SC Research Packet | LEBMUN

SC Research Packet | LEBMUN

LEBMUN ‘21 FORUM: SECURITY COUNCIL TOPIC 1: Press suppression through state-sponsored media and constricting regulatory policy TOPIC 2: The reformation of the Security Council and the United Nations’ operational frameworks LEBMUN ‘21 | 2 CONTENTS TOPIC 1 4 Introduction 4 Avenues Of Discussion 4 Key Terms 5 Background 6 Key Actors 7 Previous Attempts To Resolve The Issue 8 Suggested Solutions 8 Bibliography 9 TOPIC 2 10 Introduction 10 Avenues Of Discussion 10 Key Terms 11 Background 12 Key Actors 12 Previous Attempts To Resolve The Issue 13 Suggested Solutions 13 Bibliography 14 LEBMUN ‘21 | 3 TOPIC 1: Press suppression through state-sponsored media and constricting regulatory policy INTRODUCTION The question of press suppression has become exceptionally relevant, with civilians increasing their dependence on news outlets as a source of information that justify their outlooks on their governments. As a result, various member states have issued restrictions on social media platforms with countries such as China, Iran, and North Korea completely prohibiting them. Furthermrore, many countries have been caught with the implication of murder and silencing on their behalf with journalists oen being the victims of these acts of violence. The killings of journalists have oen been justified by various countries claiming to be maintaining national security and eliminating the threat of a terrorist attack. As such, the suppression of press by member states and other non-governmental political actors raises the question of the justification behind constricting regulatory policy and the use of cyber propaganda. Another facet of this international dialogue is that government-sponsored media and propaganda, by affiliation, diminishes the voice of individuals and other independent organizations. The inherent focus on creating a solution for this question should include the harassment, defamation, imprisonment, torture, threatening and killing of journalists and press worldwide. AVENUES OF DISCUSSION ● Government implication in the murder of journalists ● Restrictions on online platforms ● State-sponsored media & cyber propaganda LEBMUN ‘21 | 4 KEY TERMS Censorship and Press Suppression Censorship is the suppression or prohibition of speech, public communication, social media or other information on the basis that it is deemed insurgent to the common good. Censorship oen occurs when governments exert control over the press and prevent free expression. Political Journalism and Criticism Political journalism is associated with the branch of journalism that reports on its civil governments; it deals with helping the people understand political matters and opens a forum for political discussion. Criticism that is specific or relevant to political matters Cyber Propaganda Cyber propaganda can be defined as the effort to control information in whatever form it takes thereby influencing public opinion. The spread of false information is used through platforms such as social media, fake news websites, and other digital means. State-Sponsored Media State sponsored media is the media used for mass communication with its citizens. This media is under the financial and editorial control of the country's government either directly or indirectly. These companies may or may not be the sole media company of the country. LEBMUN ‘21 | 5 BACKGROUND Within the avenues of discussion previously mentioned are a variety of examples that help illustrate the urgency of the issue of press suppression through the assassinations of journalists, the restriction of social media, as well as the use of cyber propaganda to control the spread of information. The subject matter of the involvement of governments in press suppression through the assassination is a significant issue in modern times. Many governments have been suspected in the involvement in these assassinations. As such, the matter of the killings of journalists as a means of press suppression and reducing the spread of political criticism against a certain government becomes increasingly relevant. The Killing of Jamal Khashoggi Of the many examples is the case of Jamal Khashoggi, a US-based journalist and critic of Saudi Arabia's government, was killed in the country's consulate in Istanbul. On the 2nd of October, 2018, Khashoggi walked into Saudi Arabia’s consulate in Istanbul, where he was murdered. As a prominent Saudi journalist, the 59-year-old was loyal to the Saudi royal family for decades and even worked as a government advisor. But he fell out of favor and, in 2017, entered self-imposed exile in the US. He wrote a monthly column from there in The Washington Post in which he attacked the policies of Crown Prince Mohammed bin Salman, King Salman's son and de facto ruler of Saudi Arabia. Following his assassination, the Saudi government had denied involvement and concluded on the 20th of October that the journalist died during a fight aer refusing attempts to return him and 5 people were sentenced to death and charged responsible for his murder. However, Mr. Erdogan, the president of Turkey said that he knew the order to kill Khashoggi "came from the highest levels of the Saudi government". National Security & Censorship Moving into the question of censorship and cyber propaganda, various countries have used the issue of national security as a scapegoat to censor social media in order to discourage the mobilization of resistance against a specific government. One such case is in China, where its government monitors its internet tightly by blocking international websites regularly, taking down social media messages, and banning some keywords linked to government criticism. China has been waging an unprecedented crackdown on the Uighurs, a predominantly Muslim ethnic group mostly based in Xinjiang, in the west of the nation, under President Xi Jinping. China considers Uyghur terrorists, and in Xinjiang has consistently dismissed all claims of violations of human rights. In addition, the Chinese government has issued measures to suppress the spread of information to Uighur families about their loved ones. However, following an explosive New York Times story detailing the Chinese governments’ hard handed tactics against Uighur Muslims, The Times was accused of "smearing" China’s counterterrorism methods in the area causing a ban of dozens of news sites, including The Times, in China. China's people were bypassing its network firewall to read explosive leaked Uighur oppression files and salute an official who disobeyed Xi Jinping. Furthermore, when people had taken the discussion to Weibo, China’s government-monitored social media platform, had stopped discussion through hiding and deleting social media comments. Cybersecurity Laws Moreover, censorship and press suppression are also evident following the recent coup d’etat in Myanmar. Myanmar's junta has shut down the internet for the third time in two weeks to limit the flow of protesters' information. A proposed law on cybersecurity will authorize officials to prosecute online opponents of the military. On the 15th of February, Internet connectivity in Myanmar was cut off again, as the military continued to curb increasing resistance to its rule weeks aer the democratically elected government was toppled by a coup. Internet LEBMUN ‘21 | 6 traffic in and out of Myanmar was reduced to nearly zero early, according to the network analysis company Kentik. The blackout came as Myanmar's army, the Tatmadaw, deployed armoured vehicles in major cities to counter-protester KEY ACTORS China In the new world press freedom rankings, China has been criticized strongly. According to the annual press freedom index, China remains firmly entrenched in the "very bad" category. The map points out China's attempts to drive state media content to international news outlets, monitor Chinese social media networks, disseminate false news, purchase local news media shares around the world, and even use diplomats to try to threaten journalists and news managers. Myanmar The military junta is taking measures that could make internet censorship a permanent weapon for suppressing the opposition. A new dra bill on cybersecurity will give authorities comprehensive powers to monitor information exchanged on the internet. The proposed legislation would allow the system to "access user information, block websites, order internet shutdowns and imprison critics and officials of non-compliant companies". United States In the United States, freedom of expression is protected by the First Amendment of the Constitution of the United States. The US plays a major role in fostering freedom of expression and of the press in all countries. Saudi Arabia In Saudi Arabia, various types of media are blocked, including books, newspapers, magazines, films, television, and material published on the Internet. Under official state rule, the Saudi government closely controls and regulates the media with little changes made to reduce these policies. North Korea Led since 2012 by Kim Jong-un, the authoritarian government of North Korea continues to keep its people in a state of ignorance. The widespread adoption of mobile phones, including smartphones, has been accompanied by technical measures which ensure almost complete control of communications and files transmitted over the national intranet by the regime. LEBMUN ‘21 | 7 PREVIOUS ATTEMPTS TO RESOLVE THE ISSUE Over the years, there have been many attempts to resolve the issue of press suppression. A recent UN resolution on 6 October 2020 expressed support for the

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    14 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us