Asia-Europe Meeting

Topic A: Identifying, Sharing and Remediating Faults in Cybersecurity Topic B: Tackling Local, Regional and Global Hunger

MUNUC 32

TABLE OF CONTENTS

______

Letter from the Chair………………………………………………………….. 3

Topic A ………………………………………………………………………..… 4 Statement of the Problem…………………………………………….. 4 History of the Problem……………………………………….…..…….. 9 Past Actions…………………………………………………………….. 14

Possible Solutions………………………………………………………. 18 Bloc Positions…………………………………………………………… 20

Glossary…………………………………………………………………. 22

Topic B ………………………………………………………………...………. 23 Statement of the Problem…………………………………………….23

History of the Problem………………………………………………… 28 Past Actions…………………………………………………………….. 31 Possible Solutions………………………………………………………. 33 Bloc Positions…………………………………………………………… 35 Glossary…………………………………………………………………. 37

Bibliography……………………………………….…………………………. 38

2 Asia-Europe Meeting | MUNUC 32 LETTER FROM THE CHAIR

______

Dear Delegates,

Welcome to the Asia-Europe Meeting Forum, or ASEM, at MUNUC 32!

My name is Randolph Ramirez, and I usually go by Randy. I am a third year here at The University of Chicago studying Statistics and Political Science. I was born and raised in Wilton, Connecticut, and coming out to attend UChicago was my first trip out to Illinois! All throughout high school I was heavily involved in Model Congress, and partaking in MUNUC my first year here helped transition me into the world of Model UN! I am certain that this conference and committee will be a success, and I cannot wait to experience it with you all!

The Asia-Europe Meeting Forum will offer a multitude of experiences, problems, solutions, and overall will hopefully give a descriptive look into the affairs of the two regions. Throughout this experience, I hope delegates learn the various factors that make solving the issues of cybersecurity and huger instability a difficult endeavor, and how best to go about solving them.

When preparing for the conference, I sincerely advise delegates to research the policies, positions, and stances of their respective nations to best facilitate the problem solving and discussions of the committee. The most useful information to delegates pertains to that of their individual nations, and preparation for the conference will benefit the delegates greatly.

Debate, conversation, and deliberations within the committee will prove inviting, exhilarating, and most of all productive so long as delegates provide their own insight, research, and possible solutions. I am more than excited for ASEM, and I hope you all look forward to MUNUC 32!

Sincerely,

Randy Ramirez

3 Asia-Europe Meeting | MUNUC 32 TOPIC A: IDENTIFYING, SHARING AND REMEDIATING FAULTS IN CYBERSECURITY

______

Statement of the Problem

Relation to ASEM:

Cybersecurity issues plague nearly every county and every company that operates in the modern age. With ASEM in particular, the countries in question often lead the forefront in a multitude of enterprises. Whether it includes healthcare, online marketplaces, auto industries, medical treatments, social networks, or any market one can think of, Asia and Europe hold considerable stake in the wellbeing of the world. Asia and Europe make up more than half of the world’s GDP after all, and combined the two overtake the United States. As such, maintaining cybersecurity is one of the main concerns of the two regions. As the world becomes more and more connected, with Europe and Asia leading the charge alongside North America, ensuring we do so safely requires well thought out, proactive cybersecurity policies. As an example, 74% of Asia and Central Europe use the

internet, and this statistic grows higher and higher with time1. A Cyber Security Crisis has been looming over the heads of many nations and a body such ASEM holds the unique opportunity to take action. Before determining the best ways to do so however, a stronger understanding of what cybersecurity must be developed.

Definition of Cybersecurity in the Modern Age:

Cybersecurity encompasses an incredible range of relevant topics, issues, policies, and ideas. Additionally, the implications behind cybersecurity change with each and every country that interacts with the topic. Yet, certain unifying qualities bring about an agreeable definition from the ITU, or International Telecommunications Union:

1 “Individuals Using the Internet (% of Population) | Data.” Accessed May 21, 2019. https://data.worldbank.org/indicator/it.net.user.zs?most_recent_value_desc=true.

4 Asia-Europe Meeting | MUNUC 32 “Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can

be used to protect the cyber environment and organization and user’s assets”2.

Although rather robust, this definition provides a good starting point for what cyber security is. At its core, cybersecurity pertains to any method or policy that aims to secure and protect one’s connection and usage of the internet. Cybersecurity continues to grow in importance, and as such the range of policies within cybersecurity grows in number as well. Studies to be discussed later on will show the vastness of cybersecurity and , and also give brief insight as to how to address the problem.

Prevalence of Cyber Attacks and Its Impact on Privacy and the Economy.

Cybersecurity’s main connection to the average person, and thus the many residents and citizens of ASEM, pertains to cyber attacks on major corporations and its impact on the economy and people’s privacy. For instance, regarding privacy, multiple info breaches have occurred that compromise the privacy of up to billions of individuals, with the largest breach to occur in the world being Yahoo’s

2013 Data Breach3 of 3 billion individuals. Polls funded and issued by the European Commission in 2017 found that 86% of Europeans believe that the risk of being a victim to a cybercrime is increasing

with time4. As for the companies themselves, the same poll found that 80% of European companies

experienced some form of a cyber crime in the past year5. Further, certain member states cite that

50% of all of their crimes can be defined as cyber crimes6. These staggering numbers have increased since then as the growth rate of outmatches the rate at which policy develops to counteract said crimes.

2 “Cybersecurity.” Accessed May 21, 2019. https://www.itu.int/en/ITU-T/studygroups/com17/Pages/cybersecurity.aspx. 3 “All 3 Billion Yahoo Accounts Were Affected by 2013 Attack - The New York Times.” Accessed May 21, 2019. https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion-users.html. 4 “EU to Become More Cyber-Proof as Council Backs Deal on Common Certification and Beefed-up Agency - Consilium.” Accessed July 9, 2019. https://www.consilium.europa.eu/en/press/press-releases/2018/12/19/eu-to-become-more-cyber- proof-as-council-backs-deal-on-common-certification-and-beefed-up-agency/. 5 Ibid. 6 Ibid.

5 Asia-Europe Meeting | MUNUC 32 A similar trend can be found in Asia. Black Hat’s survey on Asian companies and executives found that 62% of those surveyed find it likely, very likely, or almost certain that a major data breach will

affect their company in the next 12 months7. Note that a major data breach puts many more at risk than the standard cybercrime cited in the European study, and having so many officials fear such a breach contextualizes the state of cybersecurity in Asia specifically. Like Europe, Asia heavily relies on technology and media, yet lacks the infrastructure or policies to do so safely and securely.

Additionally, Cybercrime greatly detriments both regional and global economies. A 2018 study from CSIS, or the Center for Strategic and International Studies found that nearly 1% of all global GDP, or $600 Billion, is lost to cyber crimes alone. Not only is this amount quickly approaching $1 Trillion, but it has increased from their 2014 study that reported $445 billion in losses. The EU noticed a 38% increase in rate of cybercrimes between 2014 and 2015. This combined with the financial impact prove the growing threat of cybercrime in the upcoming year, and prove that ASEM must respond in a timely manner.

