ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2018 World Conference on Cybersecurity (WCC) London International Model United Nations 19th Session | 2018 Table of Content I ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2018 Table of Contents Introduction Letters .................................................................................................... 1 Yuji DEVELLE ........................................................................................................ 1 Chloe AMELLAL .................................................................................................... 1 Isabel VICARÍA BARKER ..................................................................................... 2 Introduction to the Committee ................................................................................... 3 Topic A: Defining Cyberspace and Classifying Cyber-attacks .............................. 5 Introduction .............................................................................................................. 5 Key Concepts ............................................................................................................ 6 Cyberspace .............................................................................................................. 6 Cyber warfare vs. cyber crime................................................................................ 8 Cyber-attacks ........................................................................................................ 10 Hacking ................................................................................................................. 11 Advanced persistent threats .................................................................................. 12 Bots, botnets and DDoS ....................................................................................... 12 Legal Issues ............................................................................................................. 12 Cybercrime: Problem of applicable law ............................................................... 12 Cyber warfare and international humanitarian law .............................................. 14 The Attribution Problem ....................................................................................... 16 History of the Problem .......................................................................................... 18 Timeline of notable attacks .................................................................................. 18 1998 - 2001 MOONLIGHT MAZE ..................................................................... 19 2005 - 2011 TITAN RAIN & BYZANTINE HADES ........................................ 19 2008 Russia-Georgia War .................................................................................... 20 2010 OLYMPIC GAMES .................................................................................... 21 2011 Winnti Hacks ............................................................................................... 22 2012 Saudi Aramco Attacks ................................................................................. 22 December 2015 BlackEnergy 3 Malware causing Huge Blackout in Western Ukraine ................................................................................................................. 23 2016 US Elections Hacking Campaign ................................................................ 23 Current Cases ......................................................................................................... 24 Cyber-attacks and Foreign Policy: The Case of Estonia ...................................... 25 Securing the Internet of Things ............................................................................ 26 Cyber criminality and ransomwares: an Asian case ............................................. 27 The Future .............................................................................................................. 27 II ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2018 The Tallinn Manual .............................................................................................. 27 White House Directive #41 .................................................................................. 28 Bilateral Agreements ............................................................................................ 29 United Nations Group of Governmental Experts (UN GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security ................................................................................................................. 29 Collective Security Assurances ............................................................................ 31 Regulating Attack Toolkits ................................................................................... 31 Bloc Positions .......................................................................................................... 31 Questions a Resolution Should Answer ............................................................... 32 Recommended reading & sources ........................................................................ 33 III LONDON INTERNATIONAL MODEL UNITED NATIONS 2018 ZZ LONDON INTERNATIONAL MODEL UNITED NATIONS 2018 Introduction Letters Yuji DEVELLE Dear delegates, welcome to the World Conference on Cybersecurity at LIMUN 2018. My name is Yuji Develle, and I will be your Director for the weekend. I have a background in War Studies (King‟s College London) and Management (LSE) and am currently on an exchange in St. Petersburg, Russia. I have been doing MUN for seven years now, from delegate to Secretary General in the US, Europe and the UK. I look forward to helping you, veteran or new, reach your full potential at this conference. LIMUN is the best run conference in the world right now, and it‟s because of the effort everyone puts into getting the most out of the experience. I am looking forward to doing the same with you, with Chloe‟s political insight and Isabel‟s legal expertise, we are sure to have an exciting and challenging weekend ahead! Chloe AMELLAL Dear delegates, I am pleased to welcome you to the World Conference on Cybersecurity at LIMUN 2018! My name is Chloé Amellal, I am currently pursuing a BA in European Studies at King‟s College London. Starting off my „delegate career‟ as a member of KCL UNA and having participated in many MUN conferences in the 1 ZZ LONDONLONDON INTERNAINTERNATIONALTIONAL MODELMODEL UNITEDUNITED NATIONSNATIONS 20182018 United Kingdom, I served as the Vice President of Sciences Po Nations Unies during my year abroad in Paris. LIMUN holds a special place in my heart as it was the first conference I ever attended back then in 2015. This will be my second time returning to LIMUN as a chair and I am therefore thrilled to meet all of you during what promises to be an intense weekend! Good luck to you all with the research and see you in committee! Isabel VICARÍA BARKER Dear delegates, I am Isabel, a fifth-year law student at the LMU in Munich who is currently revising for the German bar exam. I did my specialty in international and European public law and I am finishing a certificate in information and computer law. My MUN career began back in high school and since then, I have participated in numerous conferences across Europe, Turkey and Israel and have served in various capacities. LIMUN 2018 will be my third LIMUN and I am very excited to be chairing this unique committee alongside Yuji and Chloe. I hope that delegates will come prepared and come up with original ideas in order to contribute to debate in a productive manner. Please note that this background guide - as the name implies - is merely a guide and a starting point for the topic that will be discussed during the committee sessions conference. It is in no way intended to replace a delegate‟s research. Please make sure you conduct extensive research on this topic, especially with regards to your adopted country‟s stance on this topic. Only by doing so will you be able to participate productively and constructively in the debates! If you have any questions or concerns, do not hesitate to contact us. Looking forward to meeting you all in February! Yuji, Chloé & Isabel [email protected] 2 ZZ LONDONLONDON INTERNAINTERNATIONALTIONAL MODELMODEL UNITEDUNITED NATIONSNATIONS 20182018 Introduction to the Committee The World Conference on Cybersecurity (WCC) is an exceptional gathering of delegates representing countries from around the world with the objective of discussing the pressing matters of cybersecurity dominating both the headlines and the clockworks of global politics. The members of this committee are mandated by their respective countries to formulate a final declaration, or „resolution‟, from which they can act upon after ratification. Regular LIMUN Rules of Procedure (RoP) apply to this committee, bar an exception. Given the ad-hoc existence of the WCC, the authority of its delegates on matters of cybersecurity will span a far greater set of issues than, say, a UNGA body or a traditional „working group‟. The WCC will be discussing a range of issues including: legal definitions and classifications, geopolitical balancing, technical cybersecurity, and philosophical questions. The WCC will run a Lean Amendments procedure, which occur as follows: a. Amendments may be introduced by raising a Motion to Introduce an Amendment; b. Once an amendment has been introduced,
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages43 Page
-
File Size-