<<

Topic 1: Cyber Warfare

Eight years ago, a new type of was unleashed: the . The and created the Stuxnet to destroy the nuclear plant in Natanz, . It was programmed to attack programmable logic controllers that operate machinery, such as centrifuges that enrich uranium (Fruhlinger). The Stuxnet that attacked Iran in 2010 targeted 900 centrifuges, making them spin too quickly until they self-destructed (DeGeurin). From then on, cyber-attacks have grown to become another method of warfare. Last December, was responsible for the attack of a known as WannaCry. WannaCry spread from to computer through , encrypted all of the computer’s data, and asked for a ransom. Even after the ransom was paid, the files remained inaccessible (Bossert). The attack ravaged Britain’s National Health Service, and took a toll on , , and (Hern and Gibbs). These are two of the most well-known attacks, but many more have occurred and are expected to occur with the advancement of technology.

Cyber warfare is defined as “the use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or purposes” (Shepherd). Due to this new type of warfare, all electronic systems, especially those which are outdated or unprotected, are at risk. Hospital machinery can be programmed to malfunction and kill a patient and a virus can cause a plane to (Wheeler). Attacks are not limited to a single region. They can easily get out of hands and cross borders, causing billions of dollars of unintended damage (DeGuerin). Cyber warfare also includes spreading false news to impact campaigns (O’Flaherty).

There are no rules governing cyber warfare as there are regarding other forms of . During wartime, international law mandates that armies cannot target civilians. However, with a , a can spread and affect thousands of innocent people. There is also no operative definition of what is considered an act of war in the cyber plane. Since there is no legislation regarding cyber warfare, the U.N. has been unable to interfere (Wheeler).

The delegates of the and International Security Committee are tasked with creating a resolution to navigate this new of warfare. Please consider:

● What is an operative definition of cyber warfare that can be used by the United Nations? ● Should cyber warfare be illegal, along with biological and ? ● Are there any benefits to cyber warfare in comparison to other forms of war? ● What constitutes a cyberattack to which a country may strike back? ● How should a country respond to cyber warfare? ● If can jump borders and not be stopped, is it ethical to use? (Allhoff et al.) Best of Luck,

Yael Blau Chair, Disarmament and International Security Committee YUNMUN XXIX

Works Cited Allhoff, Fritz, Patrick Lin, and Neil Rowe. “Is it Possible to Wage a Just Cyberwar?” The ​ Atlantic. 5 June 2012. ​ www.theatlantic.com/technology/archive/2012/06/is-it-possible-to-wage-a-just-cyberwar/ 258106/. ​ Bossert, Thomas P. “It's Official: North Korea Is Behind WannaCry.” The Wall Street Journal, ​ ​ Dow Jones & Company, 18 Dec. 2017, www.wsj.com/articles/its-official-north-korea-is-behind-wannacry-1513642537. ​ DeGeurin, Mack. “U.S. Silently Enters New Age of .” New York Magazine, 11 ​ ​ Sep. 2018. nymag.com/selectall/2018/09/us-rescinds-ppd-20-cyber-command-enters-new-age-of-cyb erwar.html. ​ Fruhlinger, Josh. “What is Stuxnet, Who Created it, and How Does it Work?” CSO, 22 Aug. ​ ​ 2017. www.csoonline.com/article/3218104/malware/what-is-stuxnet-who-created-it-and-how-d oes-it-work.html. ​ Hern, Alex, and Samuel Gibbs. “What Is WannaCry Ransomware and Why Is It Attacking Global ?” , Guardian News and Media, 12 May 2017, ​ ​ www.theguardian.com/technology/2017/may/12/nhs-ransomware-cyber-attack-what-is-w anacrypt0r-20. ​ O’Flaherty, Kate. “Cyber Warfare: The from Nation States.” Forbes, 3 May 2018. ​ ​ www.forbes.com/sites/kateoflahertyuk/2018/05/03/cyber-warfare-the-threat-from-nation- states/#4f22f0131c78. ​ Shepherd, Adam. “What Is Cyber Warfare?” IT PRO, 6 Aug. 2018, ​ ​ www.itpro.co.uk/security/28170/what-is-cyber-warfare. ​ Wheeler, Tarah. “In Cyberwar, There are No Rules.” Foreign Policy, 12 Sep. 2018. ​ ​ foreignpolicy.com/2018/09/12/in-cyberwar-there-are-no-rules-cybersecurity-war-defense /