Lack of Collaboration Between Nations and Companies Currently

Perhaps the most important reason for ASEM in particular to create and guide policy on the issue comes from the lack of unified policy in the first place. Many nations implement their own versions of cybersecurity policy that on a regional level would find much more success, since many other nations have no idea how to implement such policy. Awareness of cybersecurity policy falters greatly, as the

7“Cybersecurity_Risk_In_Asia.Pdf.” Accessed May 19, 2019. https://www.blackhat.com/docs/us- 18/Cybersecurity_Risk_In_Asia.pdf.

6 Asia-Europe Meeting | MUNUC 32 EU study finds that 69% of European Companies have either a very basic or no understanding of the risks to the cybersecurity of their company. Similarly, a study from Marsh and Mclennan have found Asia as a prime target for cybercriminals. More specifically, they found 70% of firms do not have a

strong understanding of their cyber posture8. This leads to Asian firms taking 1.7 times longer to respond to breaches than others, and $81 Billion in revenue lost to cyber attacks alone. Without guidance of any sorts, such companies falter in the face of cybercrimes.

As such, individual countries stand incredibly far from each other in terms of their policy, and the efficacy of their policies. Consider differences in Asia for instance;

9

Such stark differences between countries with decently similar GDPs and economic statuses only highlights the lack of collaboration and cooperation on founding long lasting, effective, continent wide policies that would benefit all. As such, ASEM serves as the perfect body to coordinate this policy.

ASEM Moving Forwards

8 “CYBER RISK IN ASIA-PACIFIC THE CASE FOR GREATER TRANSPARENCY” Accessed May 21, 2019. http://www.mmc.com/content/dam/mmc-web/Files/APRC/aprc-cyber-risk-in-asia-pacific.pdf 9 “Global Cybersecurity Index: Which Asian Country Has the Best Cyber Security Strategy? | Asia News Network.” Accessed May 21, 2019. http://www.asianews.eu/content/global-cybersecurity-index-which-asian-country-has-best- cyber-security-strategy-61564.

7 Asia-Europe Meeting | MUNUC 32 Clearly action and guidance must be provided for the nations that partake in the Asia-Europe Meeting, but finding policies all agree upon proves difficult. Delegates will hopefully use the unique membership of ASEM in tandem with standard cooperation and collaboration efforts in order to draft forms of policy that protect and secure the cybersecurity of the region as a whole, whilst still satisfying and appeasing to the various wants and needs of the nations in organization.

8 Asia-Europe Meeting | MUNUC 32 History of the Problem

Brief General History of Cybersecurity

Cybersecurity has been around as long as computers have had the ability to communicate with each other. Computer worms that took advantage of programming language errors in UNIX began their

havoc in 1980s10 America, and their more advanced, sophisticated, and viral derivatives have taken root these days. More specifically, viruses with malicious intent, instead of the more or less obstructive worms, started to crop up in the 90s in America. had the ability to make money off of their viruses, but as long as viruses slayed computers and their security, third party and first party anti-virus programs have been there to at least intercept the virus, and perhaps block its

spreading, before it happens11

Specifically, famous viruses such as Mellisa, and ILOVEYOU impacted millions and millions of PCs

across the States and eventually the World12. As the viruses started to get grander and scarier,

cybersecurity started to present itself on smaller, more private levels13. Antivirus software such as Norton and Mcafee have been around for much longer than some would think. However, at this point most cybersecurity attacks found themselves impacting personal computers. It wasn’t until the 2000’s that attacks against corporations started to strike fear into the finances of the country and private industry.

In 2000, an American fifteen year old named Michael Calce conducted one of the first widespread,

and successful attacks against corporations that truly caused financial damage14. After causing 1.2 Billion USDin damage to the six major corporations , CNN, Dell, eBay, E*Trade and Yahoo!, Bill Clinton eventually took action and made a Cyber Security working group. America, which started at the forefront of the computer age.

10 “The History of Cybersecurity | Cybersecurity Degree Programs.” Accessed November 16, 2019. https://www.coloradotech.edu/degrees/studies/information-systems-and-technology/cybersecurity-history.

11 Updated: 10/5/2018, Sarah Hospelhorn. “Major Events That Changed Cybersecurity Forever | Varonis.” Inside Out Security, September 24, 2018. https://www.varonis.com/blog/events-that-changed-cybersecurity/. 12 Ibid. 13 Ibid. 14 Ibid.

9 Asia-Europe Meeting | MUNUC 32 Particularly Well Known Examples

As previously noted, Cybersecurity contains many facets, examples, strategies, and information in general. In order to get a better understanding of the topic before delving into Asia and European specific examples, this background guide will go over some of the most famous examples of breaches and events that have impacted the realm of cybersecurity. Many of these examples focus on America, and hopefully delegates will be able to, for the most part, find examples they have heard that they can relate to this rather difficult topic.

Varonis, a cyber security company based in America highlights some of the most influential

instances here15. Among them include the first real virus, and the antivirus that it spawned. The

Creeper, and The Reaper, respectively, cropped up in the early 70’s16. This predates the influx of viruses discussed previously in the 80’s, but still signifies the beginning.

Beyond this, Varonis highlights particularly impactful attacks. This includes the Chinese Insider Attack of Greg Chung against Boeing. This attack spanned 30 years, as Chung siphoned $2 billion worth of Aerospace documentation and intel to China. According to federal investigators, 225,000

pages of sensitive material were found in his home17. Instances such as these in particular have alarmed companies and corporations with consumer’s funds and information at stake. The Boeing example in particular has particular relevance to the committee, albeit a bit archaic.

Two distinct components make up the relevance of this example. Foreign actors make up much of the terror and unknown between cyber crimes. In this instance, the information sharing took place on behalf of China. Many of the instances most famous to Americans these days are all contingent upon foreign actors. Countries such as Russia, China, and other large powers come up in American media all the time. Consider the Russian interference in the 2016 American Presidential Elections for

instance18, where a foreign country used cyber attacks for personal power gains. Unlike wars that

15Updated: 10/5/2018, Sarah Hospelhorn. “Major Events That Changed Cybersecurity Forever | Varonis.” Inside Out Security, September 24, 2018. https://www.varonis.com/blog/events-that-changed-cybersecurity/. 16 Ibid. 17 Ibid. 18 Library, C. N. N. “2016 Presidential Campaign Hacking Fast Facts.” CNN. Accessed June 23, 2019. https://www.cnn.com/2016/12/26/us/2016-presidential-campaign-hacking-fast-facts/index.html.

10 Asia-Europe Meeting | MUNUC 32 must be fought in person with soldiers on the ground, cyber attacks can occur from across the world by a small band of people. This level of independence that comes with modern cyber attacks makes combating them more and more urgent as technological threats increase.

In addition to the foreign involvement in many cyber attacks and incidents, financial losses also contribute greatly to the fear of attacks. The Boeing Example heavily relies on the financial gains of the attack, and the financial losses of the corporation. As stated in the Statement of the Problem, cyber attacks siphon out huge amounts of money. The Boeing example alone resulted in $2 Billion

lost19, and this number has increased dramatically since then. As such, corporations and countries both gain from increased protections. In addition to financial losses, loss of operations and personal information can also heavily impact companies. Attacks that result in massive data breaches or close off huge services such as hospitals and public transportation have incredible ripple effects on countries and corporations. Again, the Boeing Example shows a broad entry into these areas, but not a completely perfect representation of attacks in today’s age due to being less technologically involved.

