................................................... 17 TOPIC B: NATO’S EASTERN DIMENSION: ASSURING ALLIES AND DETERRING RUSSIA .................... 20 INTRODUCTION ............................................................................................................................................................. 20 HISTORY OF THE PROBLEM ........................................................................................................................................... 21 Enlargement of NATO ............................................................................................................................................. 21 Agreements .............................................................................................................................................................. 23 STATEMENT OF THE PROBLEM ...................................................................................................................................... 24 Eastward expansion ................................................................................................................................................ 24 The Ukraine conflict ................................................................................................................................................ 25 Anti-ballistic missile defence ................................................................................................................................... 26 Rapid response force ............................................................................................................................................... 27 CURRENT SITUATION .................................................................................................................................................... 28 2016 Warsaw summit .............................................................................................................................................. 28 Military exercises .................................................................................................................................................... 29 BLOC POSITIONS ........................................................................................................................................................... 30 QUESTIONS A RESOLUTION SHOULD ANSWER .............................................................................................................. 31 SOURCES ....................................................................................................................................................................... 32 CONFERENCE INFORMATION ................................................................................................................................ 34 2 ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 Welcome to the North Atlantic Treaty Organization Dear Delegates, After having completed a War Studies degree at King’s College London, I am currently pursuing a Masters in Management at the London School of Economics. During my MUN career, I have been active in the American, European, and world circuits, and held tenure as President & Founder of the KCL United Nations Association as well as Best Delegate Media Chair of the United Kingdom. LIMUN always holds a special place for me. It is thus an honor to return for the fourth time with my partner-in-crime Gabriela Silova. We are excited to deliver the very best chairing to you all. NATO will be a challenging yet rewarding committee for you all. With consensus voting and complex current topics, there will be no shortage of material for you to address head-on. Good luck on your preparation and if you have any questions, please do not hesitate to send us an e- mail! Your Director, Yuji Develle – [email protected] Dear Delegates, My name is Gabriela Silova, and after graduating from King’s College London with BSc in Political Economy, I joined a graduate scheme with an investment bank in London. Throughout my academic years, I had the pleasure to attend the highest quality conferences worldwide both as a delegate and a chair. Having participated in NATO committees in the past myself, I am delighted to be your Assistant Director alongside Yuji, while we tackle two pressing topics. Since LIMUN 2017 will also be my fourth time I return to the conference, I have no doubt about the quality of debate and negotiation from you delegates. All the best with research! Your Assistant Director, Gabriela Silova 3 ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2017 Introduction to the committee Founded as a result of the North Atlantic Treaty on 4 April 1949, the North Atlantic Treaty Organization is the world’s largest (and arguably most powerful) military alliance comprising 28 members from both sides of the Atlantic in the North American and European continents. A political & military alliance, system of collective defence, channel for trans- Atlantic security cooperation, and think tank for strategic doctrine, NATO pursues its core missions in four major ways. Decisions & Consultations at a variety of political and military levels made across all 28 states and decided upon in a consensual manner; Active Operations & Missions in Afghanistan, Kosovo, Africa (broadly), the Mediterranean, and the Horn of Africa under the premises of Article 5 of the Washington Treaty and/or a UNSC mandate; Partnerships developed with other countries and organizations to the end of strengthening its depth and reach; Constant re-evaluation and re-developing of members states’ policies, capabilities, and structures so as to remain at the forefront of rapidly evolving new threats. (NATO.int) In this simulation, you will be representing a member state of the North Atlantic Council, the ‘principal political decision-making body of NATO’ (NATO.int). Decisions are undertaken on a consensual basis. While the
Recommended publications
  • Xbt.Doc.248.2.Pdf
    MAY 25, 2018 United States District Court Southern District of Florida Miami Division CASE NO. 1:17-CV-60426-UU ALEKSEJ GUBAREV, XBT HOLDING S.A., AND WEBZILLA, INC., PLAINTIFFS, VS BUZZFEED, INC. AND BEN SMITH, DEFENDANTS Expert report of Anthony J. Ferrante FTI Consulting, Inc. 4827-3935-4214v.1 0100812-000009 Table of Contents Table of Contents .............................................................................................................................................. 1 Qualifications ..................................................................................................................................................... 2 Scope of Assignment ......................................................................................................................................... 3 Glossary of Important Terms ............................................................................................................................. 4 Executive Summary ........................................................................................................................................... 7 Methodology ..................................................................................................................................................... 8 Technical Investigation ................................................................................................................................ 8 Investigative Findings .......................................................................................................................................