Brief Overview of Other Types

Data Breaches, Credit Stealing, Ransomware, and Government Breaches make up a good amount of the other types of attacks. Varonis elaborates on other prominent examples that have taken place recently. Regarding data breaches, the infamous Yahoo Data breach around 2013 resulted in the

exposure of 3 billion individual’s information20. Information exposed included usernames and passwords, which were likely sold by those that exposed the information. Since so many people tend to use the same username, password, and emails for multiple accounts, data breaches such as these have long lasting effects.

19 Updated: 10/5/2018, Sarah Hospelhorn. “Major Events That Changed Cybersecurity Forever | Varonis.” Inside Out Security, September 24, 2018. https://www.varonis.com/blog/events-that-changed-cybersecurity/. 20 Ibid.

11 Asia-Europe Meeting | MUNUC 32 Credit Card breaches, similar in style to data breaches, typically occur when hackers attack credit companies instead of social media companies. Consider the reasons for hacking into a credit card company; similar to how one could use discovered passwords to log into other accounts, one can use stolen credit card information to conduct purchases online by committing identity theft. The Equifax attack, discussed by Varonis, resulted in access to 290,000 credit cards exposed and 143 million

Americans having their information compromised21. The financial impact of the attack is unclear, and hard to trace. Furthermore, credit cards attack between countries would prove even harder to face and trace.

Ransomware acts as a type of virus that spreads and communicates between computers. Additionally, ransomware will typically infect computers and hold ransom to unencrypt the

information it infected and encrypted22. The attack that Varonis discussed occurred in 2017, under

the title of NotPeyta23. This attack focused on high level information, including that of bankers,

government officials, an airport, and those in energy firms24. The topic of government data breaches will be discussed here as well, as the victims of those attacks remain the same as typical ransomware attacks. Varonis discusses the Office of Private Management breach in which 4.2 files were stolen, resulting in 21.5 million seceurity clearance background investigation files being stolen in addition to

over 5 million fingerprints being compromised25. This was the largest attack against the American

21 Ibid. 22 Ibid. 23 Ibid. 24 Ibid, 25 Ibid.

12 Asia-Europe Meeting | MUNUC 32 government in this fashion, and has since urged the American government to improve their cybersecurity

Connecting to ASEM

Up until now, all the cases presented have occurred in the states, with the slight exception of the Boeing Case. However, the connection to ASEM and any country can be made quite easily. Examples relevant to the United States might help jog the memory of those more connected to the United States. Further parts of this background guide will address examples more specific to Europe and Asia and analyze them for potential solutions. Since many of these cybersecurity scenarios began in the US, analyzing how they impacted the US and how they were handled by the US can help give some context and guidance for Europe and Asia.

13 Asia-Europe Meeting | MUNUC 32 Past Actions

Overview

Past Actions connect the broad, general history of the problem to the previously discussed Statement of the Problem, as well as Possible Solutions to be taken. As discussed previously, the history of the problem focuses on tangible examples that the delegates may have experienced in their free time, with mainly American examples that have had large, global impacts. This section will focus more on actions and preventive measures taken by Asian and European nations in regards to cybersecurity. This way, delegates can make their own connections between more famous cybersecurity incidents and the policies and actions taken by Asia and Europe.

Additionally, acts and initiatives taken by Asia and Europe in other regional bodies will be presented in the hopes of developing stronger, more reliable versions in ASEM.

Past Actions in Asia

Other regional bodies in Asia, and more specifically in South East Asia, have already put forth substantial cybersecurity initiatives. A particularly powerful example comes from the Association of Southeast Asian Nations, or ASEAN. Earlier in 2019, Singapore and ASEAN collaborated in order to produce the new Singaporean-ASEAN Cybersecurity Centre of Excellence, or ASCCE.

Asia: ASCCE

The ASCCE serves as perhaps one of the best examples of a past action that can be improved and refined upon within ASEM, as well as to expand the benefits of such a program to more nations. What makes ASCCE stand out from other initiatives is the wide breadth of the initiative. Singapore and ASEAN splits it into three distinct categories of action. The first “Pillar”, as they call it, consists of

strengthening strategy development of the training and research amongst nations in ASCCE26. This includes increasing the communications between nations and the sharing of strategies that have worked for one nation, as they might work in another. “Databases” make up many of the plans and

26Policy Forum. “An ASEAN Way of Cybersecurity,” January 15, 2019. https://www.policyforum.net/an-asean-way-of- cybersecurity/.

14 Asia-Europe Meeting | MUNUC 32 efforts of regional bodies, as well as Model United Nation delegates, and often include the sharing of information and strategies as seen in the first pillar of ASCCE. However, delegates ought to know that databases typically do not suffice on their own, and when considering potential solutions they should expand outside of just databases. As will be demonstrated soon with the discussion of the other pillars of ASCCE, a strong, well rounded plan/initiative accomplishes multiple goals at once.

The second pillar of ASCCE consists of the encouragement and widespread implementation of CERT training, or Computer Emergency Response Team Training. CERTs vary drastically between countries, and even individual corporations make up their own teams. Delegates interested in looking at their own country’s CERC program, assuming one is in place, or those of large

corporations can find such lists here27 and here28. Although to be discussed in the potential solutions, the standardizing and collaborating of CERC teams could greatly benefit countries with underdeveloped CERC teams, or without CERC teams at all. ASCCE pushes for more CERC training, but refining the process and connecting it to Europe could prove productive for ASEM. In general, standardizing procedures for nations within regional bodies can provide a much needed structure and plan for nations that cannot do so independently.

27 “Listing of Worldwide CERT Organizations - SCADAhacker.Com.” Accessed July 9, 2019. https://scadahacker.com/resources/cert.html. 28Ibid.

15 Asia-Europe Meeting | MUNUC 32 The last pillar29 of ASCCE touches upon the proposed topic in potential solutions: the sharing of information between CERTs. Although it does not quite advocate and implement a means in which countries can be sure to have equal levels of security and resilience in their CERTs, it does at least enable countries to learn from one another if they elect to do so. Drafting meaningful plans and initiatives for large regional bodies can be difficult, as they often require all nations agreeing upon the policy. Therefore, one will often see cases such as ASCCE where solid first steps are taken, despite there being clear steps for later. As such, members of ASEM should look towards ASCCE as a great initiative with potential solutions to be discussed and drafted elsewhere.

Europe: Cybersecurity Act

Up until now, only Asia and a prominent cybersecurity measure of theirs has been discussed. However, as with the spirit of ASEM, Europe and their progression until now ought to be included. As such, the most famous and recent progression, i.e. the European counterpart to ASCCE, is the

Cybersecurity Act30. The Cybersecurity Act, like the ASCCE, builds upon foundations already laid but also leaves lots of room for improvement.

The main conclusion from the cybersecurity act focuses on cybersecurity certifications31. Cybersecurity certifications consist of a set of regulations and requirements that any internet enabled device must meet within the EU, as of the passing of this resolution. However, as mentioned with the ASCCE, these regulations find their basis in past regulations. Before the passage of The Cybersecurity Act, countries had their own set of regulations that companies were to follow in order to be deemed safe in terms of their cybersecurity. Now, with this act, certificates can be issued for all countries in the EU. Additionally, companies that receive certification in one country can faithfully transmit this certification to other countries. Consider the Full Faith and Credit Clause of the United States -- states must accept the licenses and documents of other states. For the EU, if one country approves of cybersecurity certifications, all others within the EU must approve and accept. This

29Policy Forum. “An ASEAN Way of Cybersecurity,” January 15, 2019. https://www.policyforum.net/an-asean-way-of- cybersecurity/. 30 “EU to Become More Cyber-Proof as Council Backs Deal on Common Certification and Beefed-up Agency - Consilium.” Accessed July 9, 2019. https://www.consilium.europa.eu/en/press/press-releases/2018/12/19/eu-to-become-more-cyber- proof-as-council-backs-deal-on-common-certification-and-beefed-up-agency/. 31 Ibid.

16 Asia-Europe Meeting | MUNUC 32 allows for increased confidence in consumers and overall increased quality of cybersecurity. As discussed in the previous part on ASCCE, standardizing procedures and practices can greatly benefit regional bodies and large memberships.

Another part of the Cybersecurity Act focuses on permanently establishing the European Agency for Network and Information Security (ENISA) from Greece. ENISA has been contributing information and security strategies to the EU since 2004, but as per previous mandates was set to expire in

2020.32 Permanently establishing the organization allows for important continuity and reliability in the EU.

Additionally, ENISA will receive larger more meaningful responsibilities. For instance, ENISA will help prepare and review the previously discussed certification schemes for the countries within the

EU33. ENISA will also handle and execute cybersecurity practices and instances both annually in small reviews and in larger reviews every other year in order to test cybersecurity standards under real conditions. First, ENISA establishes permanent, full time liaisons to facilitate communications between member states and ENISA. ENISA then handles oversight and collaboration between CSIRTs, or Cybersecurity Incident Response Teams, similar in nature to the previously discussed CERTs. ENISA contributes greatly to the region, and acts as the foremost authority for cybersecurity in the EU. Like the ASCCE, however, certain areas of improvement exist in which progress can be made by advancing policies, taking larger roles, furthering communication between member states, databases, and other soon to be discussed actions.

32 Ibid. 33 Ibid.

17 Asia-Europe Meeting | MUNUC 32 Possible Solutions

Communication

The driving point behind progress in cybersecurity is collaboration. In regional bodies, collaboration between member states typically comes quite easily and can yield impressive results. Both the ASCCE and Cybersecurity Act rely on strong communications between organized bodies and member states. Delegates seeking to make progress on cybersecurity for ASEM ought to consider how best to open and maintain communications between European and Asian member states. The actual ASEM summit serves as a strong first instance of communication, but communications must continue past the summit to ensure that progress actually comes instead of false promises. Therefore, establishing something like the liasons of ENISA and a body to unite the member states could be a strong first step. Delegates, when creating such bodies within the region, must know how to ensure that all nations contribute to the services offered and that all nations comply as well; regional bodies suffer when proposals put forth do not rely on widespread support.

Data Sharing

As discussed briefly, databases and the communal sharing of data can greatly assist member states and nations that need help starting up new cybersecurity initiatives but feel they cannot do so independently. For instance, member states that have strong initiatives unique to their country can share the methods and data behind it in order to assist other countries interested in adopting such a practice. This is an easily accomplished task that can kickstart a lot of progress

Response Team Training

Countries and companies have to respond to events when they happen -- not everything can be stopped preemptively. As such, developing the proper response teams and the training for such teams is vital. In ASEMs case, both Europe and Asia have distinct response teams. Forming a strong collaboration between the two could prove mutually beneficial. Training can also include reviewing and fortifying certification schemes for consumers, as discussed previously. In general, the best approaches that delegates can take involve two components. One is observing what their member states have done in the past, and if it is applicable to actions that ASEM can take in the future.

18 Asia-Europe Meeting | MUNUC 32 Second is focusing on communications between ASEM opens up many possibilities and actions to be taken. The ASEM Summit is just one avenue of communication; ensuring that it continues ensures the potential for possible solutions to continue far into the future.

19 Asia-Europe Meeting | MUNUC 32 Bloc Positions

On the topic of Cybersecurity, Asia and Europe can be split up into two separate categories: developing and pioneering. The various nations in Asia and Europe represent nearly all levels of infrastructure development, and consequently the advancement and security of cybersecurity.

Developing Nations

Developing Nations within Asia and Europe find themselves at a critical junction within their nations

on Cybersecurity. Some examples include the Philippines, Vietnam, and much of South and South East

Asia. Many of them need to develop their infrastructure and incorporate what other nations within

Asia are putting forth. At the same time, they often deal with increased success rates in cyber attacks

due to this very issue. As a result, they lose large amounts of revenue and interest in companies coming

to their country to work. In this perpetuating cycle, they find themselves in a situation that fails to bring

positive change via strong cybersecurity. These particular nations struggle to catalyze cybersecurity

programs and measures for their nation due to these perceived pitfalls, and especially need assistance

from other nations in the region. Therefore, their position is very pro-cooperation as they benefit the

most from international and intercontinental. Furthermore, due to experiencing more attacks with

little protection, developing nations seek fast, easy to implement solutions.

Pioneering Nations

Pioneering nations on the other hand have different priorities. Instead of establishing basic level

infrastructure to protect against cyberattacks and cyber terrorism, nations of these type instead refine

what sort of technologies they already have. An important distinction must be made here that

differentiates Asia from Europe; like in general regarding national poverty, there are more nations in

Europe that find themselves well off financially. As such, many nations already have standing

20 Asia-Europe Meeting | MUNUC 32 cybersecurity networks. Therefore, as pioneering nations they stand at the forefront of cybersecurity

development and expansion of technological services. Although these types of nations exist in Asia, in

fact many of the strongest of such nations lie there, they exist more frequently, proportionately, in

Europe. Much of the future debate of this committee will likely rely on the advanced states of Europe,

and select super advance states of Asia to help out the developing states of South Asia and Southeast

Asia as well as Eastern Europe.

21 Asia-Europe Meeting | MUNUC 32 Glossary

Cybersecurity: “Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: Availability, Integrity, which may include authenticity and non-repudiation, Confidentiality. “(ITU)

Data Breach: “A data breach is an incident that involves the unauthorized or illegal viewing, access or retrieval of data by an individual, application or service. It is a type of security breach specifically designed to steal and/or publish data to an unsecured or illegal location. A data breach is also known as a data spill or data leak.”(Techopedia). A Major Data Breach typically consists of 30,000 records being exposed, or more.

CERT: “A Computer Emergency Response Team (CERT) is an expert group that handles computer security incidents. Alternative names for such groups include Computer Emergency Readiness Team and Computer Security Incident Response Team (CSIRT).”