    [Show full text]
  • ENGLISH Only
    The OSCE Secretariat bears no responsibility for the content of this document FSC.DEL/31/21 and circulates it without altering its content. The distribution by OSCE 29 January 2021 Conference Services of this document is without prejudice to OSCE decisions, as set out in documents agreed by OSCE participating States. ENGLISH only STATEMENT on the Joint Turkish-Azerbaijani Large-Scale Military Exercise as delivered by the Delegation of the Republic of Armenia at the 966th Plenary Meeting of the Forum for Security Co-operation 27 January 2021 Madam Chairperson, On 17 January the Ministry of Defense of Turkey announced through its official website about conducting the «Winter-2021» joint Turkish-Azerbaijani military exercise in Kars from 1 to 12 February. This was followed by information disseminated by the Ministry of Defense of Azerbaijan on the departure of the military personnel and equipment of the Nakhijevan Combined Army of Azerbaijan to Turkey to take part in the joint military exercise. According to the Turkish media reports, the planned exercise is expected to be one of the largest winter military drills of recent times aimed, among others, at improving cooperation and coordination during joint military operations and testing combat capabilities under extreme weather conditions. Reportedly, the military exercise will involve tank divisions, heavy artillery, sniper teams, helicopters and special forces. At the previous meeting of the FSC we drew the attention of the participating States to this exercise. In response to our inquiry Turkish delegation here in Vienna insisted that the exercise was not notified under the Vienna Document because of the small number of the military personnel and equipment to be engaged in it.
    [Show full text]
  • Security > Automotive > Blockchain > Virtual and Augmented Reality
    > Security > Automotive > Blockchain > Virtual and Augmented Reality AUGUST 2018 www.computer.org CALL FOR NOMINEES Education Awards Nominations Taylor L. Booth Education Award Computer Science and Engineering Undergraduate Teaching Award A bronze medal and US$5,000 honorarium are awarded for an outstanding record in computer science and engineering A plaque, certificate and a stipend of US$2,000 is education. The individual must meet two or more of the awarded to recognize outstanding contributions to following criteria in the computer science and engineering field: undergraduate education through both teaching and service and for helping to maintain interest, increase the • Achieving recognition as a teacher of renown. visibility of the society, and making a statement about the • Writing an influential text. importance with which we view undergraduate education. • Leading, inspiring or providing significant education content during the creation of a curriculum in the field. The award nomination requires a minimum of three • Inspiring others to a career in computer science and endorsements. engineering education. Two endorsements are required for an award nomination. See the award information at: See the award details at: www.computer.org/web/awards/booth www.computer.org/web/awards/cse-undergrad-teaching Deadline: 1 October 2018 Nomination Site: awards.computer.org r5p77.indd 77 5/9/18 3:30 PM IEEE COMPUTER SOCIETY computer.org • +1 714 821 8380 STAFF Editor Managers, Editorial Content Meghan O’Dell Brian Brannon, Carrie Clark Contributing Staff Publisher Christine Anthony, Lori Cameron, Cathy Martin, Chris Nelson, Robin Baldwin Dennis Taylor, Rebecca Torres, Bonnie Wylie Senior Advertising Coordinator Production & Design Debbie Sims Carmen Flores-Garvey Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society.
    [Show full text]
  • A PRACTICAL METHOD of IDENTIFYING CYBERATTACKS February 2018 INDEX
    In Collaboration With A PRACTICAL METHOD OF IDENTIFYING CYBERATTACKS February 2018 INDEX TOPICS EXECUTIVE SUMMARY 4 OVERVIEW 5 THE RESPONSES TO A GROWING THREAT 7 DIFFERENT TYPES OF PERPETRATORS 10 THE SCOURGE OF CYBERCRIME 11 THE EVOLUTION OF CYBERWARFARE 12 CYBERACTIVISM: ACTIVE AS EVER 13 THE ATTRIBUTION PROBLEM 14 TRACKING THE ORIGINS OF CYBERATTACKS 17 CONCLUSION 20 APPENDIX: TIMELINE OF CYBERSECURITY 21 INCIDENTS 2 A Practical Method of Identifying Cyberattacks EXECUTIVE OVERVIEW SUMMARY The frequency and scope of cyberattacks Cyberattacks carried out by a range of entities are continue to grow, and yet despite the seriousness a growing threat to the security of governments of the problem, it remains extremely difficult to and their citizens. There are three main sources differentiate between the various sources of an of attacks; activists, criminals and governments, attack. This paper aims to shed light on the main and - based on the evidence - it is sometimes types of cyberattacks and provides examples hard to differentiate them. Indeed, they may of each. In particular, a high level framework sometimes work together when their interests for investigation is presented, aimed at helping are aligned. The increasing frequency and severity analysts in gaining a better understanding of the of the attacks makes it more important than ever origins of threats, the motive of the attacker, the to understand the source. Knowing who planned technical origin of the attack, the information an attack might make it easier to capture the contained in the coding of the malware and culprits or frame an appropriate response. the attacker’s modus operandi.