Ransomware: “A form of that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered”

Virus: “A type of malware aimed to corrupt, erase or modify information on a computer before spreading to others. However, in more recent years, viruses like Stuxnet have caused physical damage.”

22 Asia-Europe Meeting | MUNUC 32 TOPIC B: TACKLING LOCAL, REGIONAL AND GLOBAL HUNGER

______

Statement of the Problem

Introduction

Hunger is not absent from any society, and even with the strongest programs, welfare systems, and income equality, governments and countries will continue to have huge populations suffer from hunger and starvation. As such, hunger always serves as a relevant issue to discuss and to fix for all nations in the world, no matter their involvement in other issues. Throughout history, the fighting of hunger has transcended wars and past actions, and the donation of aid and food continues to supercede war zones. Every country can help hunger; both their own, and others, and those in ASEM are no different. As such, this statement of the problem will help introduce the scope of the problem in Asia and Europe very broadly with introductory statistics about hunger in these respective regions, and then develop a stronger understanding of the issue by going into more specific cases and instances of hunger in countries located in Europe and Asia. However, before getting into either continent, some of the various definitions of hunger, and more specifically malnourishment, wasting, and stunted growth must be discussed.

Hunger acts as an all-encompassing term for various food consumption related issues. Any person, if they don’t eat a meal for breakfast or lunch can become hungry. However, many of those that become hungry have near immediate access to food sources to satisfy their hunger. However, more issues stem out of the more specific terms of malnourishment and malnutrition. According to the World Health Organization “When a person has hunger for a sustained period of time, he or she can

develop malnutrition, either mild or severe, depending on one’s body needs and food intake”34. For more specific terms, WorldHunger offers Stunting and Wasting. Stunting occurs when one does not reach their theoretical potential for height and growing, likely due to malnutrition. Wasting occurs when one has a particularly low weight for their height, which can occur during famine and

34 www.fao.org. “SOFI 2019 - The State of Food Security and Nutrition in the World.” Accessed November 16, 2019. http://www.fao.org/state-of-food-security-nutrition/en/.

23 Asia-Europe Meeting | MUNUC 32 continued food shortages. As one could imagine, stunting and wasting correlate highly, as continued wasting leads to stunting and both stem from malnutrition. Hopefully, moving forward, delegates can use these terms and separate their meanings correctly, and develop respective plans for tackling these issues.

Causes of Malnutrition

The same source lays out the various ways countries in Asia experience and encounter malnutrition, and more specifically the wasting and stunting previously discussed: sanitation and hygiene,

changing diets and obesity, gender inequality, and the urban rural divide.35 A brief description of them should suffice, as in reality countries can have vastly different reasons and explanations behind their hunger issues. Sanitation and hygiene cause a surprisingly large amount of malnutrition. When water and food sources become unsanitary, children are much more likely to develop cases of diarrhea in which they lose a huge amount of the nutrients they just acquired. Bacterial infection can also stem from a lack of sanitation, which in turn makes it harder to maintain nutrients. Moving on, changing diets and obesity both have an effect on malnutrition. Since processed foods are so cheap,

35 Ibid.

24 Asia-Europe Meeting | MUNUC 32 many rely on processed foods to fulfill their nutrient requirements. This results in situations where malnutrition can cause wasting in some populations and obesity in others. An odd dichotomy for sure, yet it also helps show how complicated the issue can be. Gender inequality also impacts malnutrition. An increase in education for women empowerment and healthcare can greatly reduce malnutrition, as women act as the main health provider in Asian and European countries. Yet, they often do not have access to this education and cannot sustain their families healthily. Lastly, the rural urban divide contributes to malnutrition. Those in rural areas are more likely to have unsanitary living conditions, a mother without a secondary degree, and less food in general to support themselves. These compound to rural areas having much higher rates of malnutrition, stunting and wasting, and applies to areas of the world outside of Asia and Europe as well.

Asia Introduction

Before going into specific cases, getting brief understandings of the two distinct continents will help delegates ease into the subject. According to the FAO, Asia exists as the most malnourished

continent in the world, population-wise36. Asia has an immense, and dense, malnourished population, especially throughout Southeast Asia. In fact, Southern Asia has the highest Global Hunger Index Score, and stands apart from the rest of Asia in the severity of its hunger. The other areas of interest for Asia include Central Asia, Eastern Asia, South-Eastern Asia, and Western Asia. In fact, the FAO has given the respective percentages of undernourishment in those areas, seen here:

37

Delegates representing countries in Asia ought to consider their own country and the region that they occupy; does their region stand out from others in Asia? Do they live in the worst region?

36 World Hunger News. “World Hunger, Poverty Facts, Statistics 2018.” Accessed May 16, 2019. https://www.worldhunger.org/world-hunger-and-poverty-facts-and-statistics/. 37 Ibid

25 Asia-Europe Meeting | MUNUC 32 Are they an outlier? Knowing this information can determine the role delegates take in ASEM. If they’re an outlier, perhaps they can contribute their strategies to other countries in the region. On the other hand, if they need more help than other nations, they can help brainstorm effective sharing methods that benefit all in the region. These strategies and potential solutions will of course find more discussion in the potential solutions section of the background guide.

Southern Asia suffers particularly from Wasting; although more than half of all stunted children live

in Asia38, more than half of all wasting children live in Southern Asia alone. Certain countries contribute more than others to these huge proportions; particularly India with its high levels of

stunting. More specifically, UNICEF claims that 38% of all children in India are affected by stunting39. These numbers are indicative of a severe problem in the region. For a more broad statistic, more

than ⅔ of all wasting children live in Asia.40 Clearly, huge amounts of hunger and malnutrition plague the area, with an emphasis on specific regions of Asia, such as South Asia and South Eastern Asia. Moving forwards, Delegates ought to recognize how these regions connect to their own country, and the steps that they can take within the context of ASEM to help and assist all nations involved.

Europe

Like Asia, Europe struggles with hunger moreso in specific areas than in the county as a whole. In

particular, Eastern Europe experiences much more hunger, wasting, stunting, and malnutrition41. A quick look through this robust source could help delegates, as it is mainly interactive and more useful in person than written discussions from it. However, some interesting conclusions can be made from it. For instance, recall the idea previously discussed of a county with incredibly high obesity rates while maintaining high malnutrition, wasting, and stunting rates. Ukraine acts one of these triple threat countries, while other countries in Eastern Europe have similar, but lower rates of both

malnutrition and obesity42. Although a bit dated perhaps, this article helps explain some of the

38 Ibid. 39 Ibid. 40 ibid 41UNICEF DATA. “Malnutrition in Children.” Accessed August 1, 2019. https://data.unicef.org/topic/nutrition/malnutrition/. 42 Ibid.

26 Asia-Europe Meeting | MUNUC 32 causes behind hunger in Eastern Europe43. To summarize, those living in hospitals and nursing homes, with significantly increased rates in Eastern Europe, often experience malnutrition. In these locations, care for long term patients is often a much lower spending priority than other operations, surgeries, etc. Additionally, those reaching older ages often do not have the funds in order to sustain

themselves and remain healthy and fulfilled with nutrients44. Therefore, as time goes on they suffer more and more from malnutrition. Unlike in Asia where much of the malnutrition occurs in the

youth, much more occurs proportionally in the elderly of Eastern Europe45. Delegates can learn more about malnutrition in Eastern Europe through the various sources mentioned at the end of the previous source, but should know that malnutrition is underreported in Eastern Europe. Moving forwards, delegates ought to learn how to help each other’s continents out. As established, Europe and Asia struggle with malnutrition in quite different ways. Therefore, delegates must focus and understand both their strengths and weaknesses, and coordinate across continents in order to benefit each other.

43“Time to Recognise Malnutrition in Europe: (EUFIC).” Accessed November 17, 2019. https://www.eufic.org/en/food- today/article/time-to-recognise-malnutrition-in-europe. 44 Ibid. 45 Ibid.

27 Asia-Europe Meeting | MUNUC 32 History of the Problem

Introduction

Hunger, and its associated issues, unlike Cybersecurity, has been a problem for all of human history, changing over time and addressed by different solutions that have had varying levels of success. As discussed previously, certain areas within the ASEM specifically have had extensive experiences with the problem of hunger. For instance, Eastern Europe, specifically in relation to the former Soviet Bloc, faced many long-lasting, ripple effects with hunger. As a result, the region faces certain hunger issues that stem from that time. Within Asia, other, rather distinct problems have resulted in widespread hunger in the past, and continue to contribute. Poverty in particular, in combination with highly densely populated cities, has contributed to a different picture of hunger in Asia.

Over time the region has seen improvements in technology, their stance in the world, new, emerging markets and economies, and even changes in agriculture. However, problems in hunger and nutrition have persisted. As such, the history of the region has shown how advancements can still enable hunger and poverty, and that although GDP can increase incredibly, those still impacted by poverty and hunger may continue to stay locked down and malnourished. Additionally, the high occurrence of natural disasters in the region, ie. typhoons and earthquakes, has contributed greatly to short term hunger spurts. However, more productive conversation of course comes the analysis of hunger over time, first globally, then a focus on Europe, and then Asia, to help delegates understand the forms and methods in which hunger has manifested itself over time within the regions, and then any overlapping characteristics between the two.

Global History, and A Clarification Those researching the issue of global hunger understand that the issue of hunger often nests itself within the larger, more prevalent discussion of global poverty. Additionally, individualized reports and research of hunger in Asia and Europe have only started to manifest themselves recently. Therefore, in instances where sufficient research on the history of hunger alone does not suffice, research on poverty data for those areas can likely substitute that missing information. These two areas unsurprisingly correlate with each other quite a lot, which enables this substitution.

28 Asia-Europe Meeting | MUNUC 32 To begin, a look at the proportion of those in extreme poverty over time can help paint a picture of the issue at hand.

46

From this, we can see that poverty has been decreasing for some time. However, a look at the actual divisions between the continents and subcontinents shows which parts of ASEM may need to focus more on the issue.

Recall the previous discussion in the statement of the problem, and which areas of ASEM needed to focus moreso on solving their hunger issues, and which areas of ASEM may have residual knowledge of how to solve the issue. South and Southeast Asia held the most staggering numbers, with South

Asia in particular struggling with hunger47. However, they have also been in this position,

comparatively for some time. In The World Economic Forum’s Graph48, none of the areas over take one another, meaning that although this issue may have gotten better globally over the past 3 decades, the individual areas that struggle now have struggled in the past. Something else to

46World Economic Forum. “Poverty: The Past, Present and Future.” Accessed August 31, 2019. https://www.weforum.org/agenda/2016/01/poverty-the-past-present-and-future/. 47 World Hunger News. “World Hunger, Poverty Facts, Statistics 2018.” Accessed May 16, 2019. https://www.worldhunger.org/world-hunger-and-poverty-facts-and-statistics/. 48 World Economic Forum. “Poverty: The Past, Present and Future.” Accessed August 31, 2019. https://www.weforum.org/agenda/2016/01/poverty-the-past-present-and-future/.

29 Asia-Europe Meeting | MUNUC 32 consider is the proportion of the world’s population and the total extreme poverty population that the areas make up. For instance, in the 1980’s, East Asia and the Pacific greatly dwarfed ASEM subsections such as South Asia, as well as Eastern Europe and Central Asia. However, compare the starting proportions to the proportions in 2011. Although South Asia went down in general population in extreme poverty, the rate at which they do so greatly pales in comparison to the rate at which East Asia escaped extreme poverty. Eventually, South Asia would over take in population the amount in extreme poverty compared to East Asia. Admittedly, Europe seems to be right between the two extremes of Asia. However, again consider the discussion; Eastern Europe, as a subsection of

Europe, contained the highest amount of those in extreme poverty49. This trend has also continued since the 1980’s, as amongst the sections of Europe it remains the highest in extreme poverty.

Using this graph, trends about extreme poverty and hunger unsurprisingly demonstrate their causation on one other. Additionally, a picture of ASEM’s progress can be seen. As certain parts of ASEM progress in certain areas rapidly, undoubtedly certain sections of ASEM fail to keep up. This dichotomy came about in the other topic actually, and both revolve around the idea of collaboration. Nations that need the help can find allies and friends within other nations of ASEM to deploy resolutions and agreements that benefit all those involved. With the general trend discussed, a brief look into the history of food and poverty of Asia and Europe specifically should convey some particular, relevant information more so than the WEF graph. In general however, a few trends have affected the two to particularly worsen this problem. Delegates will find that large scale, global events typically bring upon food insecurity. The various natural disasters of South East Asia and South Asia have impacted their ability to grow food long term. In Europe however, the structural damage from bodies such as the Soviet Union has impacted the food security of Eastern Europe significantly.

49 Ibid.

30 Asia-Europe Meeting | MUNUC 32 Past Actions

A notable past action, which actually came about from the FAO, or Food and Agriculture Organization, demonstrates a particularly hopeful possible solution. In Malawi, the act of diversifying crops greatly assisted in the securing of their own grown foods.

Crop diversification serves a few different purposes, all of which help protect and maintain food

security50. Primarily, it lessens risk. Consider the many systemic, recurring issues that plague developing nations and their ability to promote and protect food security. Natural disasters, and inevitable changes to the environment and climate pose as the greatest threat to food security. Consider WHO’s take on the role of climate change, and the subsequent need for crop diversification: “climate variability and extremes can negatively impact small family farm incomes as

agricultural production falls”51. Crop diversification can mitigate these impacts. In the case of natural

disasters, certain crops withstand flooding or heat waves better than other crops52. The FAO elaborates on this more in their discussion of crop diversification in India: “ Crop diversification and also the growing of large number of crops are practiced in rainfed lands to reduce the risk factor of crop failures due to drought or less rains”. Crop diversification helps proactively secure food supplies

50 Ibid. 51 Ibid. 52 Ibid.

31 Asia-Europe Meeting | MUNUC 32 in the face of climate change and natural disasters. Additionally, it can help bring extra revenue and produce the efficiency and productivity of crops. In Malawi, as discussed previously, crop diversification found use in reducing risk. However, it increased productivity as well; maize grown

alongside legumes performed much better and safer compared to monocropping maize53. Obviously crop diversification cannot carry the same policy for every region; especially ASEM. However, countries could find out what works for them specifically and within their own region or subregion.