    [Show full text]
  • Investigative Techniques of N-Way Vendor Agreement and Network Analysis Demonstrated with Fake Antivirus
    2014 Annual ADFSL Conference on Digital Forensics, Security and Law Proceedings May 29th, 2:40 PM Investigative Techniques of N-Way Vendor Agreement and Network Analysis Demonstrated with Fake Antivirus Gary Warner The University of Alabama at Birmingham, [email protected] Mike Nagy The University of Alabama at Birmingham, [email protected] Kyle Jones The University of Alabama at Birmingham, [email protected] Kevin Mitchem The University of Alabama at Birmingham, [email protected] Follow this and additional works at: https://commons.erau.edu/adfsl Part of the Aviation Safety and Security Commons, Computer Law Commons, Defense and Security Studies Commons, Forensic Science and Technology Commons, Information Security Commons, National Security Law Commons, OS and Networks Commons, Other Computer Sciences Commons, and the Social Control, Law, Crime, and Deviance Commons Scholarly Commons Citation Warner, Gary; Nagy, Mike; Jones, Kyle; and Mitchem, Kevin, "Investigative Techniques of N-Way Vendor Agreement and Network Analysis Demonstrated with Fake Antivirus" (2014). Annual ADFSL Conference on Digital Forensics, Security and Law. 3. https://commons.erau.edu/adfsl/2014/thursday/3 This Peer Reviewed Paper is brought to you for free and open access by the Conferences at Scholarly Commons. It has been accepted for inclusion in Annual ADFSL Conference on Digital Forensics, Security and Law by an (c)ADFSL authorized administrator of Scholarly Commons. For more information, please contact [email protected]. ADFSL Conference on Digital Forensics, Security and Law, 2014 INVESTIGATIVE TECHNIQUES OF N-WAY VENDOR AGREEMENT AND NETWORK ANALYSIS DEMONSTRATED WITH FAKE ANTIVIRUS Gary Warner [email protected] Mike Nagy [email protected] Kyle Jones [email protected] Kevin Mitchem [email protected] The University of Alabama at Birmingham Birmingham, AL ABSTRACT Fake AntiVirus (FakeAV) malware experienced a resurgence in the fall of 2013 after falling out of favor after several high profile arrests.
    [Show full text]
  • Analysis Report Blackenergy
    Analysis Report iTrust-Analysis-001 May 2016 BlackEnergy - Malware for Cyber-Physical Attacks About iTrust iTrust is a multidisciplinary research centre located in the Singapore University of Technology and Design (SUTD), established collaboratively by SUTD and the Ministry of Defence, Singapore (MINDEF). The focus of iTrust is on cyber security, spanning across three research areas: a. Cyber Physical System (CPS); b. Enterprise Networking / Security; and c. Internet of Things (IoT). iTrust researchers focus on the development of advanced tools and methodologies to ensure security and safety of current and future cyber physical systems and Internet of Things (IoT) systems. Systems of interest include large infrastructure of national importance such as power grid, water treatment, and oil refineries as well as cyber-devices such as smart watches, pacemakers, defibrillators, insulin pumps, and VNS implants. Cyber physical systems is one of the many areas we are working on. The focus of the proposed research is to improve our understanding of cyber threats to CPSs and to develop and experiment with strategies to mitigate such threats. Our approach is based on well understood technical foundations borrowed from the interdisciplinary fields of control theory, artificial intelligence, game theory, networking, and software engineering. The techniques propose will be evaluated against, and demonstrated in our Secure Water Treatment (SWaT) Testbed, Water Distribution System (WADI) testbed, and Electric Power and Intelligent Control (EPIC) testbed. Similarly, shielded room laboratory for IoT research. iTrust researchers are drawn from across SUTD and with a strong collaboration with Massachusetts Institute of Technology (MIT), enrich the depth, breadth, and quality of research.