Additional, increased research and development of seeds can help sustain growth in these countries. Although organizations such as Monsanto can establish monopolies within the United States, the creation of regional bodies that are enforced by governmental oversight can avoid that with the proper precautions. Delegates may look towards simply shifting around food supplies in an effort to feed those who need it, but will realize that this doesn’t produce long term food stability. Therefore, possible solutions and actions for delegates ought to focus on research and agriculture than can truly bring about positive, long lasting change.

53 Ibid.

32 Asia-Europe Meeting | MUNUC 32 Possible Solutions:

Overview of Possible Solutions

The World Health Organization (WHO) outlines a few different frameworks that in the past have enabled, and will continue to enable potential solutions to the various issues of global and world hunger. Of course, these frameworks differ from the ASEM specifically, but delegates ought to look to the frameworks, groups, and policies they have attempted and passed in the past. Although some past actions have already been discussed, delegates that conduct and utilize their own research will find themselves prepared and ready for conference.

To elaborate, 5 frameworks are highlighted in the 2018 Version of WHO’s 54annual report on global hunger. The United Nations Framework Convention on Climate Change stands as perhaps the most notable vehicle for action. Although more focused on Climate Change, Global Hunger of course finds many of its roots in the larger, more widely recognized issue of Climate Change. Additionally, notable policy such as the 2015 Paris Agreement came as a result of the framework found in the UNFCCC.

WHO also mentions the Sendai Framework for Disaster Risk Reduction (SFDRR) (2015-2030) which specifically works with disaster relief funding and risk management. As mentioned previously, an unmistakable link can be found between disaster relief and food insecurity. In the many areas of Asia in particular, those suffering from food insecurity often rely on their own agriculture to feed themselves. As such, natural disasters impact the food security of these people. Therefore, frameworks such as Sendai can potentially serve the efforts in ASEM in fighting against global hunger. More generally, any efforts regarding natural disaster relief can find themselves extended to fighting global hunger.

Moving on, WHO also sets out the 2030 Agenda for Sustainable Development as an additional

framework to follow55. Much like the first framework which focuses on a combination of both climate

54WHO. “WHO | Household Food Nutrition and Security List of Publications.” Accessed November 17, 2019. https://www.who.int/nutrition/publications/foodsecurity/en/. 55 Ibid.

33 Asia-Europe Meeting | MUNUC 32 change and food insecurity, the sustainable development framework places an emphasis on both issues and tries best to simultaneously solve them due to the overwhelming amount of overlap between the two. Additionally, this framework seems to encompass a larger amount of the global community than other frameworks and as such may possess more diverse outlooks and approaches

to the issues that come with global food insecurity.56

WHO outlines 2 additional frameworks that can address global food insecurity. The Rome Declaration on Nutrition and the Framework for Action acts incredibly similarly to the plans and goals set out in the previously mentioned framework of the 2030 Agenda for Sustainable Development. Essentially, it focuses on the importance of further identifying and fixing the connection between climate change and insecurity. Furthermore, they exhibit more of an emphasis on improving resilience against food insecurity within developing countries.

Lastly, The World Humanitarian Summit and Grand Bargain seeks to prepare and educate all countries, with an emphasis on developing countries, in order to successfully withstand shocks and tremors of food insecurity and natural disasters. As one can see, the various frameworks have many different methods of handling similar issues. Therefore, policies proposed by the groups ought to have enough overlaps that delegates can successfully pull from in order to support their own ideas. A few of these past solutions will be discussed to give an idea of what is possible for delegates.

56 Ibid.

34 Asia-Europe Meeting | MUNUC 32 Bloc Positions

Asia and Europe have extremely similar blocs between each other when it comes to local, regional, and global hunger. Akin to Cybersecurity as well, a stark divide exists. Nations either have established policies that set them apart, or structural, institutional problems that impede their ability to sustain safe levels of hunger.

Asia and South Asia

Size is the main determining factor of hunger health in Asia. Countries with massive populations, despite levels of economic success, will continue to struggle with hunger unless ASEM drafts relevant policies. As seen in the background guide, nations within South Asia such as India and its neighbors, as well as the many nations in South East Asia, struggle with matching their large, growing populations with food. Additionally, these nations struggle with the many negative changes brought about by climate change, due to relying heavily on agriculture. Flooding and typhoons often revert much progress made by farmers in the region. Therefore, much of their hunger issues stray from simply receiving aide and instead focus on long term solutions to their issues. These could include the creation of plants and seeds that better survive these storms, can increase production, or fare better on the market. Whatever can better sustain their agricultural markets are better for this region.

An outlier of sorts in the region is China, which inevitably experiences hunger due to their immense population. Bloc positions thus support technological innovations that will make agriculture safer and sustainable, which in turn support their regional and local hunger issues. Countries like China with strong economies look more favorably towards economic plans that incentivize the export of their products to sustain healthy food delivery systems instead. However, a balance clearly can be struck between the two policies.

Europe and Eastern Europe

Europe, and more specifically Eastern Europe, suffer less so from total regional hunger and moreso from incredibly specific manifestations of hunger issues. As such, their bloc position reflects a desire

35 Asia-Europe Meeting | MUNUC 32 for highly specified policies for regions of their continent struggling with institutional and structural food issues. As specified in their section of the background guide, areas of Eastern Europe struggle with food issues due to lingering issues of being members of the Soviet Bloc some time ago. Additionally, elderly people within the region struggle with food security due to infrastructure, ie. hospitals, being designed for emergency care and not so much extended patient care in this specific region has impeded the ability for the elderly to find proper food. Much like the youth and general population of South Asia, a specific area within Europe struggles with food security much more so than the overall body. Therefore, positions include the funding of infrastructure to secure food in long term plans for the region, as well as the revamping of agricultural sites.

For most of Europe, including the many G7 countries and much of the EU, food security policies will look at increased trade and imports of food from areas currently struggling with food security in order to fund the region. Additionally, reassignment of aide in the form of food packages will likely remain as many European nations, and specifically the EU’s main method of securing food for nations within Eastern Europe currently struggling to do so.

36 Asia-Europe Meeting | MUNUC 32 Glossary

Food Security: “availability at all times of adequate world food supplies of basic foodstuffs to sustain a steady expansion of food consumption and to offset fluctuations in production and prices” (FAO)

Hunger: “Hunger defines a short-term physical discomfort as a result of chronic food shortage, or in severe cases, a life-threatening lack of food. “ (National Research Council, 2006)

Stunting: “stunting the result of a biological process where children do not grow to reach their theoretical potential. It is recognized as one of the most significant impediments to human development and has long-lasting health and cognitive impacts. Stunting is the result of prolonged inadequate nutrition and repeated infection during the first two years of life”

Wasting: “Wasting defined as low weight for height, can be the result of famine or other severe food shortages. Wasted children often appear very thin and lack the energy to laugh and play. Stunting and wasting are very closely tied with other health indicators”

37 Asia-Europe Meeting | MUNUC 32

Bibliography

“All 3 Billion Yahoo Accounts Were Affected by 2013 Attack - The New York Times.” Accessed May 21, 2019. https://www.nytimes.com/2017/10/03/technology/yahoo-hack-3-billion- users.html. Policy Forum. “An ASEAN Way of Cybersecurity,” January 15, 2019. https://www.policyforum.net/an-asean-way-of-cybersecurity/. Armerding, Taylor. “The 18 Biggest Data Breaches of the 21st Century.” CSO Online, December 20, 2018. https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the- 21st-century.html. World Hunger News. “Asia Hunger Facts, Facts About Hunger in Asia.” Accessed May 16, 2019. https://www.worldhunger.org/asia-hunger-facts-2018/. Calce, Michael, and aka Mafiaboy. “Meet Mafiaboy, The ‘Bratty Kid’ Who Took Down The Internet.” NPR.org. Accessed June 22, 2019. https://www.npr.org/sections/alltechconsidered/2015/02/07/384567322/meet-mafiaboy- the-bratty-kid-who-took-down-the-internet. “Cso_17-Greatest-Breaches_2019-100783435-Orig.Jpg (JPEG Image, 2500 × 2685 Pixels) - Scaled (28%).” Accessed May 21, 2019. https://images.idgesg.net/images/article/2018/12/cso_17-greatest-breaches_2019- 100783435-orig.jpg. “CYBER RISK IN ASIA-PACIFIC THE CASE FOR GREATER TRANSPARENCY” Accessed May 21, 2019. http://www.mmc.com/content/dam/mmc-web/Files/APRC/aprc-cyber-risk-in-asia- pacific.pdf “Cybersecurity.” Accessed May 21, 2019. https://www.itu.int/en/ITU- T/studygroups/com17/Pages/cybersecurity.aspx. “Cybersecurityfactsheet.Pdf.” Accessed May 16, 2019. https://www.consilium.europa.eu/media/21480/cybersecurityfactsheet.pdf. “Cybersecurity_Risk_In_Asia.Pdf.” Accessed May 19, 2019. https://www.blackhat.com/docs/us- 18/Cybersecurity_Risk_In_Asia.pdf. Desjardins, Jeff. “The $74 Trillion Global Economy in One Chart.” Visual Capitalist, February 22, 2017. https://www.visualcapitalist.com/74-trillion-global-economy-one-chart/. “Digital Single Market for Europe - Consilium.” Accessed May 16, 2019. https://www.consilium.europa.eu/en/policies/digital-single-market/. “Draft-18-00706_Global-Cybersecurity-Index-EV5_print_2.Pdf.” Accessed June 21, 2019. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/draft-18-00706_Global- Cybersecurity-Index-EV5_print_2.pdf. “Economic Impact of Cybercrime.” Accessed May 21, 2019. https://www.csis.org/analysis/economic-impact-cybercrime. “EU to Become More Cyber-Proof as Council Backs Deal on Common Certification and Beefed- up Agency - Consilium.” Accessed July 9, 2019. https://www.consilium.europa.eu/en/press/press-releases/2018/12/19/eu-to-become-more- cyber-proof-as-council-backs-deal-on-common-certification-and-beefed-up-agency/.

38 Asia-Europe Meeting | MUNUC 32 FIRST — Forum of Incident Response and Security Teams. “FIRST Teams.” Accessed July 9, 2019. https://www.first.org/members/teams. “Food-Security-Challenges-Asia.Pdf.” Accessed August 31, 2019. https://www.oecd.org/derec/adb/Food-security-challenges-Asia.pdf. Goel, Vindu, and Nicole Perlroth. “Yahoo Says 1 Billion User Accounts Were Hacked.” The New York Times, December 14, 2016, sec. Technology. https://www.nytimes.com/2016/12/14/technology/yahoo-hack.html. “Global Cybersecurity Index: Which Asian Country Has the Best Cyber Security Strategy? | Asia News Network.” Accessed May 21, 2019. http://www.asianews.eu/content/global- cybersecurity-index-which-asian-country-has-best-cyber-security-strategy-61564. “Individuals Using the Internet (% of Population) | Data.” Accessed May 21, 2019. https://data.worldbank.org/indicator/it.net.user.zs?most_recent_value_desc=true. Library, C. N. N. “2016 Presidential Campaign Hacking Fast Facts.” CNN. Accessed June 23, 2019. https://www.cnn.com/2016/12/26/us/2016-presidential-campaign-hacking-fast- facts/index.html. “Listing of Worldwide CERT Organizations - SCADAhacker.Com.” Accessed July 9, 2019. https://scadahacker.com/resources/cert.html.

Updated: 10/5/2018, Sarah Hospelhorn. “Major Events That Changed Cybersecurity Forever | Varonis.” Inside Out Security, September 24, 2018. https://www.varonis.com/blog/events- that-changed-cybersecurity/. UNICEF DATA. “Malnutrition in Children.” Accessed August 1, 2019. https://data.unicef.org/topic/nutrition/malnutrition/. NW, 1615 L. St, Suite 800Washington, and DC 20036USA202-419-4300 | Main202-857-8562 | Fax202-419-4372 | Media Inquiries. “A Quarter of Americans Are Online Almost Constantly.” Pew Research Center (blog). Accessed May 21, 2019. https://www.pewresearch.org/fact- tank/2018/03/14/about-a-quarter-of-americans-report-going-online-almost-constantly/. World Economic Forum. “Poverty: The Past, Present and Future.” Accessed August 31, 2019. https://www.weforum.org/agenda/2016/01/poverty-the-past-present-and-future/. “Reform of Cybersecurity in Europe - Consilium.” Accessed May 16, 2019. https://www.consilium.europa.eu/en/policies/cyber-security/. Roser, Max, and Hannah Ritchie. “Hunger and Undernourishment.” Our World in Data, October 8, 2013. https://ourworldindata.org/hunger-and-undernourishment. www.fao.org. “SOFI 2019 - The State of Food Security and Nutrition in the World.” Accessed November 16, 2019. http://www.fao.org/state-of-food-security-nutrition/en/. Asia News Center. “Securing the Modern Enterprise in a Digital World.” Accessed May 16, 2019. https://news.microsoft.com/apac/features/cybersecurity-in-asia/. “Time to Recognise Malnutrition in Europe: (EUFIC).” Accessed November 17, 2019. https://www.eufic.org/en/food-today/article/time-to-recognise-malnutrition-in-europe. “The History of Cybersecurity | Cybersecurity Degree Programs.” Accessed November 16, 2019. https://www.coloradotech.edu/degrees/studies/information-systems-and- technology/cybersecurity-history.

39 Asia-Europe Meeting | MUNUC 32 World Hunger News. “World Hunger, Poverty Facts, Statistics 2018.” Accessed May 16, 2019. https://www.worldhunger.org/world-hunger-and-poverty-facts-and-statistics/. WHO. “WHO | Household Food Nutrition and Security List of Publications.” Accessed November 17, 2019. https://www.who.int/nutrition/publications/foodsecurity/en/.

40 Asia-Europe Meeting | MUNUC 32