    [Show full text]
  • Yokogawa Innovative Plant Automation Security Solutions
    White Paper : Yokogawa Innovative Plant Automation Security Solutions Contents 1. Industrial Automation and Business Network Integration .......... 2 1.1. Necessity of IA System Security ................................................................................... 2 1.2. Yokogawa Cyber Security for Industrial Control System ............................................... 3 1.3. IA System Security Priorities .......................................................................................... 4 2. Continuous Security Concept ........................................................ 6 2.1. What are the Demands ................................................................................................. 6 2.2. Security Lifecycle Approach ........................................................................................... 6 2.3. Defense in Depth ........................................................................................................... 8 2.4. Yokogawa Security Competency Laboratories .............................................................. 8 3. Security Design and Implementation Solutions ........................... 9 3.1. Typical Network Architecture.......................................................................................... 9 3.2. Standardized Security Solutions .................................................................................. 10 3.3. Secure Designed Products .......................................................................................... 15 4. Security Operation
    [Show full text]
  • Navy RPA Comments- Through 12/18/2020
    Navy RPA Comments- through 12/18/2020 I object to the Navy’s proposal to use our State Parks for training. There are serious problems with the proposal. Allowing the Navy to use our State Parks for training would further militarize our society, taking over a large number of parks (29) for military training. We use our parks for peace, solitude, getting back to nature, getting in tune with our family and ourselves. There is no need to use these spaces. Stop, just stop. This is a terrible idea. I firmly object. This is wrong. Stop.1 The Navy has and continues to destroy our state and national parks, our homes, environment, wildlife and communities with toxic jet noise and war games. Our State Parks are for us the Citizens, not military war games. Just say no to the Bullish Toxic Navy.2 I OBJECT to the Navy’s proposal to use our State Parks for training! There are serious problems with the proposal. Allowing the Navy to use our State Parks for training would further militarize our society, taking over a large number of parks (29) for military training. One of the key responsibilities for civil authorities is to tell the military when enough is enough. Just say NO to using public parks for military training!3 In these days of great division in our civil society, we don't need stealthy men in camo uniforms toting toy guns around our State and County Parks. People frequent parks to escape tension, not to encounter more. Keep the Navy commando training out of our parks!4 Please don’t let the military train in our parks.5 I am vehemently opposed to allowing military training in our 29 public parks.
    [Show full text]
  • Training to Fight – Russia's Major Military Exercises 2011–2014
    “Train hard, fi ght easy.” The Russian 18th century General Aleksandr Norberg Johan toFight Training Vasilievich Suvorov (see cover) is said to never have lost a battle. The main idea of his dictum is clear. Armed forces train to fi ght. The more they train, the better they get. Exercises are primarily a way to develop capabilities in units, build the fi ghting power of a force and, ultimately, the military power of the state. How did military exercises contribute to the fi ghting power of Russia’s Armed Forces in 2011 – 2014? Based on reporting in Russian open sources, the main conclusion in this report is that the Russian Armed Forces exercises enabled them to train how to launch and fi ght large-scale joint inter-service operations, i.e. launching and waging inter-state wars Training to Fight – Russia’s Major Military Exercises 2011–2014 Johan Norberg FOI-R--4128--SE ISSN1650-1942 www.foi.se December 2015 Johan Norberg Training to Fight – Russia’s Major Military Exercises 2011–2014 Press Bild/Cover: TT/The Art Collector/Heritage. Alexander Suvorov, Russian general, (1833). In a military career lasting almost 60 years, Suvorov (1729-1800) never lost a battle. In 1799-1800, during the War of the Second Coalition against France, he led a Russian army on an epic retreat across the Alps reminiscent of Hannibal. Found in the collection of The Hermitage, St Petersburg. FOI-R--4128--SE Titel Training to Fight Title Training to Fight Rapportnr/Report no FOI-R--4128--SE Månad/Month December Utgivningsår/Year 2015 Antal sidor/Pages 100 ISSN 1650-1942 Kund/Customer Försvarsdepartementet / Swedish Ministry of Defence Forskningsområde 8.
    [Show full text]
  • ESET THREAT REPORT Q3 2020 | 2 ESET Researchers Reveal That Bugs Similar to Krøøk Affect More Chip Brands Than Previously Thought
    THREAT REPORT Q3 2020 WeLiveSecurity.com @ESETresearch ESET GitHub Contents Foreword Welcome to the Q3 2020 issue of the ESET Threat Report! 3 FEATURED STORY As the world braces for a pandemic-ridden winter, COVID-19 appears to be losing steam at least in the cybercrime arena. With coronavirus-related lures played out, crooks seem to 5 NEWS FROM THE LAB have gone “back to basics” in Q3 2020. An area where the effects of the pandemic persist, however, is remote work with its many security challenges. 9 APT GROUP ACTIVITY This is especially true for attacks targeting Remote Desktop Protocol (RDP), which grew throughout all H1. In Q3, RDP attack attempts climbed by a further 37% in terms of unique 13 STATISTICS & TRENDS clients targeted — likely a result of the growing number of poorly secured systems connected to the internet during the pandemic, and possibly other criminals taking inspiration from 14 Top 10 malware detections ransomware gangs in targeting RDP. 15 Downloaders The ransomware scene, closely tracked by ESET specialists, saw a first this quarter — an attack investigated as a homicide after the death of a patient at a ransomware-struck 17 Banking malware hospital. Another surprising twist was the revival of cryptominers, which had been declining for seven consecutive quarters. There was a lot more happening in Q3: Emotet returning 18 Ransomware to the scene, Android banking malware surging, new waves of emails impersonating major delivery and logistics companies…. 20 Cryptominers This quarter’s research findings were equally as rich, with ESET researchers: uncovering 21 Spyware & backdoors more Wi-Fi chips vulnerable to KrØØk-like bugs, exposing Mac malware bundled with a cryptocurrency trading application, discovering CDRThief targeting Linux VoIP softswitches, 22 Exploits and delving into KryptoCibule, a triple threat in regard to cryptocurrencies.
    [Show full text]
  • Table of Content
    ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2018 World Conference on Cybersecurity (WCC) London International Model United Nations 19th Session | 2018 Table of Content I ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2018 Table of Contents Introduction Letters .................................................................................................... 1 Yuji DEVELLE ........................................................................................................ 1 Chloe AMELLAL .................................................................................................... 1 Isabel VICARÍA BARKER ..................................................................................... 2 Introduction to the Committee ................................................................................... 3 Topic A: Defining Cyberspace and Classifying Cyber-attacks .............................. 5 Introduction .............................................................................................................. 5 Key Concepts ............................................................................................................ 6 Cyberspace .............................................................................................................. 6 Cyber warfare vs. cyber crime................................................................................ 8 Cyber-attacks ........................................................................................................ 10 Hacking ................................................................................................................
    [Show full text]
  • United States Tactical Nuclear Doctrine: Developing a Capability
    W&M ScholarWorks Dissertations, Theses, and Masters Projects Theses, Dissertations, & Master Projects 1979 United States tactical nuclear doctrine: Developing a capability Christopher Michael Cooke College of William & Mary - Arts & Sciences Follow this and additional works at: https://scholarworks.wm.edu/etd Part of the International Relations Commons, and the Military and Veterans Studies Commons Recommended Citation Cooke, Christopher Michael, "United States tactical nuclear doctrine: Developing a capability" (1979). Dissertations, Theses, and Masters Projects. Paper 1539625067. https://dx.doi.org/doi:10.21220/s2-zset-zj41 This Thesis is brought to you for free and open access by the Theses, Dissertations, & Master Projects at W&M ScholarWorks. It has been accepted for inclusion in Dissertations, Theses, and Masters Projects by an authorized administrator of W&M ScholarWorks. For more information, please contact [email protected]. United States Tactical Nuclear ii Doctrines Developing A Capability A Thesis Presented to The Faculty of the Department of Government The College of William and Mary in Virginia In Partial Fulfillmait Of the Requirements for the Degree of Master of Arts by Christopher Cooke 1979 APPROVAL SHEET This thesis is submitted in partial fulfillment of the requirements for the degree of Master of Arts Christopher Cooke Approved, August 1979 ar Magaret Hamilton ACKNOWLEDGMENTS The author wishes to express his appreciation to Professor Alan J. Ward, under whose guidance this study was conducted, for his very helpful advice and, especially, for his considerable editorial skill. The author is also indebted to Professors Margaret Hamilton and George Grayson for their careful reading and criticism of the manuscript. LIST OF TABLES Figure Page A.
    [Show full